top of page

Molerats, Extreme Jackal, Gaza Cybergang

Mitre

Alias

Molerats, Extreme Jackal, Gaza Cybergang, Gaza Hackers Team, Ta402, Aluminum Saratoga, Atk 89, Tag-ct5

Country

[gaza]

Sponsor

Hamas

Motivation

Information Theft And Espionage

First Seen

2012

Description

(Kaspersky) The Gaza cybergang is an Arabic-language, politically-motivated cybercriminal group, operating since 2012 and actively targeting the MENA (Middle East North Africa) region. The Gaza cybergang�s attacks have never slowed down and its typical targets include government entities/embassies, oil and gas, media/press, activists, politicians, and diplomats.

One of the interesting new facts, uncovered in mid-2017, is its discovery inside an oil and gas organization in the MENA region, infiltrating systems and pilfering data, apparently for more than a year.

An overlap has been found between Molerats and {{Operation Parliament}} and these may also be an association with {{The Big Bang}}.

Targeted
Industries

Aerospace, Defense, Embassies, Energy, Financial, Government, High-tech, Media, Oil And Gas, Telecommunications, Journalists And Software Developers

Targeted
Countries

Afghanistan, Algeria, Canada, China, Chile, Denmark, Egypt, Germany, India, Iran, Iraq, Israel, Jordan, Kuwait, Lebanon, Latvia, Libya, Macedonia, Morocco, New Zealand, Oman, Palestine, Qatar, Russia, Saudi Arabia, Serbia, Slovenia, Somalia, South Korea, Syria, Turkey, Uae, Uk, Usa, Yemen, The Bbc And The Office Of The Quartet Representative

Tools

Badpatch
Brittlebush
Downeks
Dropbook
Dustysky
H-worm
Jhonerat
Kasperagent
Lastconn
Micropsia
Molenet
Molerat Loader
Nimblemamba
Njrat
Pierogi
Poison Ivy
Quasarrat
Scote
Sharpstage
Spark
Xtremerat

TTP

Nil

Operations
Performed

[2012-01] defacement Of Israel Fire Service Website (hackers Claiming To Be From The Gaza Strip Defaced The Website Of The Israel Fire And Rescue Services, Posting A Message Saying �death To Israel,� A Spokesman Said On Friday. (https://middle-east-online.com/en/cyber-war-gaza-hackers-deface-israel-fire-service-website)

[2012-10] operation �molerats� (in October 2012, Malware Attacks Against Israeli Government Targets Grabbed Media Attention As Officials Temporarily Cut Off Internet Access For Its Entire Police Force And Banned The Use Of Usb Memory Sticks. Security Researchers Subsequently Linked These Attacks To A Broader, Yearlong Campaign That Targeted Not Just Israelis But Palestinians As Well � And As Discovered Later, Even The U.s. And Uk Governments. (https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html)

[2013-06] we Observed Several Attacks In June And July 2013 Against Targets In The Middle East And The U.s. That Dropped A Pivy Payload That Connected To Command-and-control (cnc) Infrastructure Used By The Molerats Attackers. (https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html)

[2014-04] between 29 April And 27 May, Fireeye Labs Identified Several New Molerats Attacks Targeting At Least One Major U.s. Financial Institution And Multiple, European Government Organizations. (https://www.fireeye.com/blog/threat-research/2014/06/molerats-here-for-spring.html)

[2014 Summer] attacks Against Israeli & Palestinian Interests (the Decoy Documents And Filenames Used In The Attacks Suggest The Intended Targets Include Organizations With Political Interests Or Influence In Israel And Palestine. (https://pwc.blogs.com/cyber_security_updates/2015/04/attacks-against-israeli-palestinian-interests.html)

[2014] operation �moonlight� (vectra Threat Labs Researchers Have Uncovered The Activities Of A Group Of Individuals Currently Engaged In Targeted Attacks Against Entities In The Middle East. We Identified Over 200 Samples Of Malware Generated By The Group Over The Last Two Years. These Attacks Are Themed Around Middle Eastern Political Issues And The Motivation Appears To Relate To Espionage, As Opposed To Opportunistic Or Criminal Intentions. (https://blog.vectra.ai/blog/moonlight-middle-east-targeted-attacks)

[2015-05] one Interesting New Fact About Gaza Cybergang Activities Is That They Are Actively Sending Malware Files To It (information Technology) And Ir (incident Response) Staff; This Is Also Obvious From The File Names They Are Sending To Victims, Which Reflect The It Functions Or Ir Tools Used In Cyberattack Investigations. (https://securelist.com/gaza-cybergang-wheres-your-ir-team/72283/)

[2015-09] operation �dustysky� (these Attacks Are Targeted, But Not Spear-phished. I.e., Malicious Email Messages Are Sent To Selected Targets Rather Than Random Mass Distribution, But Are Not Tailored Specifically To Each And Every Target. Dozens Of Targets May Receive The Exact Same Message. The Email Message And The Lure Document Are Written In Hebrew, Arabic Or English �depending On The Target Audience. Targeted Sectors Include Governmental And Diplomatic Institutions, Including Embassies; Companies From The Aerospace And Defense Industries; Financial Institutions; Journalists; Software Developers. The Attackers Have Been Targeting Software Developers In General, Using A Fake Website Pretending To Be A Legitimate Ios Management Software, And Linking To It In An Online Freelancing Marketplace. (https://www.clearskysec.com/wp-content/uploads/2016/01/operation%20dustysky_tlp_white.pdf)

[2015-12] palo Alto Networks Traps Advanced Endpoint Protection Recently Prevented Recent Attacks That We Believe Are Part Of A Campaign Linked To Dustysky. (https://unit42.paloaltonetworks.com/unit42-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments/)

[2016-04] operation �dustysky� Part 2 (attacks Against All Targets In The Middle East Stopped At Once, After We Published Our First Report. However, The Attacks Against Targets In The Middle East (except Israel) Were Renewed In Less Than 20 Days. In The Beginning Of April 2016, We Found Evidence That The Attacks Against Israel Have Been Renewed As Well. Based On The Type Of Targets, On Gaza Being The Source Of The Attacks, And On The Type Of Information The Attackers Are After �we Estimate With Medium-high Certainty That The Hamas Terrorist Organization Is Behind These Attacks. (https://www.clearskysec.com/wp-content/uploads/2016/06/operation-dustysky2_-6.2016_tlp_white.pdf (https://kc.mcafee.com/resources/sites/mcafee/content/live/product_documentation/26000/pd26760/en_us/mcafee_labs_threat_advisory_gazacybergang.pdf)

[2016-11] pwc Analysts Have Been Tracking The Same Malware Campaign, Which Has Seen A Noticeable Spike Since At Least April 2016. The Attackers Have Targeted Arabic News Websites, Political Figures And Other Targets That Possess Influence In The Palestinian Territories And Other Neighbouring Arab Countries. (our Investigation Began By Nalyzing Around 20 Executable Files Associated With The Attacks. Several Of These Files Opened Decoy Documents And Audio Files, Which Were Exclusively In Arabic-language. (https://pwc.blogs.com/cyber_security_updates/2016/11/molerats-theres-more-to-the-naked-eye.html)

[2017 Mid] new Targets, Use Of Ms Access Macros And Cve 2017-0199, And Possible Mobile Espionage (one Of The Interesting New Facts, Uncovered In Mid-2017, Is Its Discovery Inside An Oil And Gas Organization In The Mena Region, Infiltrating Systems And Pilfering Data, Apparently For More Than A Year. (another Interesting Finding Is The Use Of The Recently Discovered Cve 2017-0199 Vulnerability, And Microsoft Access Files Into Which The Download Scripts Were Embedded To Reduce The Likelihood Of Their Detection. Traces Of Mobile Malware That Started To Appear From Late April 2017, Are Also Being Investigated. (https://securelist.com/gaza-cybergang-updated-2017-activity/82765/)

[2017-09] operation �tophat� (in Recent Months, Palo Alto Networks Unit 42 Observed A Wave Of Attacks Leveraging Popular Third-party Services Google+, Pastebin, And Bit.ly. (the Attacks We Found Within The Tophat Campaign Began In Early September 2017. In A Few Instances, Original Filenames Of The Identified Samples Were Written In Arabic. (https://unit42.paloaltonetworks.com/unit42-the-tophat-campaign-attacks-within-the-middle-east-region-using-popular-third-party-services/)

[2019-01] �spark� Campaign (this Campaign Uses Social Engineering To Infect Victims, Mainly From The Palestinian Territories, With The Spark Backdoor. This Backdoor First Emerged In January 2019 And Has Been Continuously Active Since Then. The Campaign�s Lure Content Revolves Around Recent Geopolitical Events, Espeically The Israeli-palestinian Conflict, The Assassination Of Qasem Soleimani, And The Ongoing Conflict Between Hamas And Fatah Palestinian Movements. (https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one)

[2019-02] new Attack In The Middle East (recently, 360 Threat Intelligence Center Captured A Bait Document Designed Specifically For Arabic Users. It Is An Office Word Document With Malicious Macros Embedded To Drop And Execute A Backdoor Packed By Enigma Virtual Box. The Backdoor Program Has A Built-in Keyword List Containing Names Of People Or Opera Movies To Communicate With C2, Distributes Control Commands To Further Control The Victim�s Computer Device. After Investigation, We Suspect This Attack Is Carried Out By Molerats. (https://ti.360.net/blog/articles/suspected-molerats-new-attack-in-the-middle-east-en/)

[2019-04] operation �sneakypastes� (the Campaign Is Multistage. It Begins With Phishing, Using Letters From One-time Addresses And One-time Domains. Sometimes The Letters Contain Links To Malware Or Infected Attachments. If The Victim Executes The Attached File (or Follows The Link), Their Device Receives Stage One Malware Programmed To Activate The Infection Chain. (https://www.kaspersky.com/blog/gaza-cybergang/26363/)

[2019-10] between October 2019 Through The Beginning Of December 2019, Unit 42 Observed Multiple Instances Of Phishing Attacks Likely Related To A Threat Group Known As Molerats (aka Gaza Hackers Team And Gaza Cybergang) Targeting Eight Organizations In Six Different Countries In The Government, Telecommunications, Insurance And Retail Industries, Of Which The Latter Two Were Quite Peculiar. (https://unit42.paloaltonetworks.com/molerats-delivers-spark-backdoor/)

[2019-12] �pierogi� Campaign (this Campaign Uses Social Engineering Attacks To Infect Victims With A New, Undocumented Backdoor Dubbed Pierogi. This Backdoor First Emerged In December 2019, And Was Discovered By Cybereason. In This Campaign, The Attackers Use Different Ttps And Decoy Documents Reminiscent Of Previous Campaigns By Molerats Involving The Micropsia And Kaperagent Malware. (https://www.cybereason.com/blog/new-cyber-espionage-campaigns-targeting-palestinians-part-one)

[2020-03] molerats Delivers Spark Backdoor To Government And Telecommunications Organizations (https://unit42.paloaltonetworks.com/molerats-delivers-spark-backdoor/ (https://www.bleepingcomputer.com/news/security/hackers-hide-malware-c2-communication-by-faking-news-site-traffic/)

[2020-10] new Malware Arsenal Abuses Cloud Platforms In Middle East Espionage Campaign (https://www.cybereason.com/hubfs/dam/collateral/reports/molerats-in-the-cloud-new-malware-arsenal-abuses-cloud-platforms-in-middle-east-espionage-campaign.pdf (https://www.cybereason.com/blog/molerats-apt-new-malware-and-techniques-in-middle-east-espionage-campaign)

[2021 Early] new Ta402 Molerats Malware Targets Governments In The Middle East (https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east)

[2021-04] threat Group Uses Voice Changing Software In Espionage Attempt (https://www.cadosecurity.com/post/threat-group-uses-voice-changing-software-in-espionage-attempt)

[2021-07] new Espionage Attack By Molerats Apt Targeting Users In The Middle East (https://www.zscaler.com/blogs/security-research/new-espionage-attack-molerats-apt-targeting-users-middle-east)

[2021-11] ugg Boots 4 Sale: A Tale Of Palestinian-aligned Espionage (https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage

Counter
Operations

Nil

Information

nil

bottom of page