Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Wednesday, February 11
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cyber Attacks»Iranian Cyber Group Launches Sophisticated Attacks on Israeli Tech and Education Sectors
    Cyber Attacks

    Iranian Cyber Group Launches Sophisticated Attacks on Israeli Tech and Education Sectors

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    Israeli higher education and technology sectors have fallen victim to a series of highly sophisticated cyber attacks initiated in January 2023, with the perpetrators deploying previously undocumented wiper malware in their attempts to compromise sensitive data.

    These intrusions, continuing until as recently as October, have been traced back to an Iranian nation-state hacking group known as Agonizing Serpens, which operates under various aliases including Agrius, BlackShadow, and Pink Sandstorm (formerly Americium).

    A recent report from Palo Alto Networks Unit 42 revealed that the attacks aimed at stealing critical information such as personally identifiable information (PII) and intellectual property. Once the attackers successfully obtained the targeted data, they utilized a variety of wipers to erase their tracks and render the infected endpoints inoperable.

    The deployed wipers include three distinct novel variants: MultiLayer, PartialWasher, and BFG Agonizer, along with a customized tool named Sqlextractor designed specifically to extract information from database servers.

    Agonizing Serpens, operational since at least December 2020, has a history of launching wiper attacks against Israeli entities. In a previous incident this May, cybersecurity firm Check Point identified the group’s use of a ransomware strain called Moneybird in attacks targeting the country.

    The latest wave of attacks involved the exploitation of vulnerable internet-facing web servers as initial access points. The attackers then deployed web shells and conducted extensive reconnaissance of victim networks, stealing credentials with administrative privileges in the process.

    Following a lateral movement phase, the attackers utilized a combination of public and custom tools like Sqlextractor, WinSCP, and PuTTY for data exfiltration. The final step involved delivering the wiper malware:

    1. MultiLayer: A .NET malware that systematically deletes files or corrupts them with random data, making recovery efforts futile and rendering the system unusable by wiping the boot sector.
    2. PartialWasher: A C++-based malware designed to scan drives and wipe specified folders along with their subfolders.
    3. BFG Agonizer: This malware heavily relies on an open-source project called CRYLINE-v5.0 to carry out its malicious activities.

    The connection to Agrius was established through multiple code overlaps with other malware families such as Apostle, IPsec Helper, and Fantasy, all of which have been previously used by the group.

    “It is evident that the Agonizing Serpens APT group has recently enhanced its capabilities, investing significant efforts and resources to bypass Endpoint Detection and Response (EDR) systems and other security measures,” stated researchers from Unit 42. “To achieve this, they have been alternating between well-known proof-of-concept (PoC) and penetration testing tools as well as utilizing custom tools in their operations.”

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 70

    Related Posts

    • Apple’s Recent Vulnerabilities Exploited to Attack Ex-Egyptian MP using “Predator” Malware
    • VMware Issues Patch for Critical vCenter Server RCE Vulnerability
    • Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches
    • Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Malicious Ads Exploit macOS Users, Unleashing Stealer Malware

    April 1, 202418 Views

    New Nitrogen malware pushed via Google Ads for ransomware attacks

    July 27, 2023222 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.