Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel

    justmattgBy justmattgNovember 26, 2023No Comments3 Mins Read

    [ad_1]

    Nov 24, 2023NewsroomCyber Attack / Malware

    Hamas-Linked Cyberattacks

    Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed to have been used by a Hamas-affiliated threat actor to target Israel amid the ongoing war in the region.

    “Among the most prominent changes is the shift to Rust language, which indicates the malware code was entirely rewritten, while still maintaining similar functionalities,” Check Point said in a Wednesday analysis. “In addition, the threat actor moved to using OneDrive instead of Google Drive to store dynamic C2 (command-and-control server) URLs.”

    SysJoker was publicly documented by Intezer in January 2022, describing it as a backdoor capable of gathering system information and establishing contact with an attacker-controlled server by accessing a text file hosted on Google Drive that contains a hard-coded URL.

    Cybersecurity

    “Being cross-platform allows the malware authors to gain advantage of wide infection on all major platforms,” VMware said last year. “SysJoker has the ability to execute commands remotely as well as download and execute new malware on victim machines.”

    The discovery of a Rust variant of SysJoker points to an evolution of the cross-platform threat, with the implant employing random sleep intervals at various stages of its execution, likely in an effort to evade sandboxes.

    One noteworthy shift is the use of OneDrive to retrieve the encrypted and encoded C2 server address, which is subsequently parsed to extract the IP address and port to be used.

    “Using OneDrive allows the attackers to easily change the C2 address, which enables them to stay ahead of different reputation-based services,” Check Point said. “This behavior remains consistent across different versions of SysJoker.”

    After establishing connections with the server, the artifact awaits further additional payloads that are then executed on the compromised host.

    The cybersecurity company said it also discovered two never-before-seen SysJoker samples designed for Windows that are significantly more complex, one of which utilizing a multi-stage execution process to launch the malware.

    Cybersecurity

    SysJoker has not yet been formally attributed to any threat actor or group. But newly gathered evidence shows overlaps between the backdoor and malware samples used in connection with Operation Electric Powder, which refers to a targeted campaign against Israeli organizations between April 2016 and February 2017.

    This activity was linked by McAfee to a Hamas-affiliated threat actor known as Molerats (aka Extreme Jackal, Gaza Cyber Gang, and TA402).

    “Both campaigns used API-themed URLs and implemented script commands in a similar fashion,” Check Point noted, raising the possibility that “the same actor is responsible for both attacks, despite the large time gap between the operations.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleIdaho National Nuclear Lab Targeted in Major Data Breach
    Next Article Scattered Spider Hops Nimbly from Cloud to On-Prem in Complex Attack
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑