Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Iranian Tortoiseshell Hackers Targeting Israeli Logistics Industry

    justmattgBy justmattgMay 24, 2023No Comments3 Mins Read

    [ad_1]

    May 24, 2023Ravie LakshmananCyber Threat / Web Security

    Iranian Tortoiseshell Hackers

    At least eight websites associated with shipping, logistics, and financial services companies in Israel were targeted as part of a watering hole attack.

    Tel Aviv-based cybersecurity company ClearSky attributed the attacks with low confidence to an Iranian threat actor tracked as Tortoiseshell, which is also called Crimson Sandstorm (previously Curium), Imperial Kitten, and TA456.

    “The infected sites collect preliminary user information through a script,” ClearSky said in a technical report published Tuesday. Most of the impacted websites have been stripped of the rogue code.

    Tortoiseshell is known to be active since at least July 2018, with early attacks targeting IT providers in Saudi Arabia. It has also been observed setting up fake hiring websites for U.S. military veterans in a bid to trick them into downloading remote access trojans.

    That said, this is not the first time Iranian activity clusters have set their sights on the Israeli shipping sector with watering holes.

    The attack method, also called strategic website compromises, works by infecting a website that’s known to be commonly visited by a group of users or those within a specific industry to enable the distribution of malware.

    Watering Hole Attack

    In August 2022, an emerging Iranian actor named UNC3890 was attributed to a watering hole hosted on a login page of a legitimate Israeli shipping company that’s designed to transmit preliminary data about the logged-in user to an attacker-controlled domain.

    The latest intrusions documented by ClearSky show that the malicious JavaScript injected into the websites functions in a similar manner, collecting information about the system and sending it to a remote server.

    UPCOMING WEBINAR

    Zero Trust + Deception: Learn How to Outsmart Attackers!

    Discover how Deception can detect advanced threats, stop lateral movement, and enhance your Zero Trust strategy. Join our insightful webinar!

    Save My Seat!

    The JavaScript code further attempts to determine the user’s language preference, which ClearSky said could be “useful to the attacker to customize their attack based on the user’s language.”

    On top of that, the attacks also make use of a domain named jquery-stack[.]online for command-and-control (C2). The goal is to fly under the radar by impersonating the legitimate jQuery JavaScript framework.

    The development comes as Israel continues to be the most prominent target for Iranian state-sponsored crews. Microsoft, earlier this month, highlighted their new approach of combining “offensive cyber operations with multi-pronged influence operations to fuel geopolitical change in alignment with the regime’s objectives.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleGoogle Adds Guardrails to Keep AI in Check
    Next Article ‘Volt Typhoon’ China-Backed APT Infiltrates US Critical Infrastructure Orgs
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑