Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

“Gaza Cybergang” Attacks Attributed to Hamas

Researchers are fairly confident that the Palestinian terrorist organization Hamas is behind the cyber espionage group known as Gaza Hackers Team, Gaza Cybergang and Molerats.

Researchers are fairly confident that the Palestinian terrorist organization Hamas is behind the cyber espionage group known as Gaza Hackers Team, Gaza Cybergang and Molerats.

The threat actor, believed to be active since at least 2012, has been monitored by several security firms, including Kaspersky Lab, FireEye, PwC and ClearSky. The group’s campaigns have focused on countries in the Middle East, such as Israel, Egypt, Saudi Arabia, the UAE and Iraq, but attacks have also been observed against entities in the United States and Europe.

A report published by ClearSky in January detailed DustySky (aka NeD Worm), a multi-stage malware that the group had been using since May 2015. In its report, the security firm noted that the attackers seemed to be located in Gaza.

At the time, ClearSky said it had found information that led them to the online accounts of a software engineer based in Gaza, but they did not reveal his identity. In a follow-up report on DustySky published on Thursday, researchers disclosed the individual’s identity and provided additional information on the group’s activities.

ClearSky identified the alleged hacker after finding his email address in the metadata of a malicious document used in Gaza Cybergang’s attacks. The email address, moayy2ad(at)hotmail.com, led investigators to accounts on several websites, including Blogger, YouTube, Google+, Twitter and Facebook. It was also linked to a developer who had published a flashlight app on Google Play. Most of the accounts were either restricted or disabled following the security firm’s first report.

According to ClearSky, the Gaza Cybergang attacks targeting the Middle East ceased after the company published its report in January. The attacks against Middle Eastern countries were resumed within 20 days, except for Israel, which the hackers only started targeting again in early April.

After they released the first report, researchers were contacted by someone interested in learning more about the individual whose identity was not disclosed. ClearSky first received an email purporting to come from the Israel Defense Force (IDF), but it was not very convincing since it came from a Gmail address.

A few days later, the company got a phone call from someone claiming to be an official from one of the countries mentioned in the report. The company asked the caller to send an email, which they did, but again using a fake email address.

Advertisement. Scroll to continue reading.

Experts believe that the individual whose online accounts they identified contacted them to find out how much they knew about him.

An analysis of the links contained in the threat group’s spear phishing emails revealed that the hackers targeted individuals in the Palestinian National Authority, Israel, the United States, Egypt, Saudi Arabia and the UAE. The list of targets includes Egyptian diplomats and employees of the country’s Foreign Affairs Ministry, Israeli banks and defense companies, the Ministries of Foreign Affairs in Saudi Arabia and the UAE, a diplomat in the European Commission, a former politician and a lobbying organization in the UK, and an employee of the US Department of State.

Researchers determined that the DustySky malware is designed to scan infected computers for certain keywords, including ones related to military issues, personal documents, certificates, private keys, and credentials for email and other types of accounts.

“Based on the type of targets, on Gaza being the source of the attacks, and on the type of information the attackers are after – we estimate with medium-high certainty that the Hamas terrorist organization is behind these attacks,” ClearSky said in its report.

FireEye, which has dubbed this threat actor “Molerats,” agrees with ClearSky’s conclusion.

“The conclusion of the report is consistent with our research and this is one of two actors we track from the area,” John Hultquist, Manager of Threat Intel at FireEye, told SecurityWeek. “We have tracked them for three years now and their activity is not limited to the Levant.”

Related: Gaza Threat Group Targeting Israeli Organizations

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.