Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

“Gaza Cybergang” Attacks Attributed to Hamas

Researchers are fairly confident that the Palestinian terrorist organization Hamas is behind the cyber espionage group known as Gaza Hackers Team, Gaza Cybergang and Molerats.

Researchers are fairly confident that the Palestinian terrorist organization Hamas is behind the cyber espionage group known as Gaza Hackers Team, Gaza Cybergang and Molerats.

The threat actor, believed to be active since at least 2012, has been monitored by several security firms, including Kaspersky Lab, FireEye, PwC and ClearSky. The group’s campaigns have focused on countries in the Middle East, such as Israel, Egypt, Saudi Arabia, the UAE and Iraq, but attacks have also been observed against entities in the United States and Europe.

A report published by ClearSky in January detailed DustySky (aka NeD Worm), a multi-stage malware that the group had been using since May 2015. In its report, the security firm noted that the attackers seemed to be located in Gaza.

At the time, ClearSky said it had found information that led them to the online accounts of a software engineer based in Gaza, but they did not reveal his identity. In a follow-up report on DustySky published on Thursday, researchers disclosed the individual’s identity and provided additional information on the group’s activities.

ClearSky identified the alleged hacker after finding his email address in the metadata of a malicious document used in Gaza Cybergang’s attacks. The email address, moayy2ad(at), led investigators to accounts on several websites, including Blogger, YouTube, Google+, Twitter and Facebook. It was also linked to a developer who had published a flashlight app on Google Play. Most of the accounts were either restricted or disabled following the security firm’s first report.

According to ClearSky, the Gaza Cybergang attacks targeting the Middle East ceased after the company published its report in January. The attacks against Middle Eastern countries were resumed within 20 days, except for Israel, which the hackers only started targeting again in early April.

After they released the first report, researchers were contacted by someone interested in learning more about the individual whose identity was not disclosed. ClearSky first received an email purporting to come from the Israel Defense Force (IDF), but it was not very convincing since it came from a Gmail address.

A few days later, the company got a phone call from someone claiming to be an official from one of the countries mentioned in the report. The company asked the caller to send an email, which they did, but again using a fake email address.

Experts believe that the individual whose online accounts they identified contacted them to find out how much they knew about him.

An analysis of the links contained in the threat group’s spear phishing emails revealed that the hackers targeted individuals in the Palestinian National Authority, Israel, the United States, Egypt, Saudi Arabia and the UAE. The list of targets includes Egyptian diplomats and employees of the country’s Foreign Affairs Ministry, Israeli banks and defense companies, the Ministries of Foreign Affairs in Saudi Arabia and the UAE, a diplomat in the European Commission, a former politician and a lobbying organization in the UK, and an employee of the US Department of State.

Researchers determined that the DustySky malware is designed to scan infected computers for certain keywords, including ones related to military issues, personal documents, certificates, private keys, and credentials for email and other types of accounts.

“Based on the type of targets, on Gaza being the source of the attacks, and on the type of information the attackers are after – we estimate with medium-high certainty that the Hamas terrorist organization is behind these attacks,” ClearSky said in its report.

FireEye, which has dubbed this threat actor “Molerats,” agrees with ClearSky’s conclusion.

“The conclusion of the report is consistent with our research and this is one of two actors we track from the area,” John Hultquist, Manager of Threat Intel at FireEye, told SecurityWeek. “We have tracked them for three years now and their activity is not limited to the Levant.”

Related: Gaza Threat Group Targeting Israeli Organizations

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.


More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.