A cyberespionage group linked in the past to the Palestinian terrorist organization Hamas took a break after its operations were exposed last summer and returned with new tools and techniques.
According to enterprise security firm Proofpoint, the threat actor known as Molerats apparently took a short break after the company released information on its activities in June 2021. During that break, it updated its malware and delivery mechanisms.
Molerats has been active since at least 2011 and it focuses on the Middle East. It’s also tracked as Gaza Hackers Team, Gaza Cybergang, DustySky, Extreme Jackal, Moonlight and TA402 — some researchers believe there are multiple groups operating under the same umbrella.
It’s worth noting that Molerats’ operations are often exposed by cybersecurity firms and researchers, but that does not appear to have discouraged the threat actor. In 2019, Kaspersky even managed to disrupt a significant part of the infrastructure used by the cyberspies and, in the same year, Israel claimed to have bombed a building housing Hamas cyber operatives in response to a cyberattack.
In a blog post published on Tuesday, Proofpoint said the hackers have apparently replaced an implant named LastConn with a new one that the cybersecurity firm has dubbed NimbleMamba. The malware was used in late 2021 in attacks aimed at Middle Eastern entities, including governments, foreign policy think tanks, and a state-affiliated airline.
Proofpoint researchers found that while NimbleMamba and LastConn have some similarities, there is little overlap between the two when it comes to code.
“NimbleMamba has the traditional capabilities of an intelligence-gathering trojan and is likely designed to be the initial access. Functionalities include capturing screenshots and obtaining process information from the computer. Additionally, it can detect user interaction, such as looking for mouse movement,” Proofpoint explained.
The malware has been delivered both via malicious websites and Dropbox — the file sharing service has also been abused for command and control (C&C) and file exfiltration. Researchers also found that NimbleMamba uses “guardrails” to ensure that it only infects devices in specified countries in the Middle East and Africa.
“The malware also contains multiple capabilities designed to complicate both automated and manual analysis,” researchers said. “Based on this, Proofpoint assesses NimbleMamba is actively being developed, is well-maintained, and designed for use in highly targeted intelligence collection campaigns.”
Recently, Zscaler also published a report on new espionage operations conducted by Molerats, targeting the banking sector in Palestine, individuals related to Palestinian political parties, as well as human rights activists and journalists in Turkey. Proofpoint believes the attacks it has analyzed occurred concurrently to the activity detailed by Zscaler.
Related: APT Group Using Voice Changing Software in Spear-Phishing Campaign
Related: New Backdoors Used by Hamas-Linked Hackers Abuse Facebook, Dropbox
Related: Hamas-Linked Hackers Add Insurance and Retail to Target List
Related: New Backdoor Attacks Leverage Political Turmoil in Middle East

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
