Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Newly Detected “StrifeWater” RAT Linked to Iranian APT

The Iranian threat group known as Moses Staff was first spotted in October 2021. It claims its purpose is to harm Israeli companies by leaking sensitive stolen data, but it has also been seen targeting a variety of industries in countries such as Italy, India, Germany, Chile, Turkey, UAE and the U.S.

The Iranian threat group known as Moses Staff was first spotted in October 2021. It claims its purpose is to harm Israeli companies by leaking sensitive stolen data, but it has also been seen targeting a variety of industries in countries such as Italy, India, Germany, Chile, Turkey, UAE and the U.S.

The Cybereason Nocturnus Team has detected a previously unidentified RAT used by MosesStaff. It calls this RAT ‘StrifeWater’. In its report on the RAT, Cybereason notes it is primarily used in the early stages of an attack. It is a stealthy RAT able to remove itself from the system, presumably to help cover the attackers’ tracks. This probably explains why the RAT was hitherto unidentified.

Moses Staff normally infiltrates a target, exfiltrates sensitive data and then deploys ransomware. The purpose of the ransomware appears not to be financial extortion, but a method of disrupting the target’s business operations while further covering the attackers’ tracks – it is more political than financial. This implies, but doesn’t by itself confirm, that MosesStaff is an Iranian state-sponsored group.

A typical attack would be to use PyDCrypt malware to spread to other computers on the network and drop the DCSrv payload. This is a ransomware variant based on the publicly available tool DiskCryptor. A new sample of PyDCypt is built for each targeted organization, with hard coded parameters. This implies that it is deployed at a late stage in the attack, after a successful reconnaissance phase.

StrifeWater is thought to establish persistence and conduct the reconnaissance phase. The attack copies the genuine Windows Calc.Exe to the folder containing the Moses Staff payloads, and then installs StrifeWater as Calc.Exe. When StrifeWater is no longer required, it is deleted and the original Calc.Exe returned. This, suggest the researchers, “was done in an attempt to cover the attackers’ tracks and thwart forensic analysis efforts.”

The researchers believe that the StrifeWater RAT is what is used to establish a foothold and conduct the reconnaissance necessary to deliver the ransomware to the required destinations. Its primary capabilities include listing system files, executing shell commands, taking screen captures, creating persistence through a scheduled task, and downloading updates and auxiliary modules – and self-deletion.

“Our research shows that the MosesStaff modus operandi includes attempts to masquerade its arsenal as legitimate Windows software along with the removal of their initial persistence and reconnaissance tools,” write the researchers. “This tactic helps to prevent investigators from discovering the full flow of the attack and thus the StrifeWater RAT remained undetected.”

Such campaigns, adds Cybereason co-founder and CEO Lior Div, “highlight the blurred line between nation-state and cybercrime threat actors, where ransomware gangs are more often employing APT-like tactics to infiltrate as much of a targeted network as possible without being detected, and APTs leveraging cybercrime tools like ransomware to distract, destroy and ultimately cover their tracks. For Defenders, there is no longer a significant distinction between nation-state adversaries and sophisticated cybercriminal operations.”

Advertisement. Scroll to continue reading.

Cybereason also released a research report on a new PowerShell backdoor being used by the Iranian APT known as Phosphorus.

Cybereason, headquartered in Boston, was founded in 2012 by Lior Div (CEO), Yonatan Amit (CTO), and Yossi Naar (CVO). It raised $275 million in a Series F funding round in July 2021, followed by a further $50 million in October 2021, taking the total raised to $713.6 million.

Related: Cybereason Partners With Google Chronicle on XDR Product

Related: Iran-linked MalKamak Hackers Targeting Aerospace, Telcos With ShellClient RAT

Related: DeadRinger: A Three-Pronged Attack by Chinese Military Actors Against Telcos

Related: Unknown Chinese APT Targets Russian Defense Sector

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Cyberwarfare

Ask any three people to define cyberwar and you will get three different answers. But as global geopolitics worsen and aggressive cyberattacks increase, this...