Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.

The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.

The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.

The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."

Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.

                                    Decoy document containing text on Palestinian reunification

The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.

The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.

"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.

"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."



Read more
  1. Pentest Tools Find Subdomains
  2. What Are Hacking Tools
  3. Usb Pentest Tools
  4. Pentest Automation Tools
  5. Hacker Tools For Mac
  6. Termux Hacking Tools 2019
  7. How To Install Pentest Tools In Ubuntu
  8. Hacker Tools For Pc
  9. Hacker Security Tools
  10. Hacking Tools Pc
  11. Blackhat Hacker Tools
  12. Hack Tools Github
  13. Hacker Tools Windows
  14. Beginner Hacker Tools
  15. Hacker Hardware Tools
  16. Termux Hacking Tools 2019
  17. Pentest Tools Subdomain
  18. Hacker Tools For Ios
  19. Hack Tools Online
  20. Install Pentest Tools Ubuntu
  21. Pentest Tools Review
  22. Hacker Tools 2020
  23. How To Hack
  24. Pentest Tools For Ubuntu
  25. Hak5 Tools
  26. Hacking Tools For Windows Free Download
  27. Hack Tools For Pc
  28. Hacker Search Tools
  29. Hacking Tools
  30. Free Pentest Tools For Windows
  31. Hacking Tools 2020
  32. Pentest Box Tools Download
  33. Hacker Tools Apk Download
  34. Hacker Tools
  35. Hack Website Online Tool
  36. Pentest Tools Github
  37. How To Install Pentest Tools In Ubuntu
  38. Hacker Tools Mac
  39. Pentest Box Tools Download
  40. Hack Tools For Games
  41. Hacker Tools Online
  42. Free Pentest Tools For Windows
  43. Usb Pentest Tools
  44. Hak5 Tools
  45. Hacking Tools Online
  46. Hack Tools
  47. Best Hacking Tools 2019
  48. Pentest Tools
  49. Pentest Tools Nmap
  50. Hacker Tools 2020
  51. Hacker Tools Windows
  52. Pentest Recon Tools
  53. Hacker Tools Online
  54. Hacking Tools Name
  55. Pentest Tools Find Subdomains
  56. Pentest Tools
  57. Hack Tools Github
  58. Hacking Tools Github
  59. Hacking Tools 2019
  60. Pentest Automation Tools
  61. Hacking Tools For Pc
  62. Usb Pentest Tools
  63. How To Install Pentest Tools In Ubuntu
  64. Hacking Tools For Beginners
  65. Pentest Tools Website
  66. Hacker Tools Apk
  67. Hacking Tools Online
  68. Hacking Tools And Software
  69. Free Pentest Tools For Windows
  70. Hacker Tools Software
  71. Hack Tools Pc
  72. Pentest Tools Framework
  73. Hacking App
  74. Hacker Tools For Mac
  75. Hacking Apps
  76. Hak5 Tools
  77. Hack Tools 2019
  78. Hackrf Tools
  79. Hacking Tools Windows
  80. Hack Tools For Pc
  81. Pentest Tools Nmap
  82. World No 1 Hacker Software
  83. Hack Tools
  84. Tools Used For Hacking
  85. Hack And Tools
  86. Nsa Hack Tools
  87. Pentest Tools For Android
  88. Android Hack Tools Github
  89. Hacking Tools Online
  90. Hacker Tools 2019
  91. Pentest Automation Tools
  92. Game Hacking
  93. Easy Hack Tools
  94. Growth Hacker Tools
  95. Nsa Hack Tools
  96. Hack Apps
  97. Hacking Tools Windows 10
  98. Hacking Tools Windows 10
  99. Hacker Tools Apk Download
  100. Hacker Tools 2020
  101. Pentest Tools Online
  102. Hacker Tools Software
  103. How To Install Pentest Tools In Ubuntu
  104. Hack Website Online Tool
  105. Hak5 Tools
  106. Hacker Tools Linux
  107. Hacker Techniques Tools And Incident Handling
  108. Best Hacking Tools 2020
  109. Github Hacking Tools
  110. Pentest Tools For Ubuntu
  111. Top Pentest Tools
  112. Hacker Tool Kit
  113. Growth Hacker Tools
  114. Hacking Tools Pc
  115. Termux Hacking Tools 2019
  116. Hacker Tools
  117. Hacking Tools Windows 10
  118. Game Hacking
  119. Hacking App
  120. Hack Tools For Windows
  121. Wifi Hacker Tools For Windows
  122. Hack Website Online Tool
  123. Hacker Tools 2020
  124. Pentest Tools List
  125. Hacking Tools
  126. How To Install Pentest Tools In Ubuntu
  127. Pentest Box Tools Download
  128. Hack Rom Tools
  129. Hacker Techniques Tools And Incident Handling
  130. Hack Tools
  131. Black Hat Hacker Tools
  132. Hack Tools For Mac
  133. Hacker Tools For Windows
  134. Growth Hacker Tools
  135. Hack Tools Pc
  136. Hacker Tools Apk Download
  137. Hack Tools For Windows
  138. Hack Tools Mac
  139. Hacker Tools For Windows
  140. How To Hack
  141. Hack And Tools
  142. Wifi Hacker Tools For Windows
  143. Hacker Tools Windows
  144. Pentest Tools Website Vulnerability
  145. Hack Tools For Ubuntu
  146. Pentest Reporting Tools
  147. Pentest Tools Alternative
  148. Hacker Tools Mac
  149. Hacking Tools 2020
  150. Hack Tools For Pc
  151. Physical Pentest Tools
  152. Hacks And Tools
  153. Hacking Tools Windows 10
  154. Hack Apps
  155. Pentest Tools Subdomain
  156. Pentest Box Tools Download
  157. Hack Apps
  158. Hack Rom Tools
  159. Hacker Tools 2020
  160. Pentest Tools For Mac
  161. How To Install Pentest Tools In Ubuntu
  162. Hack Tools For Pc
  163. Underground Hacker Sites
  164. Pentest Tools For Ubuntu
  165. Best Hacking Tools 2019
  166. Hacker Techniques Tools And Incident Handling
  167. Hack Tools
  168. Hacking Tools Free Download
  169. Hack Tool Apk
  170. Hacking Tools For Windows 7
  171. Hacker Tools 2020
  172. What Is Hacking Tools
  173. Hack App
  174. Hack Rom Tools

Leave a Reply