Year-Long Cyber Espionage Campaign Targets Israel And Palestine

Multiple malware attacks against both Israeli and Palestinian systems, likely to be coming from the same source, have been seen over the last year.

Security company Norman said it had seen malware communicating with the same command and control servers and were signed with the same digital certificate in many cases. It believes a lengthy cyber espionage campaign is under way.

The attackers were serving up the XtremeRat trojan, which was infamously used in surveillance campaigns against Syrian activists. Whilst that trojan has been in use for some time, the interesting thing about the versions sent to Israeli and Palestinian targets was that they were signed with what seemed to be a legitimate Microsoft certificate, Norman said.

Cyber espionage

Whilst the certificate chain of one sample ended in an untrusted root certificate, meaning it would not validate properly, Norman used its findings to locate other similar trojans. Looking at the history of those trojans, Norman found attacks initially targeted Palestine before moving over to Israel.

The attackers used bait, such as stories about Hamas allegedly planning to buy rockets from Iran or circumcision rites, to attract targets into clicking on links, which would launch an executable and write malware onto system memory.

Looking into the source of the attacks, Norman could find nothing definite. However, as it looked back in the timeline of the surveillance campaign, domains used resolved to an IP address which belonged to a provider located in Ramallah in the West Bank.

“What is behind these IP addresses is hard to establish. It is possible they are hacked boxes and as such [do] not give much valid information. If that were the case, one might have expected [a] greater IP range and geographical distribution, but nothing is certain,” the report read.

Norman was also at a loss as to why attacks shifted target from Palestine to Israel. “There are probably several actors that could have an interest in the regional politics, as the various powerblocks in the region are manifold and conflicted,” it added.

“By using largely off-the-shelf malware, the cost of mounting such an operation is considerably lower than for those who do their own malware development.”

Interested by tech and fascinating plots? Try our tech in the movies quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

EU Widens Investigations Into Chinese Imports, Subsidies

After the United States imposes 100 percent tariffs on certain Chinese goods, Europe widens its…

2 days ago

Reddit Deal With OpenAI Gives ChatGPT Access To Content

OpenAI strikes deal with Reddit to train its AI tech on user posts and give…

2 days ago

Microsoft Invests 4 Billion Euros In France For AI, Cloud

Global spending spree from Microsoft continues, with huge investment for new data centre to drive…

3 days ago

Toshiba Axes 4,000 Staff In Post-Delisting Restructuring Operation

Workforce blow. Newly privatised Toshiba has embarked on a 'revitalisation plan' that will entail the…

3 days ago

European Union Opens Child Safety Probe Into Meta

European Commission opens an official child safety investigation into Facebook and Instagram-owner Meta Platforms

3 days ago