Select Page

The politically motivated Moses Staff hacker group has been observed using a custom multi-component toolset with the goal of carrying out espionage against its targets as part of a new campaign that exclusively singles out Israeli organizations.

First publicly documented in late 2021, Moses Staff is believed to be sponsored by the Iranian government, with attacks reported against entities in Israel, Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.

Earlier this month, the hacker collective was observed incorporating a previously undocumented remote access trojan (RAT) called “StrifeWater” that masquerades as the Windows Calculator app to evade detection.

“Close examination reveals that the group has been active for over a year, much earlier than the group’s first official public exposure, managing to stay under the radar with an extremely low detection rate,” findings from FortiGuard Labs show.

The latest threat activity involves an attack path that leverages the ProxyShell vulnerability in Microsoft Exchange servers as an initial infection vector to deploy two web shells, followed by exfiltrating Outlook Data Files (.PST) from the compromised server.

Subsequent phases of the infection chain involve an attempt to steal credentials by dumping the memory contents of a critical Windows process called Local Security Authority Subsystem Service (Lsass.exe), before dropping and loading the “StrifeWater” backdoor (broker.exe).

The installation of the “Broker” implant, which is used to execute commands fetched from a remote server, download files, and exfiltrate data from target networks, is facilitated by a loader that masquerades as a “Hard Disk Drives Fast Stop Service” dubbed “DriveGuard” (drvguard.exe).

On top of that, the loader is also responsible for launching a watchdog mechanism (“lic.dll”) that ensures its own service is never interrupted by restarting the DriveGuard every time it’s stopped as well as ensuring that the loader is configured to run automatically on system startup.

images from Hacker News