![]() ![]() ![]() Groups like Ghosts of Palestine have been targeting government websites and IT systems in Israel, the U.S., and India. This revelation coincides with an increase in hacktivist operations during the Israeli-Palestinian conflict. They employ techniques like deploying backdoors and utilizing a configuration that enables dynamic updates to the command-and-control (C2) infrastructure hosted on Google Drive, allowing them to stay ahead of certain network-based defenses. Microsoft also observed Storm-1133 attempting to infiltrate third-party organizations with connections to Israeli targets. These profiles are used to make contact with employees at Israeli organizations, sending phishing messages, conducting reconnaissance, and delivering malware. The attack methodology involves a combination of social engineering and fraudulent LinkedIn profiles posing as Israeli HR managers, project coordinators, and software developers. Most of their activity has been directed at organizations perceived as hostile to Hamas, including Israeli energy and defense companies, as well as entities loyal to Fatah, a Palestinian political party in the West Bank. The group behind it is believed to be aligned with Hamas, a Sunni militant organization in control of the Gaza Strip. Microsoft, in its fourth annual Digital Defense Report, has been monitoring this campaign, codenamed Storm-1133. ![]() A Gaza-based threat actor has been attributed to a series of cyberattacks targeting Israeli private-sector entities in the energy, defense, and telecommunications sectors. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |