icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Israeli Entities Targeted by Cyberattack Using Donut and Sliver Frameworks

Summary:
Researchers have uncovered a sophisticated attack campaign targeting various Israeli entities using publicly available frameworks like Donut and Sliver. HarfangLab, a French cybersecurity firm, detailed the campaign, noting its highly targeted nature and the use of custom WordPress websites as payload delivery mechanisms. This campaign affects entities across unrelated verticals by leveraging well-known open-source malware.

The campaign, tracked by HarfangLab as "Supposed Grasshopper," is named after an attacker-controlled server that the first-stage downloader connects to. This initial downloader, written in the Nim programming language, is rudimentary and is responsible for fetching the second-stage malware from the staging server. The second-stage payload is delivered via a virtual hard disk (VHD) file, suspected to be disseminated through custom WordPress sites as part of a drive-by download scheme.

Once retrieved, the second-stage payload includes Donut, a shellcode generation framework, which serves as a conduit for deploying Sliver, an open-source alternative to Cobalt Strike. The attackers have put significant effort into acquiring dedicated infrastructure and creating realistic WordPress websites to facilitate payload delivery. HarfangLab researchers suggest this level of sophistication indicates the involvement of a small, focused team.

Security Officer Comments:
Despite the detailed mechanics of the attack, the ultimate goal remains unclear. HarfangLab theorizes that the campaign could be associated with legitimate penetration testing operations, which raises concerns about transparency and the implications of impersonating Israeli government agencies.

Suggested Corrections:

IOCs:
https://github.com/HarfangLab/iocs/tree/main/TRR240601

Link(s):
https://thehackernews.com/2024/07/israeli-entities-targeted-by.html

https://harfanglab.io/en/insidethel...private-companies-deploy-open-source-malware/