Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Pose as Israeli Government and Companies to Deploy Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Pose as Israeli Government and Companies to Deploy Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Hackers Pose as Israeli Government and Companies to Deploy Malware

Security

Hackers Pose as Israeli Government and Companies to Deploy Malware

Cybercriminals are impersonating Israeli government entities and private companies to deploy sophisticated open-source malware.

Marco Rizal
Last updated: August 21, 2024 10:15 am
By Marco Rizal - Editor, Journalist 4 Min Read
Share
Hackers Pose As Israel
SHARE

HARFANGLAB, a cybersecurity firm, has discovered a complex operation in which attackers pretend to be Israeli government entities and private companies in order to distribute open-source malware.

Their investigation uncovered a suspicious and long-standing domain that may be targeting the Israeli government.

This domain is currently active and serves as a command and control server (C2) in an infection chain related to an Israeli government entity.

The company found that a combination of readily available malware was used, with some minor custom development to connect the different parts of the attack.

In late 2023, private companies were targeted by similar attacks that used common techniques and custom WordPress websites to deliver the payload, as revealed by their research.

Although there is a chance that these attacks are legitimate penetration testing operations, there is no evidence connecting them to any reputable penetration testing company.

How it works

The infection chain starts with a VHD file called “vacation5.vhd.” This file is a virtual hard drive that can be easily mounted on Windows systems without the need for extra tools.

There are multiple hidden files inside this VHD file, along with a visible link file called “hagrala.lnk” that directs to an HTA file named “hagrala.hta.” Clicking on the VHD file will initiate the execution of the HTA file.

This file, on the other hand, shows a misleading image, while transferring malware-related files to the %TEMP% folder and initiating the initial stage of the malware.

The initial malware is a basic downloader coded in the Nim programming language. This connects to a staging server that is under the control of the attackers in order to download the second-stage malware.

The connection is established using an SSL context initialized by an attached certificate. However, testing shows that the malware can accept certificates signed by other certificate authorities, which may bypass intended validation mechanisms.

Executable Part of Infection Chain
Infection chain executable part | Credits: HARFANGLAB

The final payload includes two open-source projects called Donut and Sliver. Donut is a framework that generates position-independent shellcode, while Sliver is a Golang trojan created as a free alternative to CobaltStrike.

After being executed, Donut is designed to disrupt the victim's security products by manipulating AMSI (Antimalware Scan Interface) and WLDP (Windows Lockdown Policy).

It modifies certain functions to make them ineffective, thus circumventing security measures.

Sliver, the final payload, utilizes the domain “www.economy-gov-il[.]com” as its C2 server.

The attacker gains complete control over the victim's machine, giving them the ability to utilize Sliver's features for various actions, including data exfiltration or deploying additional malware.

HARFANGLAB's analysis has shown more infrastructure that is likely to have been used in similar attack campaigns.

Staging servers and custom WordPress websites hosted on domains registered through GoDaddy, such as “economy-gov-il[.]com,” “portal.operative-sintecmedia[.]com,” and “carlsberg[.]site,” were utilized to distribute malware via drive-by download schemes.

Fake Operatives Finance Portal
Fake WordPress websites | Credits: HARFANGLAB

An interesting incident occurred where a custom WordPress site redirected to Rick Astley's “Never Gonna Give You Up” video, a prank commonly referred to as “rickrolling.”

This suggests that the attackers may have used deceptive tactics to either confuse or entertain themselves.

The findings from HARFANGLAB highlight the narrow focus and precise targeting of the campaign, as only a small number of samples are connected to this specific cluster of activities.

More Stories

Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs

Smishing Scams Rise As Election Day Approaches

Deepfakes, Hacks, and Leaks Threaten to Disrupt 2024 US Election

French Airport Websites Targeted by DDoS Attack

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Nearly Entire Population of Turkey Hit by Alleged Data Breach

Nearly Entire Population of Turkey Hit by Alleged Data Breach

10 Million Bounty on GRU Cyber Operatives

$10 Million Bounty on GRU Cyber Operatives

New SambaSpy Malware Loves Italian Food

New SambaSpy Malware Decides Italy’s the Only Place to Party

A Look Inside the Pig Butchering Crypto Scam Exchanges

A Look Inside the Pig Butchering Crypto Scam Exchanges

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?