
Iran APTs Tag Team Espionage, Wiper Attacks Against Israel & Albania
伊朗 APT 聯合對以色列和阿爾巴尼亞進行間諜活動和 Wiper 攻擊
Iranian state-backed threat actors have been working closely to spy on, and then wreak havoc against, major organizations in Albania and Israel.
伊朗國家支持的威脅行為者一直在密切合作,監視阿爾巴尼亞和以色列的主要組織,然后對其造成嚴重破壞。
First, Scarred Manticore does the spying. Its clever, fileless Liontail malware framework allows it to quietly perform email data exfiltration, often for well over a year's time.
首先,疤痕蝎獅進行間諜活動。 其巧妙的無文件 Liontail 惡意軟件框架使其能夠悄悄地執行電子郵件數據泄露,通常持續一年多的時間。
Then, says Sergey Shykevich, threat intelligence group manager at Check Point, "When there is some escalation, like with Mojahedin-e-Khalq (MEK) in Albania or with the war in Israel, there's some decisionmaker in the government that decides, 'Let's go burn our cyber access for espionage and instead do influence and destructive operations.' And then they pass it to the other actor, focused on the same organization."
然后,Check Point 威脅情報小組經理謝爾蓋·什克維奇 (Sergey Shykevich) 表示,“當事態升級時,比如阿爾巴尼亞的人民圣戰組織 (MEK) 或以色列的戰爭,政府中的一些決策者會決定,” 讓我們為間諜活動而銷毀我們的網絡訪問權限,轉而進行影響和破壞性行動。” 然后他們將其傳遞給另一個參與者,專注于同一組織。”
Other Void Manticore wipers target the partition table — the part of the host system responsible for mapping out where files are located on the disk. By ruining the partition table, the data on the disk remains untouched yet inaccessible.
其他 Void Manticore 擦除器的目標是分區表——主機系統的一部分,負責映射文件在磁盤上的位置。 通過破壞分區表,磁盤上的數據保持不變但無法訪問。