Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Iranian hackers used WezRat malware in attacks against Israeli organizations
Global Security

Iranian hackers used WezRat malware in attacks against Israeli organizations

AdminBy AdminNovember 15, 2024No Comments3 Mins Read
Iranian State-Sponsored Group
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


November 15, 2024Ravi LakshmananCyber ​​espionage / malware

A group funded by Iran

Cybersecurity researchers have shed light on a new remote access Trojan and information stealer used by Iranian state-sponsored entities to conduct reconnaissance on compromised endpoints and execute malicious commands.

Cyber ​​security company Check Point codenamed the malware WezRatstating that it has been detected in the wild since at least September 1, 2023, based on artifacts uploaded to the VirusTotal platform.

“WezRat can execute commands, take screenshots, download files, execute keyloggers, and steal clipboard contents and cookies.” said in the technical report. “Some functions are performed by separate modules obtained from the command and control (C&C) server as DLL files, making the core component of the backdoor less suspicious.”

WezRat is believed to be the work of Cotton Sandstorm, an Iranian hacking group better known as Emennet Pasargad and, more recently, Aria Sepehr Ayandehsazan (ASA).

Cyber ​​security

It was a harmful program documented for the first time late last month by US and Israeli cybersecurity agencies, describing it as an “exploitation tool to gather endpoint information and execute remote commands.”

According to government authorities, the attack chains involve the use of trojanized Google Chrome installers (“Google Chrome Installer.msi”), which, in addition to installing the legitimate Chrome web browser, are configured to run a second binary file called “Updater.exe” (internally called “bd.exe”).

The malware executable, on the other hand, is designed to gather system information and establish a connection to the control (C&C) server (“connect.il-cert(.)net”) to await further instructions.

Check Point said it observed WezRat being distributed to several Israeli organizations as part of phishing emails impersonating Israel’s National Cyber ​​Directorate (INCD). The emails, sent on October 21, 2024, originated from the email address “alert@il-cert(.)net” and urged recipients to urgently install a Chrome security update.

“The backdoor executes with two parameters: connect.il-cert.net 8765, which represents the C&C server, and a number used as a ‘password’ for the backdoor to execute correctly,” Check Point said, noting that providing an incorrect password could cause the malware to “perform an incorrect function or potentially crash”.

A group funded by Iran
Cyber ​​security

“Earlier versions of WezRat had hard-coded C&C server addresses and did not rely on the ‘password’ argument to launch,” Check Point said. “WezRat originally functioned more like a simple remote access trojan with basic commands. Over time, additional features such as the screenshot capability and keylogger were included and handled as separate commands.”

Additionally, the company’s analysis of the malware and its backend infrastructure reveals that at least two different teams are involved in the development and operation of WezRat.

“The ongoing development and improvement of WezRat indicates a focused investment in maintaining a versatile and evasive cyberespionage tool,” he concludes.

“Emennet Pasargad’s activities target various organizations in the United States, Europe, and the Middle East, posing a threat not only to direct political opponents, but to any group or individual with influence over Iran’s international or domestic situation.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.