Newly-found Iranian cyber-espionage may pose 'real threat' to Israel

Published date06 October 2021
AuthorZEV STUB
Publication titleJerusalem Post, The: Web Edition Articles (Israel)
Cybereason identified the previously unknown state actor, dubbed MalKamak, running a sophisticated new form of malware that was previously unknown, during an incident response call for one of its clients, said Assaf Dahan, head of the cyber-threat research group at Cybereason.

The campaign has been running since at least 2018, and has likely succeeded in gathering large amounts of data from carefully chosen targets, Dahan said.

cnxps.cmd.push(function () { cnxps({ playerId: '36af7c51-0caf-4741-9824-2c941fc6c17b' }).render('4c4d856e0e6f4e3d808bbc1715e132f6'); });

>

"The investigation began after Cybereason's Incident Response Research Team was called in to assist one of the attacked companies," Dahan said. "During the incident and after installing our technology on the organization's computers, we identified sophisticated and new damage that has yet to be seen or documented. Deep investigative work found that this is just one part of an entire Iranian intelligence campaign that has been conducted in secret and under the radar for the past three years.

"From the few traces left behind by the attackers, it is clear that they acted carefully and selected their victims thoroughly. This is a sophisticated Iranian attacker who acted professionally according to a considered and calculated strategy. The potential risk inherent in such an assault campaign is large and significant for the State of Israel and may pose a real threat.

"This was a very sophisticated operation that has all the hallmarks of a state-sponsored attack," Dahan said. "While other Iranian groups are involved with more destructive acts, this one is focused on gathering information. The fact that they were able to stay under the radar for three years shows their level of sophistication. We assess that they have been able to exfiltrate large amounts of data over the years – gigabytes or even terabytes. We don't know how many victims there were before 2018."

Affected organizations and relevant security officials had been updated by it on the attack, but the extent of the actual damage caused has not yet been clarified, Cybereason said.

The campaign leverages a very sophisticated and previously undiscovered Remote Access Trojan (RAT) dubbed...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT