Researchers have come across a previously undocumented Trojan used by an APT group of Iranian origin that has been targeting organizations in Israel but also other countries since last year with the intention of damaging their infrastructure.
The group, tracked as Moses Staff by researchers from security firm Cybereason, has been operating since at least September 2021 and its primary goal is to steal sensitive data. It also deploys file encrypting malware, but unlike ransomware, the goal is to cause business disruption and cover its tracks rather than financial gain.
Who is Moses Staff?
Moses Staff’s malicious activities were first documented last year by researchers from Check Point after a wave of attacks targeting organizations in Israel. Over the past two years there have been several groups targeting organizations in the country with ransomware-like attacks and lengthy negotiations, but Moses Staff stands out because its motivation is purely political.
More Stories
Cybercriminals Hesitant About Using Generative AI
An analysis of dark web forums revealed many threat actors are skeptical about using tools like ChatGPT to launch attacks...
For want of a cyber nail the kingdom fell
An old proverb, dating to at least the 1360’s, states: "For want of a nail, the shoe was lost, for...
Americans Receive Two Billion Spam Calls Per Month
Truecaller warns malicious calls make up the majority Read More
CISA Warns Congress on Chemical Industry Terror Attacks
Security agency wants to resume critical CFATS inspections Read More
Securing the software supply chain webinar
Join me, and the experts from JFrog, for a discussion about software supply chain security on December 5 2023. Read...
Ukraine Police Dismantle Major Ransomware Group
Affiliate deployed LockerGoga, MegaCortex, Hive and Dharma Read More