Breaking

Moses staff hacker group using new StrifeWater RAT for ransomware attacks

A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator App to go stealth.

The Moses Staff Hacker Group has been known for the series of cyber espionage attacks on Israel Organizations in 2021 and is also operating under political influence.

Modus Operandi of Moses Staff and StrifeWater RAT

Cybereason, a cybersecurity company has been studying the activities of this Iran-based hacker group Moses Staff and has dubbed their recent RAT manipulation as StrifeWater.

This new RAT is used in the beginning of an attack to maintain stealth and remove itself after the goal is achieved. Tom Fakterman, Security Analyst at Cybereason said ‘The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions’

Infection Chain of Moses Staff Attack (Source: Check Point Research)

Moses staff has been known since the end of last year when Check Point Researchers identified several attacks targeting Israel since Sept 2021.

Unlike other ransomware operators Moses Staff doesn’t aim for financial gains, instead focuses on disrupting organizations operations by encrypting the data and leaving it like that without ransom demands.

The intrusions were prominent as they depend on open-source library DiskCryptor to execute volume encryption, along with affecting the devices with bootloader that prevents the devices to start without the right encryption key.

Moses Staff StrifeWater RAT’s capabilities

As of Feb 02, 2022, the victims of Moses Staff are beyond Israel, starting with India, Germany, Chile, Italy, Turkey, the USA and U.A.E. The new StrifeWater RAT is deployed as calc.exe (windows calculator) and is deployed during initial stages of attack and is removed later post encryption of documents.

StrifeWater RAT execution seen in XDR platform (Source: Cybereason)

After the removal the calculator binary is replaced with a legitimate one, making it completely stealthy and facilitate the evasion phase of the attack once the ransomware payload function is successfully executed.

Highlights of StrifeWater RAT,

  • Ability to list the files in the device
  • Screen Capturing
  • Execute commands
  • Develop Persistence
  • Download payload updates
  • Download Auxiliary Modules

While ransomware operators like REvil, NightSky and others look for financial benefits, threat actors like Moses Staff and their StrifeWater RAT is where the organizations are concerned as their motive is just to disrupt the normal operations which is even more sinister than the former groups.

The discovery of new PyDyrcypt malware samples shows that the Iranian APT group Moses Staff is active and continues its nefarious acts on development of its attack arsenal.

Employing a Endpoint Detection and Response (XDR) system with the definition for Moses Staff StrifeWater RAT can help your network stay vigilant against this new threat.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago