And in dianetwork Hamas? A cyber-espionage group known as the Gaza Cybergang, the Gazans Hackers Team or Molerats resumed operations in April 2016 after ceasing all operations when security firm ClearSky discovered their presence in January 2016.
Gaza Cybergang was launched by 2012 when several security companies first detected its activities. Since then, the group has been extremely active in developing custom malware that promoted with intensive campaigns like: DownExecute, XtremeRAT, MoleRAT, or DustSky (NED Worm).
The last of these activities occurred at the beginning of the year when it was discovered by Israeli security company ClearSky. In the DustSky campaign, the team focused on targets in Israel, Egypt, Saudi Arabia, the United Arab Emirates, and Iraq, using spear-phishing attacks. The malicious software he used was called DustSky (NED Worm) and was written in .NET.
ClearSky researchers have revealed that after their publication for DustSky, the group behind this campaign stopped all activity.
In addition, at least one of the team's hackers tried to get in touch with the security company to find out what the researchers knew about the team.
Αυτό το αδρανές χρονικό space δεν κράτησε πολύ, όπως αναφέρει η ClearSky και η Gaza Cybergang άρχισε τις δραστηριότητες της εναντίον στόχων της Μέσης Ανατολής και του Ισραήλ.
Israel has not managed to avoid a new wave of hacking group attacks, as the team has renewed its attacks and targets since early April of 2016.
The security company reports that DustSky malware has been rewritten this time with C ++.
In addition, to avoid indiscretions eyeAccording to the security firm, the group is also reportedly hitting targets in the United States.
Some of the group's targets are various banks in Israel and the United Arab Emirates, the Ministries of Foreign Affairs of Saudi Arabia and the United Arab Emirates, a former UK politician, a diplomat of Europeanof the Union, an official at the US State Department, a person in the Palestinian Authority prime minister's office, and several other diplomats and ambassadors.
The team is currently chasing more than 150 different targets, sending phishing emails to private email addresses (Gmail, Yahoo, Hotmail), avoiding sending them to government email addresses.
This time, ClearSky reports that the group has left more traces and is now able to assess with "certainty that behind these attacks is the terrorist organization Hamas."