Hackers Reportedly Go on Global Hacking Spree Targeting Media, Governments Using Israeli Spyware

Computer surveillance - Sputnik International, 1920, 17.11.2021
Subscribe
Israel’s US ally recently slapped sanctions on NSO Group – makers of the infamous spyware Pegasus, after the spyware was shown to have been used by governments to spy on world leaders, journalists, activists and opposition figures. Candiru, a lesser-known Israeli firm making programmes with functionality similar to Pegasus, was also blacklisted.
A computer hacking tool developed by Candiru, a Tel Aviv-based surveillance and cyberespionage technology firm catering to government clients, has been used to systematically attack websites in the UK, Iran, Syria and Yemen, ESET, a Slovak internet security company has discovered.
“The victimized websites belong to media outlets in the UK, Yemen, and Saudi Arabia, as well as Hezbollah; to government institutions in Iran (Ministry of Foreign Affairs), Syria (including the Ministry of Electricity), and Yemen (including the Ministries of Interior and Finance); to internet service providers in Yemen and Syria; and to aerospace/military technology companies in Italy and South Africa. The attackers also created a website mimicking a medical trade fair in Germany,” ESET said in a comprehensive analysis published Tuesday.
The internet security company recorded a series of attacks between July 2020 and July 2021, when they suddenly stopped, with sites targeted using so-called ‘watering hole attacks’ – which involve attackers adding malicious code to websites’ JavaScript code to infect devices of “targets of interest” likely to visit them. The sites themselves are just “a jumping-off point to reach the final targets.”
The ultimate goal of the attacks were said to include collecting IP geolocation data and the targeted computer’s system information, and, if desired, to enable attackers to hijack the infected machines.
The affected websites include the Middle East Eye – a UK-based news site focused on Middle Eastern affairs, the site of Hezbollah’s Al Manar television channel, and Yemen’s Almasirah – a media outlet affiliated with the Houthis. thesaudireality.com, a Saudi dissident website critical of the monarchy, was also reportedly among those attacked.
© Photo : welivesecurity.comCompromised website
Compromised website	 

 - Sputnik International, 1920, 17.11.2021
Compromised website
Among other targets were Piaggio Aerospace, an Italian arms maker, and Denel, a South African aerospace and military tech giant.
Of the 21 websites attacked, eight are based in Yemen, three are Syrian, and three are operated by Hezbollah.
The Middle East Eye announced that it was considering legal action against parties which it suspects of involvement in the attacks in the attacks, without elaborating on who it believes may be responsible.
In a report in July, the University of Toronto’s Citizen Lab software developer reported, citing a lawsuit brought by a former Candiru employee, that the company’s clients include the governments of Saudi Arabia, the United Arab Emirates and Qatar, as well as Singapore and Uzbekistan.
Israel Defense Forces cyberdefence troops. File photo. - Sputnik International, 1920, 31.10.2021
Iran: ‘Zionist Regime, the Americans’ Behind Massive Hack Attack on Gas Station Network
In the wake of ESET’s reporting, a Candiru spokesperson assured Forbes that the company itself does not carry out attacks on clients’ behalf, and that it does not have any knowledge about how clients use its tools. “The company is selling its products to government agencies only…the company and its product don’t hack websites,” the spokesperson said.
Candiru was founded in 2014, and is named after a parasitic catfish. The company is so secretive that it does not have public website, and little information exists online about its earnings, employees, and other basic information. The firm is only allowed to export its products if Israel’s Defence Ministry grants it an export license.
The source or sources of the attacks are unclear. They reportedly ceased abruptly in mid-2021, after Citizen Lab researchers issued a report on Candiru’s use by governments to target journalists and activists in Armenia, Iran, Israel, Lebanon, Yemen, Spain, the UK, and Turkey, and to have been operated from inside nations including Hungary, Indonesia, Israel, Saudi Arabia, and the United Arab Emirates.

“At the time of writing, it seems that the operators are taking a pause, probably in order to retool and make their campaign stealthier. We expect to see them back in the ensuing months,” ESET warned in its analysis.

Israeli Defense Minister Benny Gantz adjusts his mask during the weekly cabinet meeting at the prime minister's office in Jerusalem August 1, 2021. - Sputnik International, 1920, 28.10.2021
Military
Hackers Breach, Leak Personal Data of Israeli Defense Ministry Servicemembers, Emails of Benny Gantz
The US Commerce Department surprisingly slapped Candiru and its more famous cousin, NSO Group, with sanctions earlier this month. NSO Group’s Pegasus spyware, which can infect phones using ‘zero clicks’ (i.e. without any user interaction), and is impossible to remove, came into the public spotlight in July after the non-profits Forbidden Stories and Amnesty International shared a list of over 50,000 people whose phones were targeted. The software is capable of hijacking a phone’s camera and microphones, essentially turning it into a mobile spying device, and allows operators to access users’ contacts, message and call history, and more.
This studio photographic illustration shows a smartphone with the website of Israel's NSO Group which features 'Pegasus' spyware, on display in Paris on July 21, 2021.  - Sputnik International, 1920, 03.11.2021
US Slaps Israeli 'Pegasus' Spyware Developer With Sanctions
The victims of the military-grade spyware package reportedly included over a dozen world leaders, among them French President Emmanuel Macron, Iraqi President Barham Salih, South African President Cyril Ramaphosa, and others, as well as a bevy of former heads of state and government, UN and WHO officials, journalists, dissidents, and opposition politicians.
NSO Group defended itself by claiming that it sells its spyware to governments only for use against terrorists and criminals, suggesting that Pegasus had saved “tens of thousands of lives.” Instead, it was used by governments to target foreign adversaries and domestic opponents, with Mexican drug cartels also reportedly getting their hands on the software and using it to intimidate journalists.
Newsfeed
0
To participate in the discussion
log in or register
loader
Chats
Заголовок открываемого материала