New malware based attacks hit opponents in Syria and all over the world

Security Experts at Kaspersky Global Research & Analysis Team have discovered several malware based attacks targeting opponents of the Regime in Syria.

Malware is the most diffused cyber threat used by governments to track opponents and foreign governments, in the past security experts have already detected malicious codes targeting individuals oppose to the regime of Bashar al Assad.

A new report issued by the  Global Research & Analysis Team (GReAT)  Kaspersky Lab detected a series of targeted attacks malware based against opponents of the Syrian Government as the civil war in the country goes on.

“The Global Research & Analysis Team (GReAT) at Kaspersky Lab has discovered new malware attacks in Syria, using some techniques to hide and operate malware, in addition to proficient social engineering tricks to deliver malware by tricking and tempting victims to open and launch malicious files. The malware files were found on activist sites and social networking forums, some other files were also reported by local organizations like CyberArabs and Technicians for Freedom.” said a blog post published on SecureList 

Several strains of malware, mainly RATs (remote administration Trojans), were detected on websites and social media channels used by activist in Syria. Groups which approve the policy of President Assad are relying on social engineering to spread malicious code and infect opponents’ PCs according to Kaspersky Lab researchers.

As explained by the researchers the attackers are becoming more organized and the attacks even more complex.

“The threat actors are becoming more organized, the number of attacks is increasing and the samples being used are becoming more sophisticated, while also relying extensively on powerful social engineering tricks that many people fall for.” states the report.

The attackers used to deceive victims with fake documents containing the names of individuals wanted by the regime or the clues of chemical weapons usage made by the Syrian Regime. Unfortunately the documents are infected with RATs to control computers of victims.

Bad actors behind the campaign also used videos published on Youtube related to the civil war in Syria, the videos also encourage users to download fake, trojanized versions of popular application like WhatsApp and Viber.

The experts have detected 110 distinct malicious files, 20 domains and 47 IP addresses associated with the campaign which hit opponents in Syria.

The attackers infect victims’ machine to steal various data, including login credentials to web services like social networks and communication channels like Skype, the access to those systems gives to the bad actors a further possibility to spread the malware. Interesting to note that the attackers always propose to victims security tools for their protection, in reality they deploy application compromised with RATs.

“Total Network Monitor (which is a legitimate application) is inside another sample found, being used with embedded malware for spying purposes”“Offering security applications to protect against surveillance is one of the many techniques used by malware writing groups to get users desperate for privacy to execute these dubious programs.” the researchers write. 

Victims of the hacking campaign are mainly based in Syria, but experts also uncovered attacks on individuals outside the country:

  1. Turkey
  2. Saudi Arabia
  3. Lebanon
  4. Palestine
  5. United Arab Emirates
  6. Israel
  7. Morocco
  8. France
  9. United States

Which is the efficiency of the cyber attacks?

According the researchers at Kaspersky, the number of victims could be greater than 10,00o, for sure the malware detected in the investigation has been downloaded more than 2,000 times.

Give a  look to the full report.

Pierluigi Paganini

(Security Affairs – Syria, RAT)  

 

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Palo Alto Networks fixed multiple privilege escalation flaws

Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…

7 hours ago

Unusual toolset used in recent Fog Ransomware attack

Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…

11 hours ago

Paraguay Suffered Data Breach: 7.4 Million Citizen Records Leaked on Dark Web

Resecurity researchers found 7.4 million records containing personally identifiable information (PII) of Paraguay citizens on…

24 hours ago

Apple confirmed that Messages app flaw was actively exploited in the wild<gwmw style="display: none; background-color: transparent;"></gwmw>

Apple confirmed that a security flaw in its Messages app was actively exploited in the…

1 day ago

Trend Micro fixes critical bugs in Apex Central and TMEE PolicyServer

Trend Micro fixed multiple vulnerabilities that impact its Apex Central and Endpoint Encryption (TMEE) PolicyServer…

1 day ago