Volatile Cedar, the cyber espionage campaign from Lebanon

Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel

Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.).

The hackers are likely to operate from Lebanon and hacked into systems of defense contractors, telecommunications operators, educational organizations and media groups.

“This is the first time we are aware of cyber capabilities of some kind from an actor in Lebanon. It’s not surprising, a matter of time really before anyone in the government or a major political group developed capabilities in that realm,” explained Shahar Tal, vulnerability research manager at Check Point Software Technologies. 

The experts speculate that the Volatile Cedar campaign started in late 2012 and it is still active, threat actors behind the operations remained hidden by adopting sophisticated techniques that allowed them to silently compromise the targets.

The experts noticed that hackers behind Volatile Cedar campaign don’t use spear phishing, neither drive-by downloads in the early stage of attacks, instead they target Web servers.

“Spear phishing is the expected way to go,” Tal said. “This is actually a pretty effective way of entering networks. If you have web hacking skills, you’re going to get something on that webserver. Once you’re inside the webserver, there’s usually little protection going from the outside to the intranet.” continues Tal.

There is no evidence for the use of zero-day exploits.

The attackers used custom-built scanners and several other attack tools to identify flaws in the targeted websites. Once compromised the system the hacker served a Web shells backdoor on the Web servers. In particular in case the web server is a Microsoft’s IIS, the attackers install a custom-made Windows Trojan dubbed Explosive.

Explosive is the principal weapon in the arsenal of Volatile Cedar APT, it implements data stealing capabilities and a key logging feature. The malicious code is also used for lateral movements within the compromised network, experts have detected many versions of the malware, including a recent release implements functionality for spreading over USB mass storage devices.

“Residues of custom-built port scanners and several other attack tools have been found on the victim servers, leading us to believe the attackers use the initially infected servers as a pivot to manually spread to the entire network,” continues the report.

Explosive malware presents a modular structure, experts at Check Point explained that it contains a main executable binary and a DLL with backend API calls.

“The Explosive DLL file is dynamically loaded by the main executable at runtime whenever it is needed, and unloaded when the desired action is complete,” states the report. “This separation is probably designed to support quick functionality patches by the attackers, and to avoid heuristic detection of the main executable by common AV engines and other protection software.”

The Volatile Cedar attackers used at least three different versions of malware over the time, each of them implements new features to avoid detection.

Other features implemented by the Explosive malware used by hackers behind the Volatile Cedar campaign there are:

  • Monitoring antivirus detection results.
  • Monitors memory consumption to avoid arousing suspicion.
  • Suspension of external communications to avoid detection.
  • Obfuscation of communications.
  • Uses a domain generation algorithm (DGA) to find new servers.

The Check Point researchers found a large number of victims in Lebanon, but compromised organizations were also found in Israel, Turkey, the U.K., Japan, the U.S. and other countries.

Who is behind the Volatile Cedar? Cyber crime or State Sponsored hackers?

The high level of sophistication and the nature of the targeted organizations lead the experts to suspect that the operation was operated by state-sponsored hackers.

While the investigation is still ongoing, the operators of the Volatile Cedar campaign are already reacting after Check Point shared the report of its analysis, experts noticed, in fact, that they activated a self-destruct command to remove the malicious code from the infected systems worldwide.

Pierluigi Paganini

(Security Affairs –  Volatile Cedar APT,   hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

20 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.