<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><a href="http://africa-me.com/cyber-threat-looms-africa/"><img class="alignnone size-full wp-image-2544" src="http://cdn2.hubspot.net/hubfs/2548414/Imported_Blog_Media/book-of-eli-image.jpg" alt="book-of-eli-image" width="1280" height="720">Africa-me.com</a> and afkinsider.com recently reported that several African countries are amongst the most targeted countries by malware attacks and cyber criminals. One can speculate that these attack trends are motivated by relatively low user awareness to cyber security practices in these regions.</p> <!--more--> <p>The malware named "Book of Eli", discovered by <a href="mailto:http://www.welivesecurity.com/2016/09/22/libya-malware-analysis/">Eset</a>, has been targeting mainly Libyan entities. It was first discovered back in 2012, and is known for its distribution via social networks such as Twitter and Facebook. The attackers use compromised profiles to post links to malicious download. Another method used by this malware operators is spear-phishing with malicious attachments.</p> <p>Depending on the campaign, this malware can be deployed in various versions that differ in their functions. “Book of Eli” has been known to log keystrokes, collect information from browsers, record sound through the user’s microphone, take desktop screenshots, capture photos through the webcam, and collect information related to the versions of operating systems and Antivirus software deployed on the compromised machine.</p> <p>The communication of the infected nodes is done over the SMTP protocol for exfiltration of the collected data and over the HTTP protocol for communication with the C&amp;C servers.</p> <p>Both ThreatSTOP IP Firewall Service and DNS Firewall Service customers are protected from “Book of Eli” if they enable the TS Critical targets in their policies.</p></span>