<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span style="font-size: 12.1612px; background-color: transparent;"><img src="http://info.threatstop.com/hubfs/cyber-attack-map-ddos-attack-map-internet-offline-hackers-russian-hackers-ddos-670x430.jpg" alt="cyber-attack-map-ddos-attack-map-internet-offline-hackers-russian-hackers-ddos-670x430.jpg" width="454" height="291"></span></p> <p><span style="font-size: 12.1612px; background-color: transparent;">Another attack wave directed at Israeli Organizations was reported by </span><a href="http://blog.morphisec.com/iranian-fileless-cyberattack-on-israel-word-vulnerability%20" style="font-size: 12.1612px; background-color: transparent;">Morphisec</a><span style="font-size: 12.1612px; background-color: transparent;"> and </span><a href="http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/" style="font-size: 12.1612px; background-color: transparent;">Palo Alto Networks</a><span style="font-size: 12.1612px; background-color: transparent;"> on April 27</span><sup style="background-color: transparent;">th</sup><span style="font-size: 12.1612px; background-color: transparent;">. </span><strong style="font-size: 12.1612px; background-color: transparent;">OilRig</strong><span style="font-size: 12.1612px; background-color: transparent;"> was initially discovered in May 2016, after two attack waves targeting financial institutions and technology organizations in Saudi Arabia were detected. OilRig is attributed to an Iranian APT cyber group, its namesake stemming from the Farsi word "Nafti," (Oily) also hardcoded into a number of analyzed malware samples discovered in 2016.</span></p> <!--more--> <p>This attack (April 19 – 24) was executed using compromised email accounts at the Israeli Ben-Gurion University. (Including a Microsoft Word attachment with a former zero-day exploit) After exploitation, a file-less variant of <strong>Helminth Trojan</strong> agent was installed. Although this campaign was attributed to identical actors as former campaigns, there were several modifications in method of infection, differing in evasive mechanisms and communication protocol.</p> <p>In this attack, each document exploited the vulnerability through a link embedded in the file, implementing an HTML executable file. (.hta file) While this file is downloading, it’s presented to the user as a notification with a choice to download the file. (When in actuality, the .hta file execution downloads the <strong>Helminth</strong> malware either way) In the past, this malware was downloaded after a macro from a <strong>ClaySlide</strong> was executed.</p> <p><strong>ThreatSTOP IP Firewall Service</strong> and <strong>DNS Firewall Service</strong> protect against OilRig's campaigns, if <strong>TSCritical</strong> targets are enabled in policies.&nbsp;</p> <p>&nbsp;</p> <p style="text-align: center;"><span style="font-size: 12.1612px; background-color: transparent;">&nbsp;</span></p></span>