New attacks involving the Pierogi++ malware have been launched by Hamas-affiliated threat operation Gaza Cybergang against Palestinian entities, The Hacker News reports.
Despite using a different programming language and lacking Ukrainian strings in its code, the Pierogi++ backdoor retains its predecessor's screenshot-capturing, command execution, and attacker file-downloading capabilities, according to a report from SentinelOne.
Such a discovery indicates the continued improvements implemented by Gaza Cybergang in its attack arsenal, noted researchers, who added that the group has also been associated with the Operation Bearded Barbie and Big Bang attack campaigns, as well as the WIRTE threat operation.
"The observed overlaps in targeting and malware similarities across the Gaza Cybergang sub-groups after 2018 suggests that the group has likely been undergoing a consolidation process. This possibly includes the formation of an internal malware development and maintenance hub and/or streamlining supply from external vendors," said SentinelOne researcher Aleksandar Milenkoski.
TAG-112 may be a subgroup of Chinese advanced persistent threat group Evasive Panda, also known as TAG-102 and StormBamboo, due to significant similarities in attack tactics, techniques, and procedures, an analysis from Recorded Future's Insikt Group revealed.
After engaging in cyberespionage attacks that involved the distribution of RAR archive lures to deploy the IronWind downloader and Havoc post-exploitation framework, WIRTE proceeded to target numerous Israeli entities with the updated SameCoin Wiper malware in a phishing campaign impersonating an Israeli partner of cybersecurity firm ESET.