• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms

You are here: Home / Cyber Security News / Fata Morgana Watering Hole Attack Targets Shipping, Logistics Firms

Cybersecurity professionals at ClearSky have uncovered a innovative watering gap attack concentrating on several Israeli internet sites.

The destructive try, believed to be done by a nation-point out actor from Iran, has elevated considerations about the security of delivery and logistics corporations working in the region.

“In watering gap assaults, the attacker compromises a site that is routinely visited by a distinct group of folks, these types of as government officers, journalists, or company executives,” reads an advisory printed by the company today.

“Once compromised, the attacker can inject destructive code to the web page, which will be executed when consumers check out it. Now, the marketing campaign focuses on delivery and logistics corporations, aligning with Iran’s focus on the sector for the previous three yrs.”

The ClearSky crew has attributed the attack with reduced self-confidence to Tortoiseshell, also recognized as TA456 or Imperial Kitten, a hacking group customarily linked to Iranian cyber operations.

“Previous Tortoiseshell assaults have been noticed making use of each tailor made and off-the-shelf malware to goal IT companies in Saudi Arabia in what appeared to be offer chain attacks with the conclusion aim of compromising the IT providers’ customers,” ClearSky defined.

According to the company’s advisory, the menace actor has been energetic because at minimum July 2018. 

Read far more on Iranian point out actors: “Mint Sandstorm” Weaponizes N-day Flaws

To trick unsuspecting readers, the attackers impersonated the reputable JavaScript framework “jQuery” by making use of domain names comparable to the unique kinds. 

ClearSky stated the method was beforehand utilized in a 2017 Iranian marketing campaign. The attackers also used open up-supply penetration exam resources, incorporating code from the Metasploit framework together with one of a kind strings.

ClearSky reported it recognized 8 infected web-sites compromised using a very similar JavaScript system. 

Although most of the web sites have been cleared of the destructive code, ClearSky reported additional investigation is ongoing to make sure the comprehensive eradication of the threat.

The attack explained by ClearSky comes weeks after a new Android surveillance device was attributed to the Legislation Enforcement Command of the Islamic Republic of Iran (FARAJA).

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Google Unveils Bug Bounty Program For Android Apps
Next Post: Cyber Attacks Strike Ukraine’s State Bodies in Espionage Operation »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
  • Why DNS Security Is Your First Defense Against Cyber Attacks?
  • SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Copyright © 2025 · AllTech.News, All Rights Reserved.