The number of cyber attacks against Internet users in Syria is growing, with organised groups relying on increasingly sophisticated strains of malware to target media agencies, activists and dissidents, warns Russian security vendor Kaspersky Labs.
According to a report by Kaspersky’s Global Research & Analysis Team (GReAT), groups from both sides of the civil war are using advanced social engineering techniques, modifying legitimate apps and obfuscating their code in order to infect target machines with Remote Access Tools (RATs) such as the ‘Dark Comet’.
The company says people should be extra careful when they access online material that relates to the conflict.
Way back in 2012, F-Secure reported that the Syrian government had used social engineering and RATs to infect activist systems with surveillance tools.
While conducting the study, GReAT discovered 110 different malicious files used in attacks against targets in Syria and the region – a “dramatic” increase over the last year. The team believes that the number of victims exceeds 10,000, with some of these files being downloaded more than 2000 times.
RATs
For example, GReAT found a RAT which is launched when users try to access the ‘National Security Program’, a fake application that allegedly holds the names of all the people wanted by the Syrian state. A link to another heavily obfuscated malware package was hiding in a description for a YouTube video showing disturbing images of the conflict.
Another method of getting a system compromised is through ‘Ammazon Internet Security’ (sic), a completely fake security application that seems to be modelled on Windows Defender, and leaves the victims’ computers with no protection and a RAT installed.
Malware can also piggyback on top of legitimate applications – for example, GReAT discovered an infected version of Total Network Monitor software, which is often used by activists to secure their communications and escape surveillance, and thus presents the perfect targeting mechanism. Repackaged apps for Smart Firewall, SSH VPN, and encrypted social networks WatsApp and Viber have also been spotted carrying malware.
Most of the attackers’ command and control centres were tracked to IP addresses in Syria, Russia, Lebanon, the US and Brazil.
“A combination of factors – social engineering, rapid app development and remote administration tools for taking over the victim’s entire system – creates a worrying scenario for unsuspecting users,” said Ghareeb Saad, senior security researcher at GReAT, Kaspersky Lab.
“We expect attacks by Syrian malware to continue and evolve both in quality and quantity. Therefore, users should be especially careful of suspicious links, double-check their downloads and have a reliable and comprehensive security solution installed.”
Can you look after your personal data online? Take our quiz!
Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector
Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…
Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…