Image: Justin Setterfield/Getty Images
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.
The hackers compromised these websites in what are technically known as watering hole attacks, a type of cyberattack where hackers use legitimate websites to target people who visit them. In this case, the hackers did not target all visitors of the websites, but only specific ones, according to ESET.“We were never able to get the final payload. So it shows that attackers are very careful in the selection of the targets,” Matthieu Faou, a researcher at ESET, told Motherboard in a phone call. Because the researchers could not retrieve the malware, “we don't know who are the final targets,” Faou said. ESET researchers explained in the report that the hackers also compromised several government websites in Iran, Syria, and Yemen, as well as the sites of an Italian aerospace company and a South African government owned defense conglomerate—all websites with links to the Middle East. The hackers, according to ESET, may have been customers of the Israeli spyware vendor Candiru, a company that was recently put on a denylist by the US Government. Candiru is one of the most mysterious spyware providers out there. The company has no website, and it has allegedly changed names several times. Candiru offers “high-end cyber intelligence platform dedicated to infiltrate PC computers, networks, mobile handsets," according to a document seen by Haaretz. The Israeli newspaper was the first one to report Candiru’s existence in 2019. Since then, several cybersecurity companies and groups such as Kaspersky Lab, Microsoft, Google, and Citizen Lab, have tracked its malware.
Advertisement
Faou is scheduled to present his findings at the CYBERWARCON conference in Washington D.C. on Tuesday.Faou said that he contacted some of the websites affected, but did not receive an answer from any of them. None of them are currently compromised, he said, and it’s unclear if that’s because the site owners caught the hackers and removed the malicious code, or the hackers cleaned up after themselves to hide their tracks. When Motherboard reached out to Middle East Eye, Mahmoud Bondok, the site’s head of digital development, said: “We were actually just made aware of it all and trying to ensure that the compromise itself is no longer active as a priority.”On Tuesday, Middle East Eye issued a press release condemning the watering hole attack against its site.“Middle East Eye is no stranger to such attempts to take our website down by state and non state actors. Substantial sums of money have been spent trying to take us out,” Middle East Eye editor in chief David Hearst said in the release. “This has not stopped us reporting what is going on in all corners of the region and I am confident that they will not stop us in future. Despite these efforts, our journalism has reached a global audience.”Do you have more information about this attack? Do you track government hacking groups and APTs? We’d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, Wickr/Telegram/Wire @lorenzofb, or email lorenzofb@vice.com
Advertisement