While many Hamas-associated cyber activities have been halted amid the ongoing war, one advanced persistent threat group is gaining notoriety

According to Check Point Research (CPR), several WIRTE espionage campaigns utilize malicious RAR files leading to initial stage malware that sends the attacker the victim’s MS Office version, operating system version, computer name, username, and a list of installed programs. The campaigns are likely precursors to infections with additional malware with wider capabilities:

  • In September 2024, the APT had started a new infection chain using malicious PDF files containing Havoc, an open-source framework intended for advanced cyber operations. Once attackers gain access, they can maintain persistent control, enabling them to carry out various malicious activities, including data exfiltration, lateral movement, and remote access.
  • In October 2024, a malicious email campaign was launched by WIRTE to target various organizations in Israel, such as hospitals and municipalities, claiming that the user’s device was a target of a state-backed threat actor. The email would include a link to a URL that claims to install a threat protection program. However, this link actually points to a wiper, specifically designed to cause data destruction. This wiper is an updated version of a previously reported Samecoin wiper. Earlier this year, it had been used in a malicious campaign that impersonated the Israeli National Cyber Directorate (INCD). The URL in the malicious email initiates an infection chain which, at some point, directs victims to a malicious file that tries to connect to the Israel Home Front Command site to verify that the victim is Israeli, as the site can only be accessed within Israel. The malware then decrypts the following files to be executed:
    • A wallpaper mentioning Al-Qassam Brigades, the military wing of Hamas
    • A graphic Hamas propaganda video showing attacks from 7 October
    • A wiper designed to erase or corrupt data on a computer or network
    • An “infector component” that sends an attachment to other addresses in the same organization and copies the wiper files to other computers in the same network