A professional-Hamas hacktivist group has been noticed utilizing a brand new Linux-based wiper malware dubbed BiBi-Linux Wiper, focusing on Israeli entities amidst the continuing Israeli-Hamas battle.
“This malware is an x64 ELF executable, missing obfuscation or protecting measures,” Safety Joes mentioned in a brand new report revealed at present. “It permits attackers to specify goal folders and may probably destroy a complete working system if run with root permissions.”
A few of its different capabilities embody multithreading to deprave information concurrently to boost its velocity and attain, overwriting information, renaming them with an extension containing the hard-coded string “BiBi” (within the format “[RANDOM_NAME].BiBi[NUMBER]”), and excluding sure file sorts from being corrupted.
“Whereas the string “bibi” (within the filename), could seem random, it holds important which means when blended with matters akin to politics within the Center East, as it’s a frequent nickname used for the Israeli Prime Minister, Benjamin Netanyahu,” the cybersecurity firm added.
The harmful malware, coded in C/C++ and carrying a file dimension of 1.2 MB, permits the menace actor to specify goal folders through command-line parameters, by default choosing the foundation listing (“https://thehackernews.com/”) if no path is supplied. Nonetheless, performing the motion at this degree requires root permissions.
One other notable facet of BiBi-Linux Wiper is its use of the nohup command throughout execution in order to run it unimpeded within the background. A few of the file sorts which might be skipped from being overwritten are these with the extensions .out or .so.
“It is because the menace depends on information akin to bibi-linux.out and nohup.out for its operation, together with shared libraries important to the Unix/Linux OS (.so information),” the corporate mentioned.
The event comes as Sekoia revealed that the suspected Hamas-affiliated menace actor referred to as Arid Viper (aka APT-C-23, Desert Falcon, Gaza Cyber Gang, and Molerats) is probably going organized as two sub-groups, with every cluster targeted on cyber espionage actions towards Israel and Palestine, respectively.
“Concentrating on people is a standard observe of Arid Viper,” SentinelOne researchers Tom Hegel and Aleksandar Milenkoski mentioned in an evaluation launched final week.
“This consists of pre-selected Palestinian and Israeli high-profile targets in addition to broader teams, usually from crucial sectors akin to protection and authorities organizations, regulation enforcement, and political events or actions.”
Assault chains orchestrated by the group embody social engineering and phishing assaults as preliminary intrusion vectors to deploy a vast number of customized malware to spy on its victims. This includes Micropsia, PyMicropsia, Arid Gopher, and BarbWire, and a brand new undocumented backdoor referred to as Rusty Viper that is written in Rust.
“Collectively, Arid Viper’s arsenal offers various spying capabilities akin to recording audio with the microphone, detecting inserted flash drives and exfiltrating information from them, and stealing saved browser credentials, to call only a few,” ESET famous earlier this month.


