Israeli larger schooling and tech sectors have been focused as a part of a collection of harmful cyber assaults that commenced in January 2023 with an purpose to deploy beforehand undocumented wiper malware.
The intrusions, which befell as just lately as October, have been attributed to an Iranian nation-state hacking crew it tracks below the title Agonizing Serpens, which is also called Agrius, BlackShadow and Pink Sandstorm (beforehand Americium).
“The assaults are characterised by makes an attempt to steal delicate information, akin to personally identifiable data (PII) and mental property,” Palo Alto Networks Unit 42 stated in a brand new report shared with The Hacker Information.
“As soon as the attackers stole the knowledge, they deployed numerous wipers meant to cowl the attackers’ tracks and to render the contaminated endpoints unusable.”
This contains three totally different novel wipers akin to MultiLayer, PartialWasher, and BFG Agonizer, in addition to a bespoke instrument to extract data from database servers referred to as Sqlextractor.
Lively since not less than December 2020, Agonizing Serpens has been linked to wiper assaults focusing on Israeli entities. Earlier this Could, Verify Level detailed the risk actor’s use of a ransomware pressure known as Moneybird in its assaults focusing on the nation.
The most recent set of assaults entails weaponizing susceptible web going through net servers as preliminary entry routes to deploy net shells and conduct reconnaissance of the sufferer networks and steal credentials of customers with administrative privileges.
A lateral motion part is adopted by information exfiltration utilizing a mixture of public and customized instruments like Sqlextractor, WinSCP, and PuTTY, and eventually ship the wiper malware –
- MultiLayer, a .NET malware that enumerates recordsdata for both deletion or corrupting them with random information to withstand restoration efforts and render the system unusable by wiping the boot sector.
- PartialWasher, a C++-based malware to scan drives and wipe specified folders and its subfolders.
- BFG Agonizer, a malware that closely depends on an open-source venture known as CRYLINE-v5.0.
The hyperlinks to Agrius stems from a number of code overlaps with different malware households like Apostle, IPsec Helper, and Fantasy, which have been recognized as beforehand utilized by the group.
“It seems that the Agonizing Serpens APT group has just lately upgraded their capabilities and they’re investing nice efforts and sources to try to bypass EDR and different safety measures,” Unit 42 researchers stated.
“To take action, they’ve been rotating between utilizing totally different identified proof-of-concept (PoC) and pentesting instruments in addition to customized instruments.”


