Operation Ghoul attacks terrorize industrial and engineering orgs
The malicious emails appear to come from a bank in the UAE and deliver a malware based on the Hawkeye commercial spyware
Kaspersky researchers spotted a wave of attacks that has affected more than 130 organizations in at least 30 countries.
Dubbed Operation Ghoul, the group behind the attacks appears to be financially motivated and targets executives at mostly small to medium-sized industrial manufacturing and engineering organizations by using spear phishing emails that include compressed executables, Kaspersky Senior Security Researcher Mohamad Amin Hasbini said in an Aug. 17 blog post.
The malicious emails appear to come from a bank in the United Arab Emirates and deliver a malware based on the Hawkeye commercial spyware, which is designed to collect data such as passwords, keystrokes and screenshots, to send to the attackers.
The attacks trace back to March 2015 and the most recent waves off attacks started on June 8 and June 27, 2016.
So far, more than 130 organizations have been hit and while the campaign has been highly active in the Middle East, attacks have been spotted in several regions.
Hasbini said the phishing attacks work across all platforms noting that victims were inserting their credentials using Windows, Mac OS X, Ubuntu, iPhone, and Android devices.
Although phishing attacks have long been a valuable technique for cyber criminals since they are difficult for well trained humans and software to detect, the bigger problem is lack of awareness of these type of attacks, Tripwire Security Researcher Lane Thames told SCMagazine.com via emailed comments
“No new innovation was used by this attack campaign,” Thames said. “Instead, these cyber criminals were using existing malware and phishing emails to infiltrate their victims' networks.”
He said organization should implement training programs to help users better understand the aspects of spam, phishing and malware.