 
            
              ClearSky Cyber Security
            
            @ClearskySec
Followers
                10K
              Following
                200
              Media
                193
              Statuses
                449
              Cyber security and threat intelligence company
              
              Joined July 2017
            
            
           A recent campaign exploiting the Oman Ministry of Foreign Affairs has been identified by ClearSky. This lure referenced the Iran–Israel war and the Middle East's "day after" and was sent to multiple ministries of foreign affairs. Similar obfuscation techniques were used by 
          
                
                1
              
              
                
                8
              
              
                
                28
              
             Recently we identified a notable uptick in TA455 related activity tied to the ongoing Iranian "Dream Job" campaign. Tactics, techniques, and procedures (TTP’s) of the group seem to be evolving continuously, demonstrating a high level of agility. We discovered new unknown malware 
          
                
                0
              
              
                
                10
              
              
                
                77
              
             We have identified a widespread campaign in Ukraine that distributes malicious PDF files. Documents claiming to be from tax[.]gov[.]ua are disguised as official messages. When the recipient clicks the download link within these PDFs, a JavaScript file with a double extension 
          
                
                0
              
              
                
                2
              
              
                
                9
              
             A suspected new malware variant linked to the MuddyWater Iranian APT group has been discovered. Based on the PDB path, we named it Phoniex. Phoniex was used in attacks impersonating the Hungary government and Netivtech, an Israeli company IoCs: Sha256: 
          
                
                0
              
              
                
                15
              
              
                
                46
              
             ClearSky discovered in early April a Yemeni/Houthi influence campaign operating in Israel, Saudi Arabia, and the UAE. In 2019, we first exposed the campaign. It continues to operate in a similar manner to what we uncovered in 2019. Between 2019 and 2022, the campaign focused 
          
                
                1
              
              
                
                7
              
              
                
                59
              
             ClearSky Cyber Security has been tracking a campaign active since December 2024, potentially targeting Ukrainian soldiers. The attack begins with an SMS or Whatsapp message containing a ZIP file that includes malicious LNK shortcuts. These LNK files act as droppers, downloading 
          
                
                1
              
              
                
                4
              
              
                
                22
              
             ClearSky Cyber Security has discovered a UI vulnerability in Microsoft Windows. This vulnerability is actively exploited by a suspected Chinese APT group - Mustang Panda. When files are extracted from compressed “RAR” files they are hidden from the user. If the compressed files 
          
                
                13
              
              
                
                75
              
              
                
                250
              
             A new infrastructure for the Russian information warfare campaign named Doppelgänger has been discovered by ClearSky. “Doppelgänger” (meaning an exact but usually invisible replica) is a global information warfare campaign publishing false information on fake websites and social 
          
                
                2
              
              
                
                36
              
              
                
                185
              
             A new zero-day vulnerability, CVE-2024-43451, was discovered by ClearSky. This vulnerability affects Windows systems and was actively exploited in attacks against Ukrainian entities. The malicious URL files were disguised as academic certificates and were initially observed 
          
                
                2
              
              
                
                32
              
              
                
                152
              
             ClearSky Cyber Security research identified a campaign named “Iranian Dream Job”, in which the Iranian threat actor TA455 targeted the defense sector by offering fake jobs. The campaign distributed the SnailResin malware, which activates the SlugResin backdoor. ClearSky 
          
                
                2
              
              
                
                21
              
              
                
                281
              
             The Iranian APT group MuddyWater is attacking Saudi Arabian organizations using PDQ Connect RMM software and internxt[.]com storage services ITW: hxxps[://]share[.]eu[.]internxt[.]com/d/sh/file/763a0e5 
          
                
                2
              
              
                
                25
              
              
                
                75
              
             Using a new RMM tool "PDQ Connect" MuddyWater impersonated to: MKK from Turkey, a Jordanian company "Offtec" and IDF: offtecportal[.]egnyte[.]com 750308da76cbff35ee548f23439bc0d8 6780e3b13029ac58c96e3e59c0535d42 2690694b348358c9d1261db2e64ae5ef 29aa13acd46472b62cc0fbaa4c94062e 
          
                
                11
              
              
                
                39
              
              
                
                1K
              
             Checkpoint published a report matching our findings of a new backdoor deployed in recent MuddyWater campaigns. Thanks for your credit @CheckPointSW
             https://t.co/iLr2wjHTnU 
          
          
            
            research.checkpoint.com
              Key Findings Introduction MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and Security (MOIS), is known to be active since at least 2017. During the last year,...
            
                
                0
              
              
                
                0
              
              
                
                7
              
             The Iranian APT group MuddyWater is targeting Azerbaijan with a new loader, named by us as "BackConnect" downloadfile[.]egnyte[.]com fileuploadcloud[.]egnyte[.]com 85[.]239.61.97 dda1c7d21118ccb6e7fb4b7a02e53db3 e7df84a5a22aeafcf1c3abf4fd986c91 dac03401c2cc284148a60bc88fbdf8bd 
          
                
                3
              
              
                
                12
              
              
                
                85
              
             Iranian APT group MuddyWater impersonated Airpaz to target more Egyptian companies Egnyte url: airpaz[.]Egnyte[.]com Egnyte User: manara[.]edu[.]sy 15941e167f258c0d78d01aa6fa2fea19 9c63b57d1250cd89fbd82ae2b4062aa3 d1e400e1e8100872d1f0f6a4f99eb51d a46206daae98334e47e178bc718d9baf 
          
                
                2
              
              
                
                11
              
              
                
                110
              
             Using an impersonation of Cairo International Airport, the Iranian MuddyWater APT group targeted a Jordanian company Egnyte url: Cairoairport[.]Egnyte[.]com MD5: b77259eb3279ef1f5eb7cfae7d818ff1 0993e8ffdc69c202e56b8070a0ceb8cd 
          
                
                9
              
              
                
                19
              
              
                
                165
              
             We have identified a change in the primary domain used in the Doppelganger campaign, Russian Cyberwarfare campaign. As of May 2024, it appears that the main root domain is cheekss[.]click instead of sdgqaef[.]site 
          
                
                11
              
              
                
                34
              
              
                
                251
              
             The Iranian MuddyWater APT group targeted Nour Communications from Saudi Arabia Egnyte url: nour[.]egnyte[.]com MD5: 5af57c7c7721519c0dc613a837f436c5 
          
                
                1
              
              
                
                8
              
              
                
                128
              
             Iran's MuddyWater APT group is suspected of targeting Turkey, Azerbaijan, Jordan, Saudi Arabia, and Israel. Egnyte urls: alkan[.]egnyte[.]com cnsmportal[.]egnyte[.]com c2: 91[.]235[.]234[.]202 146[.]19[.]143[.]14 md5: aded87fc07645e8fcecf622b3b1171d2 
          
                
                14
              
              
                
                99
              
              
                
                2K
              
             ClearSky and SentinelLabs have discovered a new wave of Doppelgänger campaign. The "Doppelgänger NG" campaign (meaning “spirit double”) spreads false information. We found a link between the "Doppelgänger NG" Campaign and the Russian group APT28.  https://t.co/k1kXRPFjoM 
          
          
                
                0
              
              
                
                3
              
              
                
                13