DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

Cyber Espionage in North Africa

June 9, 2023
Reading Time: 2 mins read
in Alerts

A new cyber espionage campaign is underway in North Africa, featuring a custom backdoor called Stealth Soldier. Cybersecurity company Check Point has identified the backdoor as part of a set of highly-targeted attacks. Stealth Soldier primarily functions as a surveillance tool, capable of conducting activities such as file exfiltration, screen and microphone recording, keystroke logging, and browser information theft.

The attackers behind the ongoing operation have employed command-and-control servers that mimic websites associated with the Libyan Ministry of Foreign Affairs. The campaign traces back to artifacts dating as early as October 2022. The initial stage of the attacks involves the download of fake downloader binaries, delivered through social engineering tactics, which act as a conduit for retrieving the Stealth Soldier backdoor. Simultaneously, a decoy empty PDF file is displayed to mislead the target.

Stealth Soldier is a modular implant that enables surveillance capabilities through various means. It collects directory listings and browser credentials, records keystrokes, captures screenshots, uploads files, and executes PowerShell commands. Check Point discovered three versions of the backdoor, indicating that it is actively maintained by its operators. Some components of the malware are no longer retrievable, but the screen capture and browser credential stealer plugins were found to be inspired by open source projects on GitHub.

Interestingly, the infrastructure used by the Stealth Soldier campaign overlaps with infrastructure associated with a previous phishing campaign called Eye on the Nile, which targeted Egyptian journalists and human rights activists in 2019. This suggests a possible re-appearance of the same threat actor, indicating a focus on surveillance against Egyptian and Libyan targets.

Check Point warns that due to the modularity of the malware and the use of multiple stages of infection, the attackers are likely to continue evolving their tactics and deploying new versions of the Stealth Soldier backdoor in the near future.

Read More

Tags: AlertsAlerts 2023BackdoorsCheck PointCredentialesEgyptespionageInfostealersJournalistsJune 2023KeystrokesLibyaMalwareNorth AfricaStealth Soldier
3
VIEWS
ADVERTISEMENT

Related Posts

ZenRAT Malware Targets Windows Users

ZenRAT Malware Targets Windows Users

September 26, 2023
Critical JetBrains TeamCity Vulnerability

Critical JetBrains TeamCity Vulnerability

September 26, 2023
EvilBamboo’s Spyware Campaign

EvilBamboo’s Spyware Campaign

September 26, 2023
OpCanada Cybersecurity Concerns

OpCanada Cybersecurity Concerns

September 26, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Alerts

GitLab’s Critical Pipeline Vulnerability

September 20, 2023
Incidents

Thai Financial Platform CardX Data Breach

September 18, 2023
Alerts

npm Registry Faces Fresh Malware Wave

September 21, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.