The Israel National Cyber Directorate (INCD) has issued a warning about a phishing attack targeting organizations in the country. The attack involves fake emails pretending to be F5 BIG-IP zero-day security updates, which are actually delivering data wipers to Windows and Linux devices. The phishing emails claim that the F5 BIG-IP zero-day vulnerability is being actively exploited and urge Israeli organizations to download and install a security update to prevent a network breach. The attackers, claiming to be a pro-Palestinian hacktivist group named Handala, asserted responsibility for the phishing attack, targeting multiple Israeli networks.
In response to the phishing emails, Windows users are prompted to download an executable file named “F5UPDATER.exe,” while Linux users receive a shell script named “update.sh.” Both files are designed to mimic F5 security update installers, displaying the company’s logo. However, these files actually deploy data wipers that attempt to erase data on the targeted computers. The Windows wiper displays a screen with the F5 logo and, when the “Update” button is clicked, sends a message to a Telegram channel and attempts to wipe the data from the computer. Similarly, the Linux wiper, implemented as a shell script, downloads necessary programs to wipe the computer, including xfsprogs, wipe, and parted.
While the data wipers encountered in BleepingComputer’s tests were somewhat buggy and did not consistently erase all data, the incidents highlight the ongoing challenge of destructive cyber attacks targeting Israel. Hacktivist groups, particularly those with pro-Palestinian affiliations, have frequently employed data wipers to disrupt operations and cause economic harm. As a general cybersecurity precaution, users are advised to exercise caution when downloading files from emails, ensuring they come from trusted sources, and only obtain security updates directly from hardware vendors rather than third-party sites.
It’s crucial for organizations and individuals to remain vigilant against phishing attacks, especially those employing tactics to exploit security concerns or zero-day vulnerabilities. Regularly updating security practices, educating users about potential threats, and implementing robust cybersecurity measures are essential components of safeguarding against such malicious activities.