×
ItalianoEnglish
Set as default language

Grandangolo Communications

  • Home
  • Company
  • Services
    • Public Relation
    • Digital PR
    • Marketing
    • Lead Generation
    • Events
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages
  • Home
  • Customer Press Room
  • Eset
  • ESET Research discovers watering hole attacks on Middle Eastern websites linked to Candiru spyware

Customer Press Room

ESET Research discovers watering hole attacks on Middle Eastern websites linked to Candiru spyware

by Grandangolo Communications / Friday, 19 November 2021 / Published in Eset

ESET publishes new research into a strategic web hacking campaign targeting media, government, internet service provider and aerospace/military technology company sites, with links to the Middle East and a strong focus on Yemen and the local conflict.

Researchers of ESET, a global leader in the cybersecurity market, have uncovered strategic web compromise (watering hole) attacks against high-profile sites in the Middle East, with a strong focus on Yemen. The attacks are linked to Candiru, a company that sells cutting-edge offensive software tools and related services to government agencies. The affected websites belong to media outlets in the United Kingdom, Yemen and Saudi Arabia, as well as Hezbollah; to government institutions in Iran (Ministry of Foreign Affairs), Syria (including the Ministry of Electricity) and Yemen (including the Ministries of the Interior and Finance); to internet service providers in Yemen and Syria; and aerospace/military technology companies in Italy and South Africa. The attackers also created a website that mimicked a medical industry event in Germany.

A watering hole attack compromises websites that are frequented by targets of interest, thus opening the door to compromising the computer of the user who is visiting the site. In this campaign, specific visitors to these websites were likely attacked via a browser exploit. However, ESET researchers have not tracked down either an exploit or the final payload. This shows that the threat actors have chosen to narrow the focus of their operations and do not want to burn their zero-day exploits, demonstrating how highly targeted this campaign is. Compromised websites are only used as a starting point to achieve final goals.

“Back in 2018, we developed a customized internal system to discover watering holes on high-profile websites. On July 11, 2020, our system notified us that the website of the Iranian Embassy in Abu Dhabi had been contaminated with malicious JavaScript code. Our curiosity was piqued by the high-profile nature of the targeted website, and in the following weeks we noticed that other websites with links to the Middle East had also come into the attackers' sights,” he says Matthieu Faou, researcher at ESET who discovered the watering hole campaigns.

“The group remained quiet until January 2021, when we observed a new wave of compromises. This second wave lasted until August 2021, when all websites were cleaned again like in 2020 – probably by the same authors,” he adds.

“The attackers also imitated a website belonging to the World Forum for Medicine held in Düsseldorf, Germany. The operators cloned the original website and added a small sliver of JavaScript code. It is likely that the attackers were unable to compromise the legitimate website and had to create a fake one to inject their malicious code,” explains Faou.

During the 2020 campaign, the malware monitored the operating system and web browser. Since the selection process was based on computer software, the campaign did not target mobile devices. In the second wave, to be less noticeable, the attackers began to modify the scripts that were already present on the compromised websites.

“In a blog post on Candiru by Citizen Lab at the University of Toronto, the section called ‘A Saudi-Linked Cluster?’ mentions a spearphishing document that was uploaded to VirusTotal and multiple domains operated by the attackers. The domain names are variations of genuine URL shorteners and analysis websites, and the technique is the same as the one used for domains analyzed in watering hole attacks,” explains Faou, linking the attacks to Candiru.

There is, therefore, a significant probability that the operators of the watering hole campaigns are Candiru customers. It is also possible that the document creators and the watering hole operators are the same. Candiru is a private Israeli spyware company that was recently added to the US Department of Commerce's Entity List. This limits US-based organizations from doing business with Candiru without first obtaining authorization from the Department of Commerce.

ESET has not detected activity from this operation since late July 2021, shortly after the publication of blog posts by Citizen Lab, Google and Microsoft detailing Candiru's activities. The operators appear to have taken a break, probably to readjust and make their campaign more covert. ESET Research expects new activity in the coming months.

For more technical details on these attacks against websites in the Middle East, see the blogpost Strategic web compromises in Middle East with a pinch of Candiru su WeLiveSecurity.

Tagged under: Candiru, cybersecurity, Eset

About Grandangolo Communications

What you can read next

ESET starts Allnet.Italia to expand the distribution ecosystem to small and medium-sized enterprises
ESET Threat Intelligence data feeds improve visibility for users of the Microsoft Sentinel SIEM/SOAR platform
The Summer School brought together world-class expertise in the field of artificial intelligence in Slovakia

Customer Press Room

  • VERTIV presents the range of overhead prefabricated infrastructures on a global level, to accelerate the implementation of data centers

    VERTIV ™ Smartrun facilitates installation ...
  • Axiante is a partner of the "Virtual Job Meeting Stem Girls" event

    Participation in the initiative dedicated to ...
  • Vertivia enhances the pre-engineered solution of data centers for EMEA Edge Computing to promote energy efficiency and fastest on-site installations

    La nuova soluzione Vertiv™ SmartAisle&#x...
  • ESET expands the Cyber ​​Threat Intelligence: new feeds and APT reports for companies of all sizes

    Announced at ESET World 2025, the expansion of ...
  • Sentinelone gives a change to the role of partners with the new Global Partnerone Program

    The program provides partners with the tools, ...

Archives

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018

Categories

  • A10
  • Abstract
  • abstract
  • Acronis
  • Ally Consulting
  • Arrow
  • Arrow Electronics
  • Axiante
  • Babel
  • Computer Center
  • Cohesity
  • Italy Cloud Consortium
  • Consys
  • D-Link
  • Eset
  • G.B. Service
  • Habble
  • HiSolution
  • HYCU
  • Icos
  • Information Tecnology
  • Ivanti
  • Link11
  • MobileIron
  • Netalia
  • Nethive
  • Nexthink
  • Nuvis
  • Praim
  • QAD
  • Qualys
  • Red Hot Cyber
  • Riverbed
  • Saviynt
  • Sensormatic
  • SentinelOne
  • Talent Software
  • Vectra
  • Vectra AI
  • Vertiv

Office printing, digital PR, marketing, lead generation: all projects are born from our passion and expertise, with an inevitable touch of creativity and innovation.

COMPANY

Grandangolo Communications Srl
Via Sardegna 19
20146 Milano
Telephone +39 335 8283393
info@grandangolo.it

I SERVIZI

  • Home
  • Company
  • Services
  • Best Practice
  • Customer Press Room
  • Contacts
  • Languages

CONTACTS

  • Contacts
  • Cookie policy
  • Privacy policy

© 2019 GRANDANGOLO COMMUNICATIONS SRL | P.IVA IT 06394850967 | All rights reserveD.

Powered by Webpowerplus

TOP