Israel Shuts Down Police Computers After Cyber Attack
Israel authorities have banned its police force from connecting to the Internet and from using any external memory disks or sticks in an effort to curb a cyber-attack.
According to report, a malware infection was detected last week, which may also be loaded via USB or memory stick, leading the authorities to take measures against infecting their computer systems.
Police are investigating who is behind the tip and whether the virus is real. A possible second virus called Benny Gantz-55 – named after Benny Gantz, Israel’s Chief of General Staff, is reportedly targeting Foreign Ministry computers.
The malicious emails contained the subject line “IDF strikes militants in Gaza Strip following rocket barrage”, and sent into the organization via a .RAR compressed file attached to an email. The email was sent from the email address bennygantz59@gmail.com.
Security company Trend Micro after investigating samples of the malware suggested that the initial target of the attack was systems within the Israeli Customs agency.
“Based on our analysis, this backdoor is an Xtreme remote access Trojan (RAT) that, like all RATs, can be used to steal information and receive commands from a remote attacker,” Ivan Macalintal, a threat research manager at Trend Micro explains. “The Xtreme RAT appears to have been used in previous attacks targeting Syrian anti-government activists.”
Trend Micro also reported that newest Xtreme RAT version has Windows 8 compatibility, improved Chrome and Firefox password grabbing, and improved audio and desktop capture capabilities features.
Roni Bachar, head of Israeli security firm Avnet said that servers of police department might have been hacked for up to a week before the outbreak was detected but the damage may already have been done.
“It was only late Wednesday night that police realized what happened and ordered that computers be taken offline,” Bachar said. “Apparently the virus was also distributed to other government departments.”
Israel recently set up a cyber-terror task force to stop attacks on its computer system. There have been a number of reports of attempted cyber-attacks in the last several months, including attempt to gain access to Bank Hapoalim’s computer system, wake of Stuxnet, Sony, Citibank, the US National Weather Service and other security stories.
“We have seen RAT-style attacks infiltrating everything from governments to corporate espionage,” says HackANGLE editor Kyt Dotson. “The tactic works best when security is bypassed Trojan style by getting an employee to unwittingly carry the malicious program into the facility either in a piece of equipment (like a mouse or a power strip) or accepting it in an e-mail as in spear-phishing. No doubt, we’ll see an increase in these tactics to infect networks.”
Remote Access Trojans (RATs) provide hackers with unlimited access to infected endpoints. Using the victim’s access privileges, cybercriminals can steal business and personal data. RATs are used to steal information through manual operation of the endpoint on behalf of the victim.
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.