What's new

New Moses Staff group targets Israeli organizations in destructive attacks

Muhammed45

ELITE MEMBER
Joined
Oct 2, 2015
Messages
10,321
Reaction score
-18
Country
Iran, Islamic Republic Of
Location
Iran, Islamic Republic Of
New Moses Staff group targets Israeli organizations in destructive attacks
Moses-Staff-746x378.png


A new hacking group named Moses Staff has attacked Israeli organizations, breached their networks, encrypted their data, but has then refused to negotiate ransom payments, in what security researchers are describing as politically-motivated destructive attacks.

First spotted in early October 2021, the group is the third entity of its kind that has exclusively attacked Israeli organizations in recent months, after the Pay2Key and Black Shadow groups.

But according to a report published today by Israeli security firm Check Point, Moses Staff behaves differently from the previous two.

Instead of trying to hide their attacks and subsequent data leaks as failed ransomware negotiations, Moses Staff openly admits that their intrusions are politically motivated.

According to a message posted on a website the group operates on the dark web, Moses Staff openly admits to targeting the Israeli Zionist regime in support of the occupied Palestine territories.

As a result, the group often encrypted and then leaked a victim’s data without even attempting to engage in a ransom negotiation process.

According to Check Point researchers, who have got a chance to investigate the group’s past attacks, Moses Staff operates using the following patterns:

  • The group breaches victims’ networks by exploiting old vulnerabilities that have been left unpatched.
  • Past intrusions have been linked to unpatched Microsoft Exchange servers.
  • Once they breach a system, the group use tools like PsExec, WMIC, and Powershell to move deeper inside the victim’s network.
  • The group then steals sensitive information from the victim’s network before encrypting its data.
  • Moses Staff typically deploys the open-source DiskCryptor library to perform volume encryption and lock the victims’ computers with a bootloader that won’t allow the machines to boot without the correct password. Even if a correct password is provided, the data is still encrypted once the system boots.
  • Check Point said that both the boot password and the encryption key could be recovered in certain circumstances.
  • The hackers also operate a Telegram channel and Twitter account where they announce new victims they add to their leak site.
Check Point researchers declined to attribute the group to any specific country, lacking any concrete evidence; however, they did point out that some samples of the group’s malware had been submitted to the VirusTotal web malware scanner from Palestine IP addresses months before Moses Staff’s first attack.

So far, Moses Staff has listed 16 victims on their leak site. At the time of writing, the group is still active, having announced the Unit 8200 leak this past Saturday and a leak of a 3D image map of Israel allegedly obtained from the Israeli government itself on Sunday.

 
Here the lication of sensitive buildings in Israel is accessible with an accuracy of below 5 CM.
More importnatly these locations are exposed on a 3D mode proving that Israelis themselves have made these highly classified secret files.

In the released video, images and maps of critical facilities are shown and it is announced that these are examples of accurate images that were recently obtained after the hacking of the cyber infrastructure of the Zionist regime; This is a failure for Tel Aviv cybersecurity.

The accuracy of the published 3D images is five centimeters and was prepared by the Zionists themselves. The size of the files, images and 3D maps of occupied Palestine obtained by the hacker group is 22 TeraBytes.

On November 6, the hacker group also attacked the information servers of Israeli companies, revealing documents such as identity cards, lawyers' attorneys, checks, financial reports, etc. obtained during the hacking attack.
3312525.jpg
3312523.jpg


Files released during the initial attack by the hackers of Moses staff also included pictures of Israeli War Minister Bani Gantz and Israeli soldiers and Gantz's 2010 letter to the Joint Chiefs of Staff and Chief of Intelligence of the Jordanian Armed Forces.

The leaked files also contained excel files that apparently contained the names, national codes, emails, addresses, telephone numbers and even the socioeconomic status of soldiers, pre-Zionist students and people associated with the Zionist Ministry of War.

Following these events, the Zionist newspaper Yedioth Ahronoth published a report on the statements of the regime officials and wrote that Israel is not ready to face the threat of cyber attacks.

"The most important threat to Israel at this stage revolves around cyber attacks on economic and civil institutions," said Aviv Kochavi, chief of staff of the Israeli army, in a speech to the Knesset Committee on Foreign Affairs and Defense.
 
Now keeping in mind that Hezbollah possesses the most accurate ballistic missile of Middle East, a Syrian variant of Fateh-110 missile, they don't need to launch hundreds of thousands of missiles into Israel in order to cripple its vital infrastructures but only almost 1200 accurate missiles of this radar evading quasi ballistic missile plus cruise missiles would be enough to cut Off the throat of this evil creature in the Middle East.


Israeli dogs have sensed the threat already :lol:
12316838_609.jpg
 
Now keeping in mind that Hezbollah possesses the most accurate ballistic missile of Middle East, a Syrian variant of Fateh-110 missile, they don't need to launch hundreds of thousands of missiles into Israel in order to cripple its vital infrastructures but only almost 1200 accurate missiles of this radar evading quasi ballistic missile plus cruise missiles would be enough to cut Off the throat of this evil creature in the Middle East.


Israeli dogs have sensed the threat already :lol:
Loooool they are barking.
I hope the start by a massive strike on all airbase and dimona nuclear plant
 

US & Israel launch joint cybersecurity force

:sarcastic::sarcastic:

This solely proves that the attack was so severe and successfuly managed, that Israeli dogs are begging for help.
 
this is nothing , one or 2 small attacks on small organization doesnot count. Israel has openly killed people in other countries , and they can reach
its easy to attack than to defend cyber attack.
also it takes too much time prepare and create an attack as well. and new firewalls arent easy to bypass either.

these people will be hunted down within a month silently. only an idiot will claim an attack
 
this is nothing , one or 2 small attacks on small organization doesnot count. Israel has openly killed people in other countries , and they can reach
its easy to attack than to defend cyber attack.
also it takes too much time prepare and create an attack as well. and new firewalls arent easy to bypass either.

these people will be hunted down within a month silently. only an idiot will claim an attack
Attacks on Israel doesn't only include cyber attacks, they have lost tens of their intelligence forces in Eebil of Iraq. Their prominent nuclear scientist and former head of Israeli Space Agency was burnt alive, their ships can't enter Arabian sea etc.

In the meantime
Moses Staff released images of 16 Israeli intelligence officers.
3312230.jpg


This is a huge intelligence and security incident in the history. It includes the war minister of Zionist regime and thousands of high ranking military officers.
 
Last edited:
I like logo and the name lol but shouldn't the name have been "Moses' Staff" if any grammar expert can comment on this?
 
Back
Top Bottom