Overview
Researchers at Palo Alto Networks’ Unit 42 recently came across a campaign which focuses on transportation and shipping firms operating out of Kuwait in the Persian Gulf.
The malicious campaign is using previously unknown tools, and has been active since at least May 2019. The threat intelligence experts also suspect the attack may have some connection to incidents that occurred last year between July 2018 to December 2018.
These cyber-assaults come amid intensified situations in the Middle East, which have recently witnessed attacks on tankers and an oil refinery.
Blast from the past
The earlier attacks used a tool called Sakabota, which researchers address it to be a previous version of Hisoka. “Our analysis of the two campaigns revealed that Sakabota is the predecessor to Hisoka, which was first observed in May 2019,” said Palo Alto Networks researchers in an advisory.
It revealed that the Hisoka tool shared a major portion of code from Sakabota, which had led the team to believe that Hisoka evolved from Sakabota’s codebase.
“The number of functions and variable names are the same in both Sakabota and Hisoka, which infers that the same developer created both and spent little effort trying to hide this lineage,” read the advisory.
The 2018 attacks were reported by IBM’s X-Force IRIS security group as well.
The recent story
The campaign has been dubbed as xHunt because both names (Hisoka and Sakabota) are derived from the Japanese anime series Hunter x Hunter.
Indicators of Compromise
All indicators associated with these activities can be found in the GitHub repository here.
Publisher