doublepulsar.com
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: https://doublepulsar.com/cyber-toufan-goes-oprah-mode-with-free-linux-system-wipes-of-over-100-organisations-eaf249b042dc
Effective URL: https://doublepulsar.com/cyber-toufan-goes-oprah-mode-with-free-linux-system-wipes-of-over-100-organisations-eaf249b042dc...
Submission: On January 04 via api from TR — Scanned from DE
Effective URL: https://doublepulsar.com/cyber-toufan-goes-oprah-mode-with-free-linux-system-wipes-of-over-100-organisations-eaf249b042dc...
Submission: On January 04 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign in Write Sign up Sign in Mastodon Photo by Nazrin Babashova on Unsplash CYBER TOUFAN GOES OPRAH MODE, WITH FREE LINUX SYSTEM WIPES OF OVER 100 ORGANISATIONS Kevin Beaumont · Follow Published in DoublePulsar · 10 min read · 6 days ago 11 Listen Share For the past 6 or so weeks, I’ve been tracking Cyber Toufan on Telegram. They appeared in November, and they’ve been very busy and very naughty boys. They actually set up their infrastructure around October, and started owning things apparently undetected. They’re not a lame DDoS pretend hacktivist group like NoName016 — instead, they claim to be Palestinian state cyber warriors. (Might they be Iran? Who cares?). They target orgs with interests in Israel. They’ve been wiping systems — a lot of them — and dumping stolen data online. To lay it out, several factors got my attention as this being unusual: * They’re not ransomware or DDoS kids. * They’ve compromised a lot of orgs. * They’ve caused so much damage that many of the orgs — almost a third, in fact, haven’t been able to recover. Some of these are still fully offline over a month later, and the wiped victims are a mix of private companies and Israeli state government entities. * I am tracking 59 orgs where they have released data dumps, and a further 40 or so who got hit in a mass MSP (Managed Service Provider) wipe. * Three of the victims are cybersecurity vendors, and I suspect they may have access to another larger infosec vendor that they haven’t disclosed. * Data they have published includes a complete server disk image, SSL certificates with private keys to a host of domains (which still haven’t been revoked and are still in use), SQL and CRM dumps. Even Wordpress backups, as apparently people build CRMs on Wordpress nowadays (I’m old). Photo by Towfiqu barbhuiya on Unsplash THE PRIMARY VICTIMS > ACE Israel > Shefa Online > Israeli National Archive > Radware > MAX Security & Intelligence > Israel Innovation Authority > Ikea Israel > Berkshire eSupply > Keter Group > ISCAR Ltd > Homecenter Israel > Israel Nature and Parks > The Academic College of Tel Aviv > Lumenis > Toyota Israel > Back2School website of H&O > Israel Ministry of Health > SodaStream > Camel Griding Wheels > RESERVED > Seacret > Carter’s-Oshkosh Israel > Hagarin > H&O Fashion > Osem-Nestle > Bermad > ZapGroup Israel > Novolog Israel > Semicom > kravitz > Biopet > GS1 Israel > Audi Dagan Insurance Agency > Ministry of Welfare and Social Security > Scope Metals Group Ltd > SpaceX > Brother Israel > Graf > Dorot > CURVER > Techno-Rezef > Ta-Supply > NaanDan > US TOOLGROUP > Strauss Group > Zoko Enterprises > TEFEN Flow and Dosing Technologies Ltd > Erco > Teldor > SuperPharm > BConnect Technologies > Allot Ltd > Palram Industries Ltd > Israel Securities Authority > ICL Industrial > A.R.I. > Carolina Lemke > Maytronics Ltd > Israel State Payment Gateway Ones in bold are still offline. This does not include lots of smaller orgs who got wiped, as the list becomes too long to manage. Example org, CURVER: You may notice some tasty ones in there — for example, Allot — who sell TLS (encryption) middleware interception and safety equipment to telcos, ISPs and, Cyber Toufan allege, nation states via front companies — where the front company details themselves are listed. If you google Allot TLS, you’ll get the idea. Cyber Toufan appear to have been careful with targeting — with all of the victims, there’s a clear link to Israel and their objective. This isn’t a ‘spray and pray’ situation, and it looks like quite a lot of work has gone into things. I’ve seen discussion online that the victims are all customers of Signature-IT — however, from tracking it is not the whole picture. Many are — but many are not. A lot of them offer online shops. It is very clear that Signature-IT have been compromised, however, and are very much involved in what happened: So what’s happening really? It’s too early to say exactly what happened, but there’s several MSPs in common involved, and it seems likely there’s some kind of supply chain element — perhaps with a common DevOps library. For example, one victim org is Graf on December 16th: If you try visiting Graf’s website today, 12 days later, you will see the site is offline but the TLS certificate is via an Israeli company called Joomi: Cyber Toufan actually posted an animated GIF of themselves inside Joomi’s Bitbucket account the day before: Joomi’s Bitbucket repository is not publicly viewable, so clearly Cyber Toufan got into the chain somehow. Joomi describe themselves as: “Joomi Corporation, a software company specializing in developing open source systems” and online searches reveal they are tied into the Magento (online shop) ecosystem. Joomi are also using *drumroll* Signature-IT for hosting. WHAT DO THEY DO WHEN THEY GAIN ACCESS? From looking at victims, Cyber Toufan use Linux, and stay on Linux systems. This is smart as many orgs have little to no detection on Linux, but have invested in Windows detection instead. They do various things, including living off the land. For example, they use the legit tool shred to delete files in an unrecoverable fashion. They use their own shell script to run Shred, and configure it so it keeps running if an admin kill -9’s the process. They shred /. In terms of artefacts, they drop two scripts — initvm.sh (file hash 5accd9e0c215f9d10119ab8c6378e1a848b9f605955aa785f81c4a79ca0d93c0) and deploy.sh. There’s 0 AV vendor detection for these scripts, despite them wiping the root filesystem and evading termination. Additionally, they may deploy Tor in /var/lib/tor (including just using apt or yum to install it), and configure the server as a Tor hidden service — this allows them to retain remote access, as long as outbound traffic is allowed to Tor. So even if you firewall off all incoming network traffic, if outgoing traffic is allowed they can still reach back to the server. They will do light recon on the network for things like backup systems. WHERE DO THEY DUMP DATA, AND WHAT ELSE DO THEY DO? They dump data on Telegram. One modern challenge is many of the large hacking groups nowadays operate in the open on Telegram, in public Telegram groups. I think people think hackers are in hoodies, hiding everything they do. Not so: in the space year 2023, people hack with their wangs out, on Telegram. They also like to email the customers of victims. For example, they email customers of Signature-IT, Joomi, Radware and Max Security and Intelligence. Here’s an example email they sent to some customers: The customer information appears to be lifted from CRM backups (which they also post online). So if you’re following along, this is about 4 layers into the compromise. They appear to use the SMTP accounts of the victims to send the emails, so they’re less likely to get flagged as spam — for example, with one campaign they used the Sendgrid account of a cybersecurity vendor. These are not phishing emails — there’s no credential theft or malware — but they’re lobbying emails. Yes, hacks now lead to *checks notes* war lobbying. I’ll be honest, I’m not sure what Jennifer from Accounts Payable at a company 4 times removed is going to do about Gaza, but it’s certainly a novel way to raise awareness. Additionally, the include everybody in the To: fields of the emails rather than BCC — this encourages people to Reply To All storm. WHAT NOW? Cyber Toufan appear to have stopped for now. They finished with an image of some data from ecom.gov.il, the Israel State Payment Gateway. It appears Toufan obtained access around October. LESSONS TO BE LEARNT * Monitor Linux systems, both anti-malware and EDR (endpoint detection and response). For example, you should have use cases to detect Tor being installed or used — along with shred being executed. * Control outbound network connectivity from Linux. For example, your Linux boxes shouldn’t be reaching outbound to Tor nodes. * Look for abnormally large volumes of network traffic from hosts. * Invalidate stolen TLS certificates and move to fresh ones. * Risk assess your MSPs. Your MSPs are risky during times of war. They are single points of hacking. If your MSP gets compromised, you may find people reaching out to you or your customers and you may find yourself without backups and service. * You may want to manage your own additional backups of the services your MSPs provide during heightened risks. * There is an incredible lack of knowledge in the cybersecurity industry around what happened here, despite it being a fairly big, ongoing incident involving over 100 organisations, including multiple areas of the Israeli government — hence me writing this blog. That seems odd. Stay safe. ~g Update 29th December 2023: I have confirmed the latest email that Cyber Toufan sent to security and infrastructure people, titled “Warning | The Cost of Complicity”, sent with from address of intel@max-security.com, was indeed sent to people in Radware’s customer and sales database, as Cyber Toufan had claimed. The sending SMTP email server is from Max Security — both security companies had a breach. Update 30th December 2023: Cyber Toufan are still active and breaching orgs. They have emailed the customers of PTS — Production Tool Supply aka pts-tools.com, a Berkshire Hathaway company, the following message: > Dear Customers, > > These are the hackers speaking. Yes, the ones responsible for wiping out and > obtaining all the data of PTS Tools almost two months ago. PTS Tools sent out > an email about the incident two weeks ago, trying to slither their way out of > responsibility, and claiming that their systems weren’t truly compromised. We > thought we’d set the record straight ourselves, and come to you from their > very own mailing systems. > > PTS Tools claims we only compromised a third-party, and that we don’t have all > of their clients’ data. That is far from the truth. We have 100s of GBs of > client data, including all customer details, orders, and shipments ever > handled by PTS Tools. It is either that PTS Tools knows we have all this data, > in which case they are unashamedly lying to you, or they are still clueless to > the scale of the compromise. We will let you decide which is worse. > > Okay, we understand why you wiped out the Israeli National Archive, the State > Payment Gateway, Ikea Israel, Toyota Israel, the Israeli cyber security firms > Radware and MAX Security & Intelligence, as well as hundreds of other Israeli > companies. But why did you choose to wipe out the servers and databases of PTS > Tools, Berkshire E-Supply, IMC, and ISCAR (and their backups)? > > The answer is quite simple. Every single one of these companies either has a > large office/HQ in Israel, or has chosen to sign huge financial contracts with > Israeli entities. Doing business with Israel is complicity in the crimes it is > currently committing, including the cold blooded murder of over 9,000 of our > children. 9,000 dead children is equivalent to death toll of three 9/11’s, > except every dead body is that of a lifeless infant or child. > > Let it be clear: There will be no mercy for the complicit. Any organisation or > entity that chooses to support those occupying our land and killing our > children, whether financially, politically, or through any other means, is > choosing to put themselves in the line of fire. Let this be a warning, and let > PTS Tools and Berkshire E-Supply (which is still down almost two months later) > be a lesson for those that wish not to entangle their businesses in the murder > of our children and the destruction of their companies. > > Indeed, any entity that chooses to continue in their complicity will certainly > pay the price of complicity in the killing of our children. PTS themselves had previously emailed customers about a “cyber-attack” in November: Update 31st December 2023: Berkshire eSupply have filed a data breach notification in Maine: Update 1st January 2024: Berkshire eSupply’s attachment to the Maine Attorney General in their data breach notification claims: It goes on to say “Although data stored in our information systems was not accessed, and even though we were not directly involved in this incident, we continue to monitor this incident and its effect on our customer community.” To be clear, Berkshire eSupply’s own customer information, including addresses and such, was lost in the breach and is still publicly available on Cyber Toufan’s Telegram channel to this day, in plain text — and the way Berkshire eSupply are opting to deal with the issue is wordsmith it to the Attorney General. SIGN UP TO DISCOVER HUMAN STORIES THAT DEEPEN YOUR UNDERSTANDING OF THE WORLD. FREE Distraction-free reading. No ads. Organize your knowledge with lists and highlights. Tell your story. Find your audience. Sign up for free MEMBERSHIP Access the best member-only stories. Support independent authors. Listen to audio narrations. Read offline. Join the Partner Program and earn for your writing. Try for $5/month Cybersecurity News Cyber Toufan 11 11 Follow WRITTEN BY KEVIN BEAUMONT 5.5K Followers ·Editor for DoublePulsar Everything here is my personal work and opinions. Follow MORE FROM KEVIN BEAUMONT AND DOUBLEPULSAR Kevin Beaumont in DoublePulsar WHAT IT MEANS — CITRIXBLEED RANSOM GROUP WOES GROW AS OVER 60 CREDIT UNIONS, HOSPITALS… HOW CITRIXBLEED HAS BECOME THE CYBERSECURITY CHALLENGE OF 2023. 9 min read·Dec 4, 2023 100 2 Kevin Beaumont in DoublePulsar THE TICKING TIME BOMB OF MICROSOFT EXCHANGE SERVER 2013 WELCOME TO THE NEW ERA OF CYBERSECURITY — WHERE THE BONFIRE OF ORGANISATIONS RUNNING END OF LIFE SOFTWARE BY RANSOMWARE GROUPS IS STARTING. 6 min read·Dec 22, 2023 5 Kevin Beaumont in DoublePulsar LOCKBIT RANSOMWARE GROUP ASSEMBLE STRIKE TEAM TO BREACH BANKS, LAW FIRMS AND GOVERNMENTS. A LOOK INSIDE HOW A RANSOMWARE GROUP HAVE BEEN BREAKING INTO THE WORLD’S BIGGEST ORGANISATIONS THIS NOVEMBER. 5 min read·Nov 13, 2023 139 Kevin Beaumont in DoublePulsar TRACKING RUSSIA’S NONAME057[16] ATTEMPTS TO DDOS UK PUBLIC SERVICES A LOOK INSIDE HOW RUSSIAN’S CYBER ARMY ATTEMPTS TO ATTACK SERVICES. 2 min read·Dec 7, 2023 9 See all from Kevin Beaumont See all from DoublePulsar RECOMMENDED FROM MEDIUM Helen Patton THE END OF CYBERSECURITY IN 2023 WILL 2024 BE A YEAR OF NEW THINGS? ·4 min read·Dec 25, 2023 328 9 Kevin Beaumont in DoublePulsar THE TICKING TIME BOMB OF MICROSOFT EXCHANGE SERVER 2013 WELCOME TO THE NEW ERA OF CYBERSECURITY — WHERE THE BONFIRE OF ORGANISATIONS RUNNING END OF LIFE SOFTWARE BY RANSOMWARE GROUPS IS STARTING. 6 min read·Dec 22, 2023 5 LISTS STAFF PICKS 547 stories·598 saves STORIES TO HELP YOU LEVEL-UP AT WORK 19 stories·396 saves SELF-IMPROVEMENT 101 20 stories·1146 saves PRODUCTIVITY 101 20 stories·1047 saves Erxk in ITNEXT BOOST PRODUCTIVITY WITH GIT WORKTREES A SHORT & CONCISE GUIDE ON GETTING PRODUCTIVE WITH GIT WORKTREES. 4 min read·Dec 27, 2023 132 MS17-010🛡️ HOW I DISCOVERED AN RCE VULNERABILITY IN TESLA, SECURING A $10,000 BOUNTY MYSELF: I AM RAGURAMAN , SECURITY RESEARCHER 🛡️ | BUG HUNTER | CTF PLAYER | SECURED @ TESLA,APPLE,AMAZON,ORACLE & MORE 4 min read·Dec 24, 2023 1.3K 16 Aymen El Amri in FAUN — Developer Community 🐾 THE HOTTEST OPEN SOURCE PROJECTS OF 2023 THIS ARTICLE WAS ORIGINALLY POSTED ON FAUN.DEV. ·14 min read·6 days ago 1K 7 Nikita Singh in ILLUMINATION A MAN IN HIS 60S REVEALS SECRETS TO STOP AGING 6 PRINCIPLES KEEPING HIM FOREVER YOUNG ·5 min read·Dec 25, 2023 3.8K 85 See more recommendations Help Status About Careers Blog Privacy Terms Text to speech Teams To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.