/*! elementor-pro - v3.26.0 - 17-12-2024 */
(()=>{"use strict";class Screenshot extends elementorModules.ViewModule{getDefaultSettings(){return{empty_content_headline:"Empty Content.",crop:{width:1200,height:1500},excluded_external_css_urls:["https://kit-pro.fontawesome.com"],external_images_urls:["https://i.ytimg.com"],timeout:15e3,render_timeout:5e3,timerLabel:null,timer_label:`${ElementorScreenshotConfig.post_id} - timer`,image_placeholder:"data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=",isDebug:elementorCommonConfig.isElementorDebug,isDebugSvg:!1,...ElementorScreenshotConfig}}getDefaultElements(){const e=jQuery(ElementorScreenshotConfig.selector),t=e.find(".elementor-section-wrap > .elementor-section, .elementor > .elementor-section");return{$elementor:e,$sections:t,$firstSection:t.first(),$notElementorElements:elementorCommon.elements.$body.find("> *:not(style, link)").not(e),$head:jQuery("head")}}onInit(){return super.onInit(),this.log("Screenshot init","time"),this.timeoutTimer=setTimeout(this.screenshotFailed.bind(this),this.getSettings("timeout")),this.captureScreenshot()}captureScreenshot(){return this.elements.$elementor.length||(elementorCommon.helpers.consoleWarn("Screenshots: The content of this page is empty, the module will create a fake conent just for this screenshot."),this.createFakeContent()),this.removeUnnecessaryElements(),this.handleIFrames(),this.removeFirstSectionMargin(),this.handleLinks(),this.loadExternalCss(),this.loadExternalImages(),Promise.resolve().then(this.createImage.bind(this)).then(this.createImageElement.bind(this)).then(this.cropCanvas.bind(this)).then(this.save.bind(this)).then(this.screenshotSucceed.bind(this)).catch(this.screenshotFailed.bind(this))}createFakeContent(){this.elements.$elementor=jQuery("
").css({fontSize:"85px"}).html(this.getSettings("empty_content_headline"))),document.body.prepend(this.elements.$elementor)}loadExternalCss(){const e=[this.getSettings("home_url"),...this.getSettings("excluded_external_css_urls")].map((e=>`[href^="${e}"]`)).join(", ");jQuery("link").not(e).each(((e,t)=>{const s=jQuery(t),n=s.clone();n.attr("href",this.getScreenshotProxyUrl(s.attr("href"))),this.elements.$head.append(n),s.remove()}))}loadExternalImages(){const e=this.getSettings("external_images_urls").map((e=>`img[src^="${e}"]`)).join(", ");jQuery(e).each(((e,t)=>{const s=jQuery(t);s.attr("src",this.getScreenshotProxyUrl(s.attr("src")))}))}handleIFrames(){this.elements.$elementor.find("iframe").each(((e,t)=>{const s=jQuery(t),n=jQuery("",{css:{background:"gray",width:s.width(),height:s.height()}});s.before(n),s.remove()}))}removeUnnecessaryElements(){let e=0;this.elements.$sections.filter(((t,s)=>{let n=!1;return e>=this.getSettings("crop.height")&&(n=!0),e+=jQuery(s).outerHeight(),n})).each(((e,t)=>{t.remove()})),this.elements.$notElementorElements.remove()}handleLinks(){elementorCommon.elements.$body.find("a").attr("href","/")}removeFirstSectionMargin(){this.elements.$firstSection.css({marginTop:0})}createImage(){const e=new Promise((e=>{window.addEventListener("load",(()=>{e()}))})),t=new Promise((e=>{setTimeout((()=>{e()}),this.getSettings("render_timeout"))}));return Promise.race([e,t]).then((()=>{if(this.log("Start creating screenshot."),this.getSettings("isDebugSvg"))return domtoimage.toSvg(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}).then((e=>this.download(e))),Promise.reject("Debug SVG.");return/^((?!chrome|android).)*safari/i.test(window.userAgent)?(this.log('Creating screenshot with "html2canvas"'),html2canvas(document.body).then((e=>e.toDataURL("image/png")))):(this.log('Creating screenshot with "dom-to-image"'),domtoimage.toPng(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}))}))}download(e){const t=jQuery("",{href:e,download:"debugSvg.svg",html:"Download SVG"});elementorCommon.elements.$body.append(t),t.trigger("click")}createImageElement(e){const t=new Image;return t.src=e,new Promise((e=>{t.onload=()=>e(t)}))}cropCanvas(e){const t=this.getSettings("crop.width"),s=this.getSettings("crop.height"),n=document.createElement("canvas"),i=n.getContext("2d"),o=t/e.width;return n.width=t,n.height=s>e.height?e.height:s,i.drawImage(e,0,0,e.width,e.height,0,0,e.width*o,e.height*o),Promise.resolve(n)}save(e){return new Promise(((t,s)=>{elementorCommon.ajax.addRequest("screenshot_save",{data:{post_id:this.getSettings("post_id"),screenshot:e.toDataURL("image/png")},success:e=>{this.log(`Screenshot created: ${encodeURI(e)}`),t(e)},error:()=>{this.log("Failed to create screenshot."),s()}})}))}markAsFailed(){return new Promise(((e,t)=>{elementorCommon.ajax.addRequest("screenshot_failed",{data:{post_id:this.getSettings("post_id")},success:()=>{this.log("Marked as failed."),e()},error:()=>{this.log("Failed to mark this screenshot as failed."),t()}})}))}getScreenshotProxyUrl(e){return`${this.getSettings("home_url")}?screenshot_proxy&nonce=${this.getSettings("nonce")}&href=${e}`}screenshotSucceed(e){this.screenshotDone(!0,e)}screenshotFailed(e){this.log(e,null),this.markAsFailed().then((()=>this.screenshotDone(!1)))}screenshotDone(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:null;clearTimeout(this.timeoutTimer),this.timeoutTimer=null,window.parent.postMessage({name:"capture-screenshot-done",success:e,id:this.getSettings("post_id"),imageUrl:t},"*"),this.log(`Screenshot ${e?"Succeed":"Failed"}.`,"timeEnd")}log(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:"timeLog";this.getSettings("isDebug")&&(console.log("string"==typeof e?`${this.getSettings("post_id")} - ${e}`:e),t&&console[t](this.getSettings("timer_label")))}}jQuery((()=>{new Screenshot}))})();{"id":800,"date":"2024-11-17T16:03:56","date_gmt":"2024-11-17T16:03:56","guid":{"rendered":"https:\/\/thetach.com\/?p=800"},"modified":"2024-11-17T16:04:01","modified_gmt":"2024-11-17T16:04:01","slug":"iranian-hackers-deploy-wezrat-malware-in-attacks-targeting-israeli-organizations","status":"publish","type":"post","link":"https:\/\/thetach.com\/?p=800","title":{"rendered":"Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations"},"content":{"rendered":"\n
Specialists in cyber security<\/strong> identified a serious new threat in the sphere of hacker attacks<\/strong> carried out by Iran. These attacks employ WezRat malware<\/strong>: it is a remote access trojan as well as an information stealer. This advanced tool launched by Iranian state-sponsored hackers<\/strong> to perpetrate the network, steal confidential information, and perform destructive operations. First identified through artifacts uploaded to VirusTotal<\/strong>, WezRat malware<\/strong> has been active since at least September 1, 2023. Their appearance can considered proof of the increased complexity of Iranian Hackers Attacks<\/strong>. They operate outside the visually seen defenses and this makes the hackers conduct huge unannounced raids. Such activity poses a grave threat to targeted organizations and their critical infrastructure.<\/p>\n\n\n\n
Capabilities and Design of WezRat<\/strong><\/h2>\n\n\n\n
WezRat malware<\/strong> exhibits highly advanced capabilities, making it a powerful tool in Iranian hacker attacks<\/strong>. It provides the attacker full functionality of commands, screenshot capture, file uploading, keystroke logging, clipboard content stealing, and cookies stealing. These two features give the attackers real-time command and control,\u0442\u0435\u0440 data theft permissions of the compromised systems thus escalating the effects of the attacks.<\/p>\n\n\n\n
As highlighted by cybersecurity firm Check Point<\/strong>, some functions of WezRat malware<\/strong> depend on separate modules retrieved from a command-and-control (C&C)<\/strong> server. These modules, delivered as DLL files<\/strong>, reduce the visibility of the malware\u2019s main component, enhancing its stealth and effectiveness.<\/p>\n\n\n\n
The inclusion of modular functionality ensures WezRat<\/strong> remains undetected for longer periods during Iranian Hackers Attacks<\/strong>, enabling persistent access to compromised networks. Such sophisticated tactics underscore the advanced strategies employed by Iranian state-sponsored groups<\/strong> to achieve their malicious objectives.<\/p>\n\n\n\n
Attribution to Cotton Sandstorm<\/strong><\/h2>\n\n\n\n
The development of WezRat malware<\/strong> linked to Cotton Sandstorm<\/strong>, a prominent hacking group notorious for conducting numerous Iranian hacker attacks<\/strong>. Previously known as Emennet Pasargad<\/strong> and more recently as Aria Sepehr Ayandehsazan (ASA)<\/strong>, this group has a documented history of engaging in high-profile cyberattacks<\/strong>.<\/p>\n\n\n\n
Reports from U.S. and Israeli cybersecurity agencies<\/strong>, published in late September 2023, detailed the capabilities and usage of WezRat malware<\/strong>. These reports confirmed that the malware serves as a powerful tool for gathering endpoint data and executing remote commands, further solidifying its association with Iranian hacker attacks<\/strong>.<\/p>\n\n\n\n
Cotton Sandstorm\u2019s operations<\/strong> reflect a highly coordinated strategy aimed at disrupting systems, gathering intelligence, and maintaining long-term access to critical networks. By leveraging tools like WezRat malware<\/strong>, the group continues to pose significant challenges to global cybersecurity frameworks.<\/p>\n\n\n\n
Deployment Strategy and Phishing Campaigns<\/strong><\/h2>\n\n\n\n
WezRat malware<\/strong> widely distributed through targeted phishing campaigns<\/strong>, a hallmark of Iranian hacker attacks<\/strong>. These campaigns rely on deception to trick victims into downloading malware-laced files, compromising their systems.<\/p>\n\n\n\n
One particularly effective method involves the distribution of trojanized Google Chrome installers<\/strong>, deceptively named “Google Chrome Installer.msi.” While these installers deliver the legitimate Chrome browser, they also include a malicious binary called “Updater.exe” (internally referred to as “bd.exe”). Once active, the malware collects system information and establishes contact with its command-and-control server<\/strong> at “connect. il-cert[.]net,” awaiting further instructions to carry out malicious actions.<\/p>\n\n\n\n
Phishing emails impersonating the Israeli National Cyber Directorate (INCD)<\/strong> have been a primary vector for spreading WezRat malware<\/strong>. These emails, sent on October 21, 2024, originated and urged recipients to install an urgent Chrome security update<\/strong>. This carefully crafted strategy exemplifies the high level of planning involved in Iranian Hackers Attacks<\/strong>, ensuring their campaigns reach specific, high-value targets.<\/p>\n\n\n\n
The malware’s execution requires specific parameters, including the C&C server address<\/strong> and a numeric “password,” to function correctly. If incorrect parameters are supplied, the malware may crash or perform unintended actions, complicating analysis and detection efforts.<\/p>\n\n\n\n
Implications of Iranian Hackers Attacks<\/strong><\/h2>\n\n\n\n
The discovery of WezRat malware<\/strong> highlights the escalating threat posed by Iranian hacker attacks<\/strong>. These State-sponsored campaigns target the critical infrastructures, sensitive data, and the premium intellectual property assets of an organization making the organization open to severe penetrations and operational intermissions.<\/p>\n\n\n\n
The fact that WezRat malware<\/strong> used in Iranian hacker attacks<\/strong> operates unnoticed, can steal information, and remains controlling the infected nodes after that proves that the authors of these attacks used rather complex tactics. <\/p>\n\n\n