• Home
  • keyboard_arrow_right Israel News
  • keyboard_arrow_right Moses Staff hackers strike again with attack on Israeli engineering companies

Israel News

Moses Staff hackers strike again with attack on Israeli engineering companies

CM 02/11/2021


Background
share close
A hacker group called Moses Staff claimed on Tuesday that it had successfully conducted a cyberattack on three Israeli engineering companies, less than two weeks after the same group leaked files it claimed it obtained in an attack on the Defense Ministry.
The group announced on Tuesday that it had targeted Ehud Leviathan Engineering, David Engineers, and H.G.M. Engineering in its latest attack.
The data leaked from the three companies includes projects, maps, contracts, pictures, letters and video conferencing images.

Moses Staff stated that the information it had leaked did not include everything that they had obtained and they would gradually release the rest.
Unlike the Black Shadow hacker group which also struck Israeli companies recently, Moses Staff did not make any demands for money or anything else.
The leaked documents included documents about infrastructure projects, including highways and public water systems. Some of the leaked documents even included a tender and other documents concerning construction in the new city entrance project that’s currently underway at the entrance of Jerusalem.
ID cards and insurance documents were also leaked in the attack.
Moses Staff’s website claims that the group has hacked over 165 servers and 254 websites and compiled over 11 terabytes of data, including Israel Post, the Defense Ministry, files related to Defense Minister Benny Gantz, the Electron Csillag company and Epsilor company.
“We’ve kept an eye on you for many years, at every moment and on each step,” wrote the group in the announcement of the attack on the Defense Ministry on their Telegram channel last week. “All your decisions and statements have been under our surveillance. Eventually, we will strike you while you never would have imagined.”
Moses Staff claimed in the announcement to have access to confidential documents, including reports, operational maps, information about soldiers and units, and letters and correspondence. “We are going to publish this information to aware [sic] all the world about the Israeli authorities’ crimes,” warned the group.
The files leaked in the earlier attack included photos of Gantz and IDF soldiers and a 2010 letter from Gantz to the deputy chief of the joint chiefs of staff and chief of intelligence in the Jordanian Armed Forces. The leaked files also included Excel files allegedly containing the names, ID numbers, emails, addresses, phone numbers and even socioeconomic status of soldiers, mechina pre-military students and individuals connected to the Defense Ministry.
The group stated on its website that it is targeting the same people who “didn’t tolerate” the legitimacy of Moses, seemingly the reason for the name Moses Staff.
The group’s description states that it will not forget “the soldiers whose blood is shed due to wrong policies and fruitless wars, the mothers mourning for their children, and all the cruelty and injustice were [were] done to the people of this nation.” The group did not clarify in its description which soldiers it was referring to.
It is as of yet unclear if the group is acting independently or is backed by a state.

A hacker is being depicted in this illustrative photo (credit: Courtesy)A hacker is being depicted in this illustrative photo (credit: Courtesy)

Moses Staff leaked identifying information, addresses and information about packages from an attack it says it conducted on the Israel Post. The group also leaked pictures of identity cards from a number of companies it claims it attacked.
The group’s website also has a contact form for those interested in joining the group.
THE NATIONAL Cyber Directorate stated in response to the leaks last week that it has repeatedly warned that hackers are exploiting a vulnerability on the Exchange email service in order to attack organizations, according to Ynet.
“The directorate once again calls on organizations to implement in their systems the latest critical updates that Microsoft has released for this vulnerability – a simple and free update that can reduce the chance of this attack,” the directorate said.
The attack is the latest in a series of cyberattacks on Israel in recent months.
Over the weekend, the Black Shadow hacker group announced that it had attacked the Israeli Internet company Cyberserve, and on Tuesday it leaked the data of about a million people from the Atraf gay dating app.
Cyberserve is a web hosting company, meaning it provides servers and data storage for other companies across industries. The data seized by the hackers is from a wide variety of businesses, from travel booking and bus companies to the Israeli Children’s Museum.
Last month, the Hillel Yaffe Medical Center in Hadera was targeted by a ransomware attack that affected its computer systems.
Cybereason also revealed last month that MalKamak, an Iranian state-supported hacker group, was running a highly targeted cyber-espionage operation against global aerospace and telecommunications companies, stealing sensitive information from targets around Israel and the Middle East, as well as in the United States, Russia and Europe. The threat posed by MalKamak is still active.
In September, a hacker group called Deus leaked data it claims it obtained in a cyberattack on the Israeli call center service company Voicenter from the company’s customers, including 10bis, CMTrading, Mobileye, eToro, Gett and My Heritage. The data leaked so far include security camera and webcam footage, ID cards, photos, WhatsApp messages and emails, as well as recordings of phone calls.
A series of cyberattacks has plagued Israeli businesses and institutions in the past two years, including Israel Aerospace Industries, the Shirbit insurance company and the Amital software company.
The National Cyber Directorate reported that it handled more than 11,000 inquiries on its 119 hotline in 2020, some 30% more than it handled in 2019. The directorate made about 5,000 requests to entities to handle vulnerabilities exposing them to attacks and was in contact with about 1,400 entities concerning attempted or successful attacks.

Source: Jerusalem Post

Rate it
Author

CM

The host of Coffee Mouth Scare Crow Show and CEO of 452 Impact, Inc. Here is food for thought. Romans 6:23 "For the wages of sin is death; but the gift of God is eternal life through Jesus Christ our Lord." John 3:16 "For God so love ed the world that he gave his only begotten Son, that whosoever believeth in Him shall be saved."

list Archive

Background
Previous post

Post comments

This post currently has no comments.

Leave a reply