Article Details

Scrape Timestamp (UTC): 2024-10-18 11:03:46.413

Source: https://www.theregister.com/2024/10/18/eset_denies_israel_branch_breach/

Original Article Text

Click to Toggle View

ESET denies it was compromised as Israeli orgs targeted with 'ESET-branded' wipers. Says 'limited' incident isolated to 'partner company'. ESET denies being compromised after an infosec researcher highlighted a wiper campaign that appeared to victims as if it was launched using the Slovak security shop's infrastructure. Kevin Beaumont blogged about an Israeli biz that said it was infected with a wiper after a staffer clicked a link in an email seemingly sent from the ESET Advanced Threat Defense Team in Israel. The email itself passed DKIM and SPF checks against ESET's domain, said Beaumont, although according to a screenshot of it shared by one security pro, Google Workspace flagged it as malicious. It appears the email was first sent on October 8, targeting cybersecurity professionals in Israel, with the .ZIP download hosted on ESET servers. Targets were informed their devices were being aimed at by "a state-backed threat actor" and were invited to ESET's Unleashed program – which doesn't appear to exist as a standalone program, but Beaumont noted the branding is sometimes used by the vendor. The download contains various ESET DLLs, the researcher said, as well as a malicious setup.exe. Beaumont described it as a fake ransomware, making calls to things like Mutex from Yanluowang's ransomware payload, for example. It also made innocuous calls to an organization promoting the Iron Swords War memorial day, established to remember those who died when Hamas troops attacked Israel on October 7, 2023. The observation, combined with the day of infection, raises questions about whether this was a hacktivist at work. "Email targeting seen so far is cybersecurity people within organizations across Israel," said Beaumont. "It appears there is no way to actually recover. It's a wiper." ESET responded to the situation via X on Friday, denying Beaumont's claim that ESET Israel was itself compromised. The security org said: "We are aware of a security incident which affected our partner company in Israel last week. Based on our initial investigation, a limited malicious email campaign was blocked within ten minutes. ESET technology is blocking the threat and our customers are secure. ESET was not compromised and is working closely with its partner to further investigate and we continue to monitor the situation." The source of the malicious activity isn't known, but the MO aligns neatly with that of the pro-Palestine Handala group, which for the past few months has attacked Israeli organizations and figureheads. Trellix researchers noted in July that Handala has a propensity for wiper attacks in Israel, noting at the time that hundreds of the strikes targeted Israeli organizations in just a few weeks. The Israeli government published an urgent warning about the incidents in response. More recently, Handala has been leaking what it claims to be private files, emails, and photos from the likes of Israeli politician Benjamin Gantz, former prime minister Ehud Barak, and diplomat to Germany Ron Prosor. All appear to be compromises of personal accounts. Organizations that were recently singled out by the group include podcasting platform Doscast, Soreq Nuclear Research Center, point of sale vendor Max Shop, and firearms exporter Silver Shadow.

Daily Brief Summary

CYBERCRIME // ESET-Branded Wiper Targets Israeli Businesses; No Breach at ESET

ESET confirmed that their infrastructure was not compromised following claims of a wiper attack disguised with ESET branding targeting Israeli organizations.

The suspicious emails, resembling communications from ESET's Advanced Threat Defense Team, were flagged by Google Workspace yet passed DKIM and SPF authentications.

The campaign involved sending a .ZIP file ostensibly from ESET, containing a mix of legitimate ESET files and a malicious executable that functioned as a wiper, not ransomware.

Attack campaign linked to the pro-Palestine Handala group, known for similar attacks against Israeli targets, including high-profile individuals and organizations.

ESET quickly responded to the incident, affirming that the malicious campaign was promptly blocked, and affirmed the security of their products and client systems.

The incident coincides with the anniversary of the Iron Swords War, suggesting a potential hacktivist motive behind the timing of the attack.

ESET is actively working with its affected partner in Israel to further investigate and manage the situation.