Description
[Moses Staff](https://attack.mitre.org/groups/G1009) is a suspected Iranian threat group that has primarily targeted Israeli companies since at least September 2021. [Moses Staff](https://attack.mitre.org/groups/G1009) openly stated their motivation in attacking Israeli companies is to cause damage by leaking stolen sensitive data and encrypting the victim's networks without a ransom demand.(Citation: Checkpoint MosesStaff Nov 2021) Security researchers assess [Moses Staff](https://attack.mitre.org/groups/G1009) is politically motivated, and has targeted government, finance, travel, energy, manufacturing, and utility companies outside of Israel as well, including those in Italy, India, Germany, Chile, Turkey, the UAE, and the US.(Citation: Cybereason StrifeWater Feb 2022)
Techniques Used (TTPs)
- T1021.002 — SMB/Windows Admin Shares (lateral-movement)
- T1016 — System Network Configuration Discovery (discovery)
- T1087.001 — Local Account (discovery)
- T1082 — System Information Discovery (discovery)
- T1562.004 — Disable or Modify System Firewall (defense-evasion)
- T1588.002 — Tool (resource-development)
- T1505.003 — Web Shell (persistence)
- T1587.001 — Malware (resource-development)
- T1553.002 — Code Signing (defense-evasion)
- T1027.013 — Encrypted/Encoded File (defense-evasion)
- T1105 — Ingress Tool Transfer (command-and-control)
- T1190 — Exploit Public-Facing Application (initial-access)
Total TTPs: 12
Malware & Tools
Malware: DCSrv, PyDCrypt, StrifeWater
Tools: PsExec