Security News > 2021 > January > Hezbollah hackers attack unpatched Atlassian servers at telcos, ISPs

Volatile Cedar, an advanced hacker group believed to be connected to the Lebanese Hezbollah Cyber Unit, has been silently attacking companies around the world in espionage operations.
Using common web shell utilities as the main hacking tool and rarely relying on other tools, which hindered attribution.
ClearSky warns that the Oracle servers accessed by Lebanese Cedar are still open and are easy targets for other hackers looking to attack the networks of multiple telecom providers or gain access to the files available.
The researchers say that Lebanese Cedar combines open-source tools with custom ones, their current toolset including a full blown web shell, a custom RAT, and "Carefully selected complementary tools, including URI brute force tools."
The clever selection of tools, tactics, and attack vectors allows them to pass unnoticed.
The company's report provides complete technical details about the attacks investigated and indicators of compromise that include some of the original servers used by the hackers.
News URL
Related news
- Over 3 million mail servers without encryption exposed to sniffing attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Russian ISP confirms Ukrainian hackers "destroyed" its network (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Over 660,000 Rsync servers exposed to code execution attacks (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)
- Hackers exploit Cityworks RCE bug to breach Microsoft IIS servers (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)