Security News > 2022 > December > Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack

An Iranian advanced persistent threat actor known as Agrius has been attributed as behind a set of data wiper attacks aimed at diamond industries in South Africa, Israel, and Hong Kong.
The wiper, codenamed Fantasy by ESET, is believed to have been delivered via a supply chain attack targeting an Israeli software suite developer as part of a campaign that began in February 2022.
"The Fantasy wiper is built on the foundations of the previously reported Apostle wiper but does not attempt to masquerade as ransomware, as Apostle originally did, ESET researcher Adam Burgher disclosed in a Thursday analysis."Instead, it goes right to work wiping data.
Agrius subsequently initiated the wiping attack via Fantasy on March 12, 2022, before striking other companies in Israel and Hong Kong on the same date.
The name of the Israeli company that fell victim to the supply chain attack was not disclosed by ESET, but evidence points to it being Rubinstein Software, which markets an enterprise resource planning solution called Fantasy that's used for jewelry stock management.
The APT33 hacking group, which is suspected of operating at the behest of the Iranian government, is said to have been behind multiple attacks that used the Shamoon wiper against targets located in the Middle East.
News URL
https://thehackernews.com/2022/12/iranian-hackers-strike-diamond-industry.html
Related news
- IPany VPN breached in supply-chain attack to push custom malware (source)
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Russia-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- WP3.XYZ malware attacks add rogue admins to 5,000+ WordPress sites (source)
- Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer (source)
- PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack (source)
- Supply chain attack hits Chrome extensions, could expose millions (source)
- Hacker infects 18,000 "script kiddies" with fake malware builder (source)