The two campaigns, one sophisticated and one not, shared the same infrastructure Israeli institutions have been targeted by an Arab-speaking hacker group that sought to extract sensitive documents, according to Trend Micro.The campaign, which Trend called Operation Arid Viper, focused on sending phishing emails to targets. Those emails came with malware packaged with a short pornographic video, according to the company’s report.The phishing emails were sent to targets including a government office, infrastructure providers, a military organization and academic institutions in Israel and Kuwait.The attacks “targeted professionals who might be receiving very inappropriate content at work and so would hesitate to report the incident,” Trend wrote. “These victims’ failure to act on the threat could have then allowed the main malware to remain undiscovered.” The malware then began hunting around on a victim’s hard disk for Word, Excel, PowerPoint and text files. It reported the files to the command and control server, which then decided which files to steal.The command-and-control servers used by Arid Viper were “closely locked down, providing very little hint that could aid our investigation,” Trend said. Trend found the Arid Viper attacks shared the same command-and-control infrastructure as another campaign it calls Advtravel, although the style of attacks are very different.The company gained insight into Advtravel after a server connected with the operation was left open on the Internet.“This allowed us to download copies of its entire content to study as part of our investigation before its owners realized their mistake and locked it down,” the report said.The Advtravel attackers infected more than 500 systems of mostly Arabs living in Egypt. They focused on stealing images from victims’ computers, many of which were screenshots of Facebook profiles, perhaps in an attempt to identify victims.“This could be a sign that they are looking for incriminating or compromising images for blackmail purposes,” Trend wrote. “As such, the attackers may be less-skilled hackers who are not after financial gain nor hacking for espionage purposes.”Overall, the Advtravel attackers were much less skilled than Arid Viper. “They look like a classic group of beginner hackers just starting their careers,” Trend said. Trend did extensive research into the email addresses used to register domain names use for Arid Viper’s command-and-control infrastructure as well as Advtravel, linking some possible actors to the Gaza Strip.But it cautioned that such analysis was not definitive, as the attackers could have easily faked information required to register domain names.Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe