An analysis from Recorded Future’s Insikt Group research unit offers insight into the online infrastructure used by Hamas, as well as its apparent links to the Iranian government. Credit: Shutterstock An application disseminated by Hamas via the private messaging app Telegram clued security investigators in to a crossover between the militant Palestinian group and cyber infrastructure linked to Iran, as well as links to a known hacker group. According to a report from cybersecurity company Recorded Future's Insikt Group, the research team first identified the application -- whose core functionality is currently unknown -- on October 11, four days after Hamas' bloody attacks against Israel began. The application, posted to a Telegram Channel, is designed to communicate with a domain said to act as an outlet for the Al-Qassam Brigade, the military wing of Hamas. The specific addresses used by the application were diverse, popping up in Panama, Lebanon, Ukraine and Russia, but the Insikt Group team was unable to get the app to function in sandbox testing, hypothesizing that its command-and-control servers had been taken down by DoS attacks. A cluster of domains that shared a Google Analytics code were linked to other domains that, in turn, are associated with Hamas threat actors. Some of those domains, additionally, were linked via naming convention commonalities to an APT (advanced persistent threat) group known as TAG-63, AridViper, APT-C-23, or Desert Falcon, which the team now believes to have ties to Hamas. "The infrastructure overlaps that were identified between the Hamas application and the cluster of domains we suspect are linked to TAG-63 tradecraft are notable," the report said. "They depict not only a possible slip in operational security but also ownership of the infrastructure shared between groups. One possible hypothesis to explain this observation is that TAG-63 shares infrastructure resources with the rest of the Hamas organization." Another domain linked to the Al-Qassam Brigade's website in a similar way to TAG-63, according to the report, contained naming links suggesting Iranian involvement, including subdomains using the Farsi words for "attendant" or "comrade" and "director." "[W]e assess it is likely that the newly identified domains ... were operated by threat actors that share an organizational or ideological affiliation with the [Al-]Qassam Brigades," the report's authors wrote. "At the time of writing, Iran’s Islamic Revolutionary Guard Corps (IRGC), and specifically the Quds Force, is the only known entity from Iran that provides cyber technical assistance to Hamas and other Palestinian threat groups." As the physical conflict between Hamas and Israel intensifies, a variety of experts have pointed out that various hacker groups have engaged in a parallel cyber war. Analysts, for example, have reported instances of DDoS attacks, website defacements, and dark web discussions promulgated by various threat actor groups, in support of one side or the other. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe