Hamas-affiliated APT targeting government agencies in the Middle East, Morocco
好的,用户让我用中文总结一下这篇文章的内容,控制在100个字以内,而且不需要以“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是一个黑客组织,声称与哈马斯有关联,他们使用带有恶意软件的文件入侵了阿曼、摩洛哥和巴勒斯坦当局的政府和外交机构。Palo Alto Networks的Unit 42团队发布了报告,将这个组织称为Ashen Lepus,并指出该组织使用名为AshTag的恶意软件进行攻击。 接下来,我需要提取关键点:黑客组织、哈马斯关联、目标国家、使用的恶意软件AshTag、攻击手段(感染PDF文件引导下载恶意软件)、以及他们的活动持续性,尤其是在停火后仍然活跃。 然后,我需要把这些信息浓缩到100字以内。要确保涵盖主要实体:黑客组织、关联方哈马斯、目标国家、恶意软件名称和攻击手段。 可能的结构是:一个黑客组织被指与哈马斯有关联,利用恶意软件攻击阿曼等国政府机构。最近活动使用名为AshTag的恶意软件,通过感染PDF文件引导下载恶意软件。该组织自2020年以来技术不断进步,在停火后仍活跃。 检查一下字数是否在限制内,并确保没有遗漏关键信息。最后,确保语言简洁明了。 </think> 一个黑客组织被指与哈马斯有关联,利用恶意软件攻击阿曼、摩洛哥和巴勒斯坦政府机构。该组织名为Ashen Lepus,使用名为AshTag的恶意软件通过感染PDF文件引导目标下载恶意软件。自2020年以来,该组织技术不断进步,在以色列-哈马斯冲突停火后仍保持活跃。 2025-12-12 21:31:7 Author: therecord.media(查看原文) 阅读量:1 收藏

A hacking group allegedly affiliated with Palestinian armed group Hamas is accused of using malware-laden documents to breach government and diplomatic entities tied to Oman, Morocco and the Palestinian Authority. 

Palo Alto Networks’ Unit 42 issued a report on Thursday about a group it refers to as Ashen Lepus. A spokesperson for the company told Recorded Future News that it attributed the group to Hamas based on years of profiling their activity, which they said “shows a consistent alignment with Hamas's strategic interests.”

Unit 42 said the recent activity involved a new strain of malware they call AshTag that has allowed them to steal information from key entities across the Middle East. The report said Ashen Lepus has demonstrated increasing sophistication since 2020, developing more advanced hacking tactics that include infrastructure obfuscations and other new tools. 

The malware is typically tied to legitimate documents about Turkey’s involvement with Palestinian entities. While other Hamas-affiliated threat activity has decreased throughout the Israel-Hamas conflict, Ashen Lepus remains persistently active, even following the October 2025 ceasefire. 

The AshTag malware has been used for several years and was still being used in attacks after the Gaza ceasefire announced in October. Unit 42 saw hands-on activity within certain victim environments after the ceasefire. The malware allows the hackers to extract files, download content onto victim devices and take further actions. 

The most recent campaign has used documents focused on Turkey’s relationship with Palestinian political entities, which the researchers said is a shift that suggests Turkish entities may be a new area of operational interest.

The lures included documents with titles related to partnerships between Morocco and Turkey, Turkish defense initiatives, Hamas activities in Syria and Palestinian government efforts.

The attacks begin with an infected PDF decoy file that guides targets to download a RAR archive containing a malicious payload.

The group has made several changes to adopt better operational security, using different tactics to better blend their activity in with benign network activity.

In multiple cases, the group conducted hands-on-keyboard data theft after using the malware to gain access to victim systems. Unit 42 found the threat actors downloading documents directly from a victim’s email account in one instance — with a focus on obtaining specific, diplomacy-related documents.

“Ashen Lepus remains a persistent espionage actor, demonstrating a clear intent to continue its operations throughout the recent regional conflict — unlike other affiliated threat groups, whose activity significantly decreased,” the researchers said. 

“The threat actors’ activities throughout the last two years in particular highlight their commitment to constant intelligence collection.”

Other cybersecurity firms have tracked the group’s activity under the name “WIRTE” and have linked it to larger groups like Gaza Cybergang and Molerats. Researchers previously tied Hamas-affiliated hackers to a strain of malware called SysJoker that targeted Israeli educational institutions.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.


文章来源: https://therecord.media/hamas-apt-targeting-government-agencies
如有侵权请联系:admin#unsafe.sh