Middle East Conflict Fuels Opportunistic Cyber Attacks
嗯,用户让我用中文总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。好的,首先我得仔细阅读这篇文章,理解它的主要内容。 文章主要讲的是网络威胁分子利用中东政治动荡和冲突来发起网络攻击。Zscaler ThreatLabz发现了很多新注册的域名,这些域名都和中东的政治情况有关,可能被用来进行恶意活动。他们还分析了多个案例,包括伪装成PDF文件的钓鱼攻击、利用DLL侧载技术传播后门程序、以及虚假新闻网站传播恶意软件等等。 此外,文章还提到了一些具体的攻击手法和恶意软件的细节,比如LOTUSLITE后门程序和StealC恶意软件。最后,文章给出了一些防御建议,比如最小化攻击面、防止初始入侵、限制权限等等。 总结起来,这篇文章的核心内容是网络威胁分子如何利用中东冲突来发起各种网络攻击,并详细描述了这些攻击的手法和影响。因此,在总结时需要涵盖这些关键点:网络威胁分子利用中东冲突、新注册域名、恶意活动案例、以及防御建议。 现在我要把这些信息浓缩到100个字以内。要确保涵盖主要事件:网络威胁分子利用中东冲突进行攻击;新注册域名用于恶意活动;分析了钓鱼攻击、后门传播等案例;并提出了防御建议。 最终的总结应该是简洁明了的,直接点出主要内容和结论。 </think> 网络威胁分子利用中东政治动荡和冲突发起恶意活动,Zscaler ThreatLabz发现大量新注册域名与冲突主题相关,并分析了钓鱼攻击、虚假新闻网站及恶意软件传播等案例。 2026-3-6 18:47:50 Author: securityboulevard.com(查看原文) 阅读量:3 收藏

IntroductionThreat actors often take advantage of major global events to fuel interest in their malicious activities. Zscaler ThreatLabz is diligently tracking a surge in cybercriminal activity that capitalizes on the elevated political climate in the Middle East. This increased malicious activity includes discoveries that are directly tied to the ongoing conflict, alongside other related findings. ThreatLabz identified over 8,000 newly registered domains with keywords tied to the Middle East political situation and conflict-themed events. Most of these domains currently have no content but they may be weaponized or used in threat campaigns in the near future. Analysis of the active domains revealed several trends, including conflict monitoring sites, conflict-themed meme-coins, short-lived storefronts selling conflict-related merchandise, general blogs and conflict-themed games, and scam or betting-related Progressive Web Apps (PWAs). ThreatLabz will continue monitoring newly registered domains and currently inactive domains for emerging threat campaigns. In this blog, ThreatLabz examines multiple cases, including a conflict-themed lure designed to look like a PDF about missile strikes in Bahrain, a malware chain that uses a conflict-themed lure to deliver the LOTUSLITE backdoor via DLL sideloading, and a fake news blog campaign that redirects users to StealC malware. We also detail fake government and payment phishing sites designed to collect victim data, donation and online storefront scams that route payments to suspicious destinations, and meme-coin promotions consistent with pump-and-dump schemes. RecommendationsGiven the recent threat campaigns targeting the Middle Eastern countries discussed in this blog, ThreatLabz recommends the following best practices to help strengthen an organization’s defenses and reduce the risk of compromise.Minimize the attack surface: Make apps (and vulnerable VPNs) invisible to the internet, and impossible to compromise, ensuring an attacker can’t gain initial access.Prevent initial compromise: Inspect all traffic inline to automatically stop zero-day exploits, malware, or other sophisticated threats.Enforce least privileged access: Restrict permissions for users, traffic, systems, and applications using identity and context, ensuring only authorized users can access named resources.Block unauthorized access: Use strong multi-factor authentication (MFA) to validate user access requests.Eliminate lateral movement: Connect users directly to apps, not the network, to limit the blast radius of a potential incident.Stop data loss: Inspect data in motion and data at rest to stop active data theft during an attack.Deploy active defenses: Leverage deception technology with decoys to detect hands-on-keyboard activity from compromised endpoints and block access to real applications containing the attack.Cultivate a security culture: Many breaches begin with compromising a single user account via a phishing attack. Prioritizing regular cybersecurity awareness training can help reduce this risk and protect employees from compromise.Test your security posture: Get regular third-party risk assessments and conduct purple team activities to identify and harden the gaps in security program. Organizations should request that service providers and technology partners do the same and share the results of these reports with the organization’s security team.OverviewIn Cases 4 and 5, ThreatLabz observed Persian-language comments embedded in page sources and associated code. While these artifacts are not definitive attribution, they may provide useful context about the operator’s working environment and suggest a potential Iran-aligned threat actor. In the remaining campaigns covered in this blog, ThreatLabz did not observe the same code-level indicators; however, we did see threat actors capitalizing on the conflict in the Middle East by leveraging themes like Iran and geopolitical developments to drive engagement.Case 1: Suspected targeted attack in the Gulf Cooperation Council (GCC) region On March 1, 2026, ThreatLabz observed a ZIP archive containing files related to the Middle East conflict. The archive included a Windows shortcut (LNK) file that, when opened, downloaded a malicious Windows Compiled HTML Help (CHM) file from a threat actor-controlled server. The CHM file was then used to deploy a shellcode loader, a highly obfuscated shellcode, and eventually a backdoor. As part of the lure, the attack dropped a decoy PDF containing images of missile strikes.The Arabic text in the PDF translates to “Iranian missile strikes against US base in Bahrain”. The figure below shows the decoy PDF file used in this attack.Figure 1: PDF lure referencing Iranian missile strikes against a US base in Bahrain.The following sections summarize the observed attack flow and the files involved.Stage 1The ZIP archive contains an LNK file named photo_2026-03-01_01-20-48.pdf.lnk. The LNK’s target command line uses cURL to download a malicious CHM file from hxxps://www.360printsol[.]com/2026/alfadhalah/thumbnail?img=index.png. The LNK file then uses the legitimate Windows HTML Help executable (hh.exe) with the -decompile option to extract the CHM contents. The files extracted from the CHM are:0.lnk: Stage 2 Windows shortcut3: Decoy PDF used as a lure4: TAR archive containing malicious componentsThe Stage 1 LNK launches the Stage 2 shortcut (0.lnk).Stage 2The Stage 2 LNK performs the following actions:Copies the decoy PDF from file 3 and writes it as photo_2026-03-01_01-20-48.pdf.Treats file 4 as a TAR archive and extracts its contents into %AppData%.Executes %AppData%\BaiduNetdisk\ShellFolder.exe with the argument: –path a.Next, ShellFolder.exe uses DLL sideloading to load a malicious DLL named ShellFolderDepend.dll.ShellFolderDepend.dll analysis (Shellcode loader)ShellFolderDepend.dll is a 32-bit DLL that establishes persistence and then decrypts and executes embedded shellcode.To establish persistence, the DLL enumerates running processes to determine whether bdagent.exe (Bitdefender Agent) is present. Based on the result, the DLL uses one of two persistence methods:If bdagent.exe is running: the DLL uses reg.exe to set a Run key pointing to the host binary (ShellFolder.exe):C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /reg:64 /v BaiNetdisk /t REG_SZ /d “\”%s\” –path a” /fIf bdagent.exe is not running: the DLL sets the same Run key directly using RegSetValueExA.The DLL calls the Windows Native API SystemFunction033 (RC4) to decrypt shellcode stored in Shelter.ex (located alongside the DLL) using the key 20260301@@@. The DLL then:Allocates executable memory with VirtualAlloc.Copies the decrypted shellcode into memory.Transfers execution to the decrypted shellcode.StatusAnalysis of the next-stage shellcode is still in progress. ThreatLabz will update this blog post as more details become available and plan to publish a deeper follow-up analysis.Case 2: LOTUSLITE backdoor used in Iran conflict-themed lures by Mustang PandaOn March 4, 2026, ThreatLabz identified a malicious ZIP archive whose name is related to the conflict theme. Executing the malware in the archive triggered the download and execution of the LOTUSLITE backdoor.The ZIP contained:A legitimate KuGou music software binary, renamed by the threat actor to Iran Strikes U.S. Military Facilities Across Gulf Region.exeA malicious DLL, libmemobook.dllBased on the extracted directory name, JCPOA, ThreatLabz assesses the contents were intended to appear related to the Joint Comprehensive Plan of Action (JCPOA), the Iran nuclear deal signed in 2015. The file name Iran Strikes U.S. Military Facilities Across Gulf Region.exe appears deliberately chosen to align with ongoing military conflict in the Middle East.When executed, the legitimate executable sideloads the malicious libmemobook.dll located in the same directory.Stage 1: libmemobook.dll analysis (LOTUSLITE downloader)libmemobook.dll is a 32-bit C++ DLL used to download the next-stage payloads and set up persistence on the endpoint. The malicious functionality is implemented in the export function named ProcessMain.On the first run, the downloader performs checks to determine whether LOTUSLITE is already installed. It looks for two files under C:\ProgramData\CClipboardCm\.WebFeatures.exekugou.dllThe downloader also verifies that both files match expected file sizes. If the checks pass, the downloader launches WebFeatures.exe and then exits.If the environment checks fail, the downloader begins its installation routine:Ensures it is running from the target directory: The downloader checks whether it is already executing from C:\ProgramData\CClipboardCm\. If not, it creates the directory and copies:itself to C:\ProgramData\CClipboardCm\libmemobook.dllthe legitimate host executable to C:\ProgramData\CClipboardCm\SafeChrome.exeEstablishes persistence: The downloader creates a Windows Run keyHKCU\Software\Microsoft\Windows\CurrentVersion\Run\ACboardCmand sets it to: C:\ProgramData\CClipboardCm\SafeChrome.exe.The downloader then checks for the next-stage components in C:\ProgramData\WebFeatures\.WebFeatures.exekugou.dllIf both files are present and their sizes validate, the downloader executes WebFeatures.exe via CreateProcessW. WebFeatures.exe then sideloads the malicious DLL kugou.dll from the same directory, continuing the infection chain.If the next-stage payloads are not present, the downloader decrypts embedded shellcode, allocates executable memory using VirtualAlloc, copies the decrypted shellcode into the allocated region, and executes it indirectly by:setting the EnumFontsW callback to the shellcode address, andinvoking EnumFontsW to trigger execution.Shellcode analysisThe 32-bit shellcode primarily downloads and drops the next-stage payloads using the pre-configured URLs in the table below.URLDownloaded Filenamewww.e-kflower[.]com/_prozn/_skin_mbl/home/KApp.rarWebFeatures.exewww.e-kflower[.]com/_prozn/_skin_mbl/home/KAppl.rarkugou.dllTable 1: Pre-configured URLs used by the shellcode.It is worth noting that the domain e-kflower[.]com is compromised and used by the threat actor to stage the payloads.The shellcode hardcodes the User-Agent used for all network requests to Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/143.0.0.0 Safari/537.36. This User-Agent is applied consistently across its HTTP traffic to mimic legitimate Chrome browser activity. After downloading the next-stage payloads, the downloader copies them to C:\ProgramData\WebFeatures\. It then establishes persistence by creating the following Run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ASEdge and setting it to launch  C:\ProgramData\WebFeatures\WebFeatures.exe -Edge.Stage 2: kugou.dll analysisWebFeatures.exe is a legitimate data importer utility from the KuGou music software suite. When executed from the compromised directory, it sideloads the malicious kugou.dll placed alongside it. ThreatLabz observed substantial code overlap between kugou.dll and the LOTUSLITE backdoor documented in January 2026, including use of the same C2 IP address: 172.81.60[.]97.Threat actors associated with LOTUSLITE appear to rapidly weaponize themes tied to active geopolitical events. In January 2026, they leveraged narratives related to tensions between the United States and Venezuela. In this campaign, we observed them adopting a Middle East conflict theme.Case 3: Fake news blogs leading to StealC malwareThreatLabz identified a fake news blog site hosting malicious JavaScript that leads to the download of StealC malware. The scripts used in this campaign can detect the visitor’s device type (e.g. smartphone, desktop, or small-screen devices). An example of a fake news site is shown below.Figure 2: Iran-themed fake news site used to distribute StealC malware hosted at goldman-iran-krieg[.]pages[.]dev.The malicious JavaScript redirects victims to a file-hosting page that delivers the StealC payload in a password-protected ZIP archive. The password is provided on the same page, as shown in the figure below.Figure 3: File-hosting page hosting a password-protected ZIP containing StealC.The full attack flow for delivering StealC is shown below.Figure 4: StealC delivery flow.Case 4: Fake US Social Security portalIn this case, a newly registered domain cfgomma[.]com hosted a fraudulent replica of the US Social Security Administration (SSA) portal, as shown in the figure below. Figure 5: Fake SSA portal hosted at cfgomma[.]com.Inspecting the page source revealed Persian-language comments, as shown in the figure below.Figure 6: Persian-language comments in the page source code. When the victim clicks the “Download your statement” option, the site triggers the download of PDQConnect, a legitimate remote monitoring and management (RMM) tool. If the victim installs and runs the software, the threat actor could potentially gain remote access to the system and perform follow-on activity like data exfiltration.Case 5: Fake Israeli Kvish 6 toll payment siteIn the next case, the domain 017[.]65c[.]mytemp[.]website hosted a fraudulent site impersonating Israel’s Kvish 6 toll payment gateway, as shown in the figure below. Figure 7: Fake Kvish 6 toll payment site hosted at 017[.]65c[.]mytemp[.]website.The fake page collects victim information such as IP address and device type, then tricks the victim into providing license-related details before prompting them to enter payment information to pay a supposed fine. Similar to the previous case, the page source for this fraudulent site contains Persian-language comments, as shown below.Figure 8: Persian-language comments in the page source code.The submitted data is forwarded to a Telegram bot, as shown in the figure below.Figure 9: Example of victim-submitted data forwarded to the Telegram bot.Case 6: Conflict-themed donation scam ThreatLabz observed several pages posing as humanitarian relief or “support” campaigns. Rather than directing funds to verifiable charities, the payment flows route victims to suspicious Google Pay (GPay) identifiers or cryptocurrency wallet addresses. An example of this fake donation scam is shown in the figure below.Figure 10: Fake donation site, hosted at irandonation[.]org, redirecting payments to suspicious cryptocurrency wallet addresses.Case 7: Conflict-themed storefront scamThreatLabz observed conflict-themed storefronts advertising “support” apparel, accessories, or limited-edition merchandise. These sites often show characteristics consistent with opportunistic fraud (e.g., minimal business details, recently created domains, and limited contact/return information), suggesting risks ranging from non-delivery scams to potential payment-card harvesting. An example of this potentially fraudulent shopping site is shown in the figure below.Figure 11: Potentially fraudulent shopping site hosted at nowarwithiran[.]store. Case 8: Meme-coin and pump-and-dump promotionsThreatLabz observed additional pages promoting conflict-themed tokens, using emotionally charged messaging and “breaking news” style content to create artificial hype. These campaigns aim to trigger rapid buying pressure and then sell off holdings once liquidity increases, leaving late buyers with losses. An example of this promotion is shown in the screenshot below.Figure 12: Pump-and-dump promotion for the $KHAMENEI meme coin hosted at khameneisol[.]xyz. Related ThreatLabz ResearchThreatLabz previously reported on suspected Iran-nexus activity targeting Iraqi government officials in a campaign active since Jan 2026. Visit Dust Specter APT Targets Government Officials in Iraq. ConclusionAs the geopolitical tensions in the Middle East rise, cybercriminals are quick to take advantage. By understanding the threat campaigns outlined in this advisory, organizations can strengthen their defenses and reduce the risk of compromise.Zscaler CoverageZscaler’s multilayered cloud security platform detects indicators related to this activity at various levels, including:Threat ActivityZscaler CoverageConflict-themed scamsAdvanced Threat Protection – HTML.Phish.RC.M.WMTFake news blogs leading to StealC malwareAdvanced Threat Protection – Win64.PWS.StealcStealC payloadShown in figure below.Figure 13: Zscaler Sandbox report for StealC.Indicators Of Compromise (IOCs) StealCIndicator typeValueMD5098BC0DD6A02A777FABB1B7D6F2DA505C280.97.160[.]190Domains hosting StealCmedia.hyperfilevault2[.]momarch2.maxdatahost1[.]cyouarch.megadatahost1[.]lolmedia.megafilehost2[.]sbsmedia.megadatahost1[.]lolarch2.megadatahost1[.]lolmedia.maxdatahost1[.]cyouRedirecting domainsflourishingscreencousin[.]comHolidayslettucecircumvent[.]comLOTUSLITE backdoor campaignFile indicators HashesFilenameDescription972585e50798cb5f122f766d8f26637f1b3fa84de23c6e789958462e6185e9cf0680ed9cdb40546435a7c42b32493301e333c8c0010e652fecd02463614a386f916055ecIran Strikes U.S. Military Facilities Across Gulf Region.exeLegitimate binary.6accd57e48c34cadc998d00594229e42Be34901237c9fa9563e8dc9e71faf3a7e68f983f4fb9b5d115bceee45a89447fb2565faef07452cda6b8e244e53ad91499c3d9b5libmemobook.dllMalicious stage 1 DLL.8c5a4dafed1586cec48d8eda267d8e42B9dfc411699e07343b9b95daa79fe7e4b681157924b11b4b999b385bede48ad9f0570e2e5da4a2054b96738b1e4d4946ece94bc1N/ADecrypted shellcode.722bcd4b14aac3395f8a073050b9a578E5baecb74c456df26aa7e0fa1661838cd86ccfd7819f586ca65395bdd191a21e9b4f3281159f9826e4de0e908277518dba809e5bWebFeatures.exeLegitimate data importer utility from the KuGou music software suite.10fb1122079b5ae8e4147253a937f40f7d4e31c8b11be7c970860c4fbc8fe85c70724cb18564763407064117726211ff8f89555e5a3b2b70bc9667032abd69cbe53b5216kugou.dllStage 2 DLL (LOTUSLITE).Network indicatorsTypeIndicatorURLwww.e-kflower[.]com/_prozn/_skin_mbl/home/KApp.rarURLwww.e-kflower[.]com/_prozn/_skin_mbl/home/KAppl.rarC2 IP address172.81.60[.]97 

*** This is a Security Bloggers Network syndicated blog from Security Research | Blog authored by ThreatLabz (Zscaler). Read the original post at: https://www.zscaler.com/blogs/security-research/middle-east-conflict-fuels-opportunistic-cyber-attacks


文章来源: https://securityboulevard.com/2026/03/middle-east-conflict-fuels-opportunistic-cyber-attacks/
如有侵权请联系:admin#unsafe.sh