Threat Actor Deadeye Jackal

 





Overview

Deadeye Jackal, also known as Syrian Electronic Army (SEA), Syria Malware Team, ATK 196, TAG-CT2, is a group of computer hackers that surfaced online in 2011 in support of the Syrian President Bashar-al-Assad. They have targeted many western organizations, human rights groups, political opposition groups, and websites. They make use of phishing, spamming, website defacement, malware, and denial of service attacks to execute their malicious plans. The government websites of the Middle East, Europe, and US defense contractors are also not safe from their hacking spree. 

Syria was the first Arab country to have a public Internet Army hosted on its national networks that can openly launch cyber attacks on its enemies. However, the nature of relationship between the government and the threat actor group has changed and unclear at present. 

Capabilities

The Deadeye Jackal group uses SilverHawk as a malware tool and it can do the following in a network and computer:
  1. Record audio or stream environment audio over raw socket when instructed.
  2. Click photos with device camera.
  3. Retrieve files from external storage like the files sent over Bluetooth, WhatsApp, Viber, Telegram, DCIM directories, Downloads, Pictures, etc.
  4. Enumerate installed apps including date and time.
  5. Attempt to execute attacker-specified commands or binary as roots. 
  6. Retrieve contacts and related data such as call logs, contacts, text messages, etc.
  7. Location, direction, and acceleration of the device. 
  8. Remotely updateable C2 IP and port. 
  9. Hide icon.
  10. Retrieve battery levels, WiFi and GPS status, storage and cellular carrier info. 

How Does It Work?

In the hacking campaign of the threat actor, their app uses fake versions of secure messaging apps like WhatsApp and Telegram to plant spyware on devices. As a tactic to remain undetected, the malicious app does not place an icon on the home screen. However, the app also avoids rapid battery drain, a sign of the installation of a malicious app. It has in-built two chances to connect back to its command and control servers.

As of now, the malicious app SilverHawk has been successful in carrying out its tasks while remaining stealthy at the same time. 

Conclusion

Deadeye Jackal is no doubt a dangerous threat actor, that has evolved significantly since its discovery. It uses many tactics and techniques, making it a major threat for everyone. Hence, it is of utmost importance for organizations as well as individuals to protect themselves from such cyber attacks via various protective measures like using strong passwords, keeping their software updated, and be careful from phishing emails.
























































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements