Desert Falcons

Description

(Kaspersky) The Global Research and Analysis Team (GReAT) at Kaspersky Lab has uncovered new targeted attacks in the Middle East. Native Arabic-speaking cybercriminals have built advanced methods and tools to deliver, hide and operate malware that they have also developed themselves. This malware was originally discovered during an investigation of one of the attacks in the Middle East.

Political activities and news are being actively used by the cybercriminals to entice victims into opening files and attachments. Content has been created with professionalism, with well-designed visuals and interesting, familiar details for the victims, as if the information were long awaited.

The victims of the attacks to date have been carefully chosen; they are active and influential in their respective cultures, but also attractive to the cybercriminals as a source of intelligence and a target for extortion.

The attackers have been operating for more than two years now, running different campaigns, targeting different types of victims and different types of devices (including Windows- and Android-based). We suspect that at least 30 people distributed across different countries are operating the campaigns.

Recorded Future found possible overlap with Cyber fighters of Izz Ad-Din Al Qassam, Fraternal Jackal.

Names

NameName-Giver
Desert FalconsKaspersky
APT-C-23Qihoo 360
Two-tailed ScorpionQihoo 360
Arid ViperPalo Alto
ATK 66Thales
TAG-CT1Recorded Future
TAG-63Recorded Future
MantisSymantec
NiobiumMicrosoft
Pinstripe LightningMicrosoft
Renegade JackalCrowdStrike
Scimitar?

Country

Hamas

Motivation

  • Information theft and espionage

First Seen

2011

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Other Information

Uuid

d337940e-7ef9-4b4e-8c04-c6472d6b8972

Last Card Change

2025-06-28