Messiah spy malware uncovered

Powered by SC Magazine

Code written in Persian.

Security researchers said Tuesday they have come across a new strain of espionage malware that has successfully infected 800 different organizations this year in the Middle East to steal information and spy on communications.

The victims are nabbed via enticing "spear phishing" emails that come outfitted with malicious Microsoft PowerPoint and Word files that trick the recipients into installing a trojan dropper by presenting them with pleasant outdoor images. In another case, the malware downloader was disguised by an actual article on cyberwarfare that appeared in The Daily Beast.

No zero-day vulnerabilities were needed -- the victims were infected by merely running the malicious code, dubbed Mahdi (which roughly translates Messiah), said Aviv Raff, CTO of Seculert, an Israeli security firm that first discovered the threat in February.

Raff told SC he and his team found that the malware's communication strings were written in Persian, which caught their attention as they had never seen that before. Persian is mostly spoken in Iran and Afghanistan.

Raff said researchers including members of Kasperky determined that the compromised machines belong to critical infrastructure entities, financial services firms and government agencies operating mostly in Iran, but also Israel, Afghanistan, the United Arab Emirates, and Saudi Arabia.

The malware is capable of logging keystrokes, recording audio and capturing screen shots.

It's too early in the studying process to consider Mahdi something similar to the U.S.-engineered Flame virus, which was unique for its complex code and world-class delivery mechanisms, both of which are not seen in this malware.

But Raff said the type of victims and targeted nature of the espionage assaults means the possibility exists that the malware secured nation-state backing.

He said analysis found that each infected machine communicated with the command-and-control (C&C) server by using a unique identifier and a prefix for each targeted organisation.

Researchers determined that, based on the prefixes, about a dozen people were involved in the espionage operation, meaning it may have necessitated a heavy financial investment.

"It requires many people to do this work manually, both sending these spear phishing emails and going through the surveillance data it collects," Raff said.

He added that the attack has been ongoing since roughly December -- the attackers initially set up their C&C server in Iran but moved it to Canada -- and that "large amounts of data" have been collected in the campaign by its adversaries.

Why nobody flagged the malware prior to Seculert, which turned up in its honeypot traps, is unclear.

"It was probably detected, but went under the radar," Raff said.

This article originally appeared at

Copyright © SC Magazine, US edition

Messiah spy malware uncovered
Top Stories
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
Doubts cast on Queensland's ICT Dashboard
Opposition, former Govt CIO say it can't be trusted.
Sign up to receive iTnews email bulletins
Latest Comments
What is delaying adoption of public cloud in your organisation?

   |   View results
Lock-in concerns
Application integration concerns
Security and compliance concerns
Unreliable network infrastructure
Data sovereignty concerns
Lack of stakeholder support
Protecting on-premise IT jobs
Difficulty transitioning CapEx budget into OpEx