Jerusalem | An Iranian group of hackers are exploiting a recently discovered critical vulnerability in tiny sub-software widely distributed across the world to attack government targets in Israel, according to an Israeli cybersecurity firm that claims it has blocked attacks.
A group of hackers associated with the Iranian regime and named Charming Kitten or APT 35, exploited the flaw in Log4j to carry out attacks against seven targets in Israel, including government sites, said Israeli cybersecurity firm Check Point Software. Technologies.
“Check Point blocked these attacks because we witnessed communications between a server used by this group and targets in Israel,” the company said in a statement Wednesday.
In some versions of Log4j, included in many software, a flaw makes it very easy to take control of the machine that hosts it. The hacker can then start trying to circulate in the victim’s computer network and deploy ransomware (viruses) and spy tools there.
Since 2010, Iran on the one hand, Israel and the United States on the other, have regularly accused each other of cyberattacks.
In recent weeks, several Israeli websites have been the target of computer attacks blamed by experts on Iran, the sworn enemy of the Hebrew state.
In early November, the “Black Shadow” group, presented by specialists as linked to Iran, had disseminated the data of many users of an LGBTQ dating site. And in October, Israel said it had suffered “for the first time” in its history a “major” ransomware cyberattack on a public hospital.
For its part, Tehran recently accused Washington and the Jewish state of a cyberattack that disrupted its fuel distribution system.
Last week, Israel announced it had conducted a groundbreaking 10-day exercise that simulated an international attack on financial systems.
Ten countries, including the United States, Germany, Italy and the United Arab Emirates took part in this virtual “war game” aimed at strengthening international cooperation against computer hackers.