The WIRTE threat actor, previously associated with the Hamas-affiliated Gaza Cybergang, continues to be active in the Middle East despite the ongoing war in the region. The conflict has not disrupted their operations, and they are leveraging recent events in the region for espionage operations, likely targeting entities in the Palestinian Authority, Jordan, Iraq, Egypt, and Saudi Arabia. WIRTE has expanded its activities beyond espionage and is now conducting disruptive attacks. Research has identified links between custom malware used by the group and SameCoin, a wiper malware targeting Israeli entities in two waves in February and October 2024. The group’s operations are characterized by consistent patterns, including domain naming conventions, communication via HTML tags, responses limited to specific user agents, and redirection to legitimate websites. While their tools have evolved, these core aspects remain consistent, making them a persistent threat in the Middle East.
South Korea’s military has accused North Korea of a GPS signal jamming attack. The jamming occurred on Friday and continued into Saturday, impacting various vessels at sea and a significant number of aircraft. This incident underscores the potential threat posed by GPS signal jamming and the vulnerabilities of navigation systems relying on this technology. It also highlights the escalating tensions on the Korean Peninsula, with North Korea’s actions raising concerns about regional security.