
However, “it is safe to estimate that the cybercriminal group likely went after more than those we investigated,” he said.

Liviu Arsene, global cybersecurity analyst with Bitdefender, told Threatpost that researchers can’t specify how many companies have been targeted in each country.

Victims of the analyzed campaigns fit into the pattern preferred by this actor, such as air transport and government sectors in the Middle East.” “The campaigns were based on several tools, including ‘living off the land’ tools, which makes attribution difficult, as well as different hacking tools and a custom built backdoor. “Researchers have found attacks conducted by this actor in the Middle East region, dating back to 2018,” according to a Thursday Bitdefender analysis. Living off the land tools are features already existing in the target environment, which are abused by attackers to help them achieve persistence. The campaigns used a bevy of custom-built tools, as well as “living off the land” tactics. This most recent wave of cyberattacks started in 2018 and have lasted until at least the end of 2019, targeting several unnamed organizations based in Kuwait and Saudi Arabia. The Chafer APT has been active since 2014 and has previously launched cyber espionage campaigns targeting critical infrastructure in the Middle East. The attacks have hit several air transportation and government victims in hopes of data exfiltration.

Researchers have uncovered new cybercrime campaigns from the known Chafer advanced persistent threat (APT) group.
