WIRTE, identified as a threat actor by cybersecurity researchers, is suspected to be part of a larger network of malicious entities including Molerats, Gaza Cybergang, and Frankenstein. The cybersecurity industry has recognized that WIRTE overlaps with these other groups, although the specific relationships are not entirely clear. There is low confidence evidence suggesting that WIRTE may be a subgroup under the Gaza Cybergang umbrella. This Middle Eastern advanced persistent threat (APT) group has historically operated in the interests of the Palestinian Territories. The modus operandi of WIRTE includes deploying Visual Basic Script (VBS), likely through spear phishing, using decoys with Arabic content occasionally associated with Palestinian matters.
The first significant activity from WIRTE was detected in mid-2023 when Proofpoint researchers discovered a labyrinthine infection chain targeting Middle Eastern governments. This new initial access downloader was dubbed IronWind. Whether WIRTE is an evolution of existing Gaza Cybergang subgroups or a new entity altogether, it has been observed expanding its presence in cyberspace, employing updated and stealthier tactics, techniques, and procedures (TTPs). The group's toolset and operational methods have been modified to maintain a longer period of stealth.
Despite the relative simplicity of their TTPs, WIRTE operators have managed to remain undetected for extended periods. If the tentative association between WIRTE and the Gaza Cybergang is confirmed, this could indicate a shift in the group's motivations. However, due to the complex and often overlapping nature of these threat actors, definitive conclusions require further investigation and analysis.
Description last updated: 2024-05-05T04:59:07.516Z