Threats Feed|Greenbug|Last Updated 10/04/2025|AuthorCertfa Radar|Publish Date24/10/2017

Potential Cyber Targets Revealed in Greenbug's Domain Registrations: Israeli and Saudi Firms in Focus

  • Actor Motivations: Undetected
  • Attack Vectors: Malware,Phishing
  • Attack Complexity: Unknown
  • Threat Risk: Low Impact/Low Probability

Threat Overview

The Iranian threat agent Greenbug registered domains similar to Israeli high-tech and cybersecurity companies, as well as a Saudi Arabian electrical equipment firm. A sample of the ISMdoor malware was submitted from Iraq on October 15, 2017, indicating the threat actor's activities. Despite these registrations, no evidence of direct targeting or impact on these companies is present. High-tech, cybersecurity, online advertising, airport security systems, web development, behavioral biometrics, artificial intelligence, data security, and autonomous driving are sectors potentially of interest to the actor.

Detected Targets

TypeDescriptionConfidence
CaseArbe Robotics
An Israeli company developing autonomous driving technology. Arbe Robotics has been targeted by Greenbug with unknown purposes.
Verified
CaseBiocatch
An Israeli company developing technology for behavioral biometrics for fraud prevention and detection. Biocatch has been targeted by Greenbug with unknown purposes.
Verified
CaseCortica
An Israeli company developing Artificial Intelligence technology. Cortica has been targeted by Greenbug with unknown purposes.
Verified
CaseCovertix
An Israeli data security company. Covertix has been targeted by Greenbug with unknown purposes.
Verified
CaseOutbrain
A major Israeli online advertising company. Outbrain has been targeted by Greenbug with unknown purposes.
Verified
CaseSecureLogic
Likely an Israeli marketer of airport security systems. SecureLogic has been targeted by Greenbug with unknown purposes.
Verified
CaseThetaRay
An Israeli cyber security and big data analytics company. ThetaRay has been targeted by Greenbug with unknown purposes.
Verified
CaseWix
A major Israeli cloud-based web development platform. Wix has been targeted by Greenbug with unknown purposes.
Verified
CaseYMAAZE
A Saudi Arabian testing & commissioning of major electrical equipment company. YMAAZE has been targeted by Greenbug with unknown purposes.
Verified
SectorHigh-Tech
Medium
SectorInformation Technology
Medium
RegionIsrael
There is no explicit information in the report indicating that specific countries were targeted by the attack. However, it is mentioned that the domains registered by the threat actor are similar to those of Israeli and Saudi Arabian companies. This could imply an interest in these regions, but there's no confirmation of actual targeting based on the given information.
Medium
RegionSaudi Arabia
Medium

Extracted IOCs

  • allsecpackupdater[.]com
  • arbescurity[.]com
  • benyaminsecupdater[.]com
  • biocatchsecurity[.]com
  • corticasecurity[.]com
  • covertixsecurity[.]com
  • dnsupdater[.]com
  • lbolbo[.]com
  • mbsmbs[.]com
  • ntpupdateserver[.]com
  • oospoosp[.]com
  • osposposp[.]com
  • outbrainsecupdater[.]com
  • securelogicupdater[.]com
  • securepackupdater[.]com
  • thetaraysecurityupdate[.]com
  • thetareysecurityupdate[.]com
  • winscripts[.]net
  • winsecupdater[.]com
  • wixwixwix[.]com
  • ymaaz[.]com
  • znazna[.]com
  • 37d586727c1293d8a278b69d3f0c5c4b
  • 82755bf7ad786d7bf8da00b6c19b6091
  • ad5120454218bb483e0b8467feb3a20f
  • e0175eecf8d31a6f32da076d22ecbdff
  • f5ef3b060fb476253f9a7638f82940d9
  • 3b0b85ea32cab82eaf4249c04c05bdfce5b6074ca076fedf87dbea6b28fab99d
  • 151[.]80.113.150
  • 151[.]80.221.23
  • 217[.]182.244.254
  • 46[.]105.130.98
  • 5[.]39.31.91
  • 80[.]82.66.164
download

Tip: 34 related IOCs (6 IP, 22 domain, 0 URL, 0 email, 6 file hash) to this threat have been found.

FAQs

Iranian Threat Actor Spoofs Israeli Cyber Firms

An Iranian threat group, Greenbug, registered several deceptive domains resembling Israeli tech and cybersecurity companies, potentially to use them in cyberattacks.

The activity is attributed to Greenbug, a known Iranian threat actor previously linked to cyber espionage campaigns.

While no attacks were confirmed, the infrastructure indicates a likely intent to deceive targets through impersonation, potentially to deploy malware or gather sensitive data.

The spoofed domains suggest a focus on cybersecurity, online advertising, AI, and web development firms—mainly Israeli, with one Saudi company included.

The group registered lookalike domains and used some of them for malware command and control, a common method for managing compromised systems.

Cybersecurity and high-tech companies often hold valuable intellectual property or customer data, making them attractive to nation-state actors.

They should monitor for fake domains, block malicious ones, educate employees about phishing, and inspect their networks for suspicious traffic or malware traces.

This appears to be a targeted campaign aimed at a specific set of companies, likely based on geopolitical interests.

About Affiliation
Greenbug