PULSE NAME
Middle East Conflict Fuels Opportunistic Cyber Attacks
WHITE Mustang Panda AlienVault 2026-03-06 Modified: 2026-04-05
34
IOCs
MEDIUM VOLUME
The ongoing conflict in the Middle East has triggered a surge in cybercriminal activity. Over 8,000 newly registered domains with conflict-related keywords have been identified, many of which may be weaponized in future campaigns. Multiple cases of malicious activity have been observed, including targeted attacks using conflict-themed lures, deployment of the LOTUSLITE backdoor, fake news blogs leading to StealC malware, phishing sites impersonating government portals, donation scams, fraudulent storefronts, and meme-coin pump-and-dump schemes. Threat actors are leveraging various techniques such as DLL sideloading, shellcode execution, and social engineering to compromise victims. The campaigns demonstrate the opportunistic nature of cybercriminals in exploiting geopolitical events for malicious purposes.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
LOTUSLITE StealC
Indicators of Compromise (5 / 34 total)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL domain hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 24b11b4b999b385bede48ad9f0570e2e5da4a2054b96738b1e4d4946ece94bc1 2026-03-06
FileHash-SHA256 4fb9b5d115bceee45a89447fb2565faef07452cda6b8e244e53ad91499c3d9b5 2026-03-06
FileHash-SHA256 819f586ca65395bdd191a21e9b4f3281159f9826e4de0e908277518dba809e5b 2026-03-06
FileHash-SHA256 8564763407064117726211ff8f89555e5a3b2b70bc9667032abd69cbe53b5216 2026-03-06
FileHash-SHA256 db40546435a7c42b32493301e333c8c0010e652fecd02463614a386f916055ec 2026-03-06