Unit 42 has identified an ongoing cyber-espionage campaign conducted by Ashen Lepus, a Hamas-affiliated Advanced Persistent Threat (APT) group also tracked as WIRTE. The campaign targets governmental and diplomatic organizations across the Middle East using a newly developed malware suite called AshTag. This new toolset, written in .NET, demonstrates a marked improvement in the group's technical capabilities and operational security. The threat actor has evolved from moderately sophisticated to employing advanced techniques such as in-memory payload execution and stronger encryption to maintain a low profile and achieve its intelligence-gathering objectives.
Ashen Lepus has a history of targeting entities in the Middle East for espionage purposes. This latest campaign continues that focus, specifically targeting diplomatic and government networks. The group's methodology has been described as "low-cost, high-impact," but recent activity shows a clear investment in developing more resilient and evasive tools. The campaign has persisted even after the October 2025 Gaza ceasefire, indicating a long-term strategic commitment to its intelligence-gathering mission.
AshTag is a modular malware suite that provides the attackers with a flexible platform for post-compromise activities. Its core components are written in .NET, a common choice for malware developers due to its power and versatility.
Key features and TTPs include:
T1055 - Process Injection). This is a fileless malware technique that helps evade detection by traditional antivirus software that relies on scanning files on disk.T1568.002 - Domain Generation Algorithms). This helps C2 traffic blend in with normal network activity and bypass domain-based blocklists.The primary goal of the Ashen Lepus campaign is espionage. A successful intrusion into a governmental or diplomatic network could lead to the theft of highly sensitive information, including political strategies, negotiation positions, intelligence data, and personal information of government officials. This stolen data could provide a significant strategic advantage to Hamas and its sponsors. The group's improved TTPs increase the likelihood of a successful, long-term compromise, as they are better able to evade detection and maintain persistence.
No specific IOCs were provided in the source reports.
T1059.001).Detecting an evolving threat like Ashen Lepus requires a defense-in-depth strategy.
Utilize EDR solutions to detect and block malicious behaviors associated with fileless malware, such as process injection and in-memory execution.
Implement egress filtering and SSL/TLS inspection to identify and block C2 communications, even when they are encrypted or use legitimate-looking domains.
Mapped D3FEND Techniques:
Use application control policies to restrict the execution of unauthorized scripts and .NET assemblies, preventing the initial payload from running.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats