Lebanese Cedar
Repository Navigation
- Actor workbench: Lebanese Cedar
- TTP-to-detection matrix: all mapped techniques
- Surface and capability routes: Internet-Facing Servers, Webshells, And Passive Access
- Detection status: dashboard
- Hunt workflow: hunt workflow
- ATT&CK mappings: T1190 Exploit Public-Facing Application (M2); T1505.003 Web Shell (M2)
- Mapped detections: DET-003 Unitronics PLC HMI Web Interface Access (Hunt, DRL-4)
- Mapped hunts: HUNT-003 If exposed PLC/HMI surfaces are targeted then OT management paths or ports will show external access
- IOC reference sources:
SRC-CLEARSKY-LEBANESE-CEDARWebshell paths; malware references; vulnerable products - Tool detail pages:
Explosive RAT;Caterpillar WebShell - Tool matrix: all actor-linked tools (2 mapped tool row(s))
- Evidence records:
EVD-012/CLM-LEBANESECEDAR-001 - Imported research intakes: None currently mapped.
- Intel update candidates: 1 current candidate(s)
- Source IDs in structured data:
SRC-CLEARSKY-LEBANESE-CEDAR
Aliases: Volatile Cedar.
Assessed sponsor: Lebanon-linked / Hezbollah-linked in public reporting.
Relevance
Lebanese Cedar is relevant as a regional espionage threat with public reporting around web compromise and telecom or hosting interest. Israel-government relevance is medium and depends on exposed web infrastructure, suppliers, and regional operations.
Defensive Focus
- Webshell detection.
- Public-facing server patching.
- Hosting-provider visibility.
- Long-lived persistence on Linux and web servers.
Detection Ideas
- Unexpected web server process spawning shell commands.
- New PHP/ASP files under upload directories.
- Long-lived outbound connections from web servers.
- Exploitation of unpatched Confluence (CVE-2019-3396) or Oracle WebLogic (CVE-2019-2725) for initial access.
- Caterpillar WebShell (JSP file browser) artefacts under web roots.
Repository Sources
SRC-CLEARSKY-LEBANESE-CEDAR: ClearSky primary research — Volatile Cedar / Lebanese Cedar, covering Explosive RAT, Caterpillar WebShell, and compromised web servers (January 2021).SRC-CP-VOLATILE-CEDAR-2015: Check Point Volatile Cedar technical report retrieved from a public Kaspersky-hosted mirror after the original Check Point PDF URL returned 404.SRC-ISRAELHAYOM-ZIV-2023andSRC-TOI-ZIV-2023: secondary coverage of Israeli government statements about the Ziv Hospital incident. Use as context only until a primary government technical report is available.