Tag

Iranian Hackers

All articles tagged with #iranian hackers

"US Targets Iranian Hackers and Front Companies with Sanctions and Airstrikes"

Originally Published 1 year ago — by NBC News

Featured image for "US Targets Iranian Hackers and Front Companies with Sanctions and Airstrikes"
Source: NBC News

The Treasury Department has sanctioned six Iranian military hackers for cyberattacks against U.S. water companies, with the hackers posing as anti-Israel activists. The attacks, which occurred late last year, did not disrupt critical services but underscore the risk of internet-connected infrastructure and the potential for regional conflicts to lead to global cyberattacks. The hackers targeted Israeli infrastructure, particularly water systems, and successfully breached American facilities by exploiting default passwords. The sanctions prohibit American individuals and companies from doing business with the hackers, who were identified as a front for the Islamic Revolutionary Guard Corps.

Iranian Hackers Target US Water Systems in Sophisticated Cyber Attack

Originally Published 2 years ago — by Yahoo Finance

Featured image for Iranian Hackers Target US Water Systems in Sophisticated Cyber Attack
Source: Yahoo Finance

US authorities are working to contain a hacking campaign by Iranian hackers targeting multiple drinking water and sewage systems across the country. A small number of water utilities have been compromised, but there has been no known impact on safe drinking water or operational systems. The hackers, affiliated with the Iranian Government's Islamic Revolutionary Guard Corps, have been targeting programmable logic controllers made by an Israeli company called Unitronics, which are commonly used in water and wastewater systems. US agencies have issued a cybersecurity advisory warning about the breach potential of these controllers if connected to the internet. The fragmented nature of the US water industry and the lack of basic cybersecurity protections in many systems exacerbate the problem.

US Water Utilities Face Increasing Cybersecurity Threats

Originally Published 2 years ago — by CNN

Featured image for US Water Utilities Face Increasing Cybersecurity Threats
Source: CNN

Multiple water utilities in the US running the same Israeli-made computer system have been breached by hackers, according to federal officials. The cyberattacks, which have targeted less than 10 water facilities, have not caused disruptions or threatened drinking water. The hackers have defaced computer screens in low-level attacks, raising concerns among US officials. US and Israeli authorities have attributed the attacks to hackers affiliated with the Iranian government. Efforts are underway to remove industrial equipment from the internet to prevent further hacks. The US water sector has struggled to address cybersecurity threats due to limited resources.

Iranian Hackers Target Israel's Tech Sector in Cyber Attacks

Originally Published 2 years ago — by BleepingComputer

Featured image for Iranian Hackers Target Israel's Tech Sector in Cyber Attacks
Source: BleepingComputer

Iranian hacker group Imperial Kitten, also known as Tortoiseshell, TA456, Crimson Sandstorm, and Yellow Liderc, has been targeting transportation, logistics, and technology firms in Israel. The group, linked to the Iranian Revolutionary Guard Corps, has been active since 2017 and has targeted various sectors including defense, technology, telecommunications, maritime, energy, and consulting services. The recent attacks involved phishing emails with malicious attachments, allowing the hackers to gain access to the network and move laterally. The attacks were discovered by cybersecurity company CrowdStrike, who provided indicators of compromise for the malware and infrastructure used.

Iranian Hackers Enhance Cyber Espionage Tactics in the Middle East

Originally Published 2 years ago — by The Record from Recorded Future News

Featured image for Iranian Hackers Enhance Cyber Espionage Tactics in the Middle East
Source: The Record from Recorded Future News

Iranian hacker group Scarred Manticore, believed to be affiliated with Iran's Ministry of Intelligence and Security (MOIS), has been conducting an ongoing espionage campaign targeting government, military, and telecom sectors in the Middle East, including Saudi Arabia, UAE, Jordan, Kuwait, Oman, Iraq, and Israel. The group, active since at least 2019, has been infiltrating organizations to exfiltrate data using advanced malware called Liontail, which allows remote command execution. Scarred Manticore's tools and capabilities demonstrate the progress Iranian actors have made, and while there are overlaps with the Iranian hacker group OilRig, attribution is not definitive. The group's operations are expected to continue and potentially expand into other regions aligned with Iranian long-term goals.

Iranian Hackers Launch Cyber Attacks on Defense, Satellite, and Pharmaceutical Companies, Microsoft Reports

Originally Published 2 years ago — by CNN

Featured image for Iranian Hackers Launch Cyber Attacks on Defense, Satellite, and Pharmaceutical Companies, Microsoft Reports
Source: CNN

Iranian state-backed hackers have been targeting satellite, defense, and pharmaceutical firms in the US and globally, aiming to gather intelligence and potentially develop domestic production in these industries amidst heavy US sanctions. Microsoft analysts revealed that the hackers have successfully breached a few dozen organizations using a blunt hacking technique, highlighting their determination to access valuable intelligence. The sanctions have increased Iran's incentive to search for trade secrets held by foreign companies. The cyber-espionage campaign has continued throughout the summer, with the hackers employing a method of compromising identities by guessing common passwords. The Iranian government typically denies allegations of hacking, and the specific US companies breached have not been disclosed.

Iranian Hackers Target Defense, Satellite, and Pharmaceutical Firms in Breach Attacks

Originally Published 2 years ago — by BleepingComputer

Featured image for Iranian Hackers Target Defense, Satellite, and Pharmaceutical Firms in Breach Attacks
Source: BleepingComputer

Iranian-backed threat group APT33, also known as Peach Sandstorm, has been conducting password spray attacks since February 2023, targeting thousands of organizations worldwide, including those in the defense, satellite, and pharmaceutical sectors. The group has been active since 2013 and has shown interest in various industry verticals. Microsoft's Threat Intelligence team has observed the hackers using sophisticated tactics, such as exploiting unpatched appliances and using compromised Azure credentials. The attacks are believed to be aimed at facilitating intelligence collection in support of Iranian state interests. Password spray attacks have become increasingly popular, accounting for a significant number of enterprise account compromises.

US Military Foils Iranian Hackers Attempt to Manipulate 2020 Election Results.

Originally Published 2 years ago — by CNN

Featured image for US Military Foils Iranian Hackers Attempt to Manipulate 2020 Election Results.
Source: CNN

Iranian hackers accessed a US municipal website for reporting unofficial election results in 2020 but were kicked off the network by US military hackers and didn’t have any impact on voting, a top US general said. The US military then executed its own cyber operation to kick the Iranians off of the network of the US city to ensure the Iranian hackers were “unable to come back into the network” in the runup to the 2020 election. The episode illustrates how cyberspace has become a key frontier in various governments’ efforts to shape, influence and defend elections.

Iranian Hackers Utilize SimpleHelp Software for Long-Term Access

Originally Published 2 years ago — by The Hacker News

Featured image for Iranian Hackers Utilize SimpleHelp Software for Long-Term Access
Source: The Hacker News

Iranian threat actor MuddyWater has been using the legitimate remote support software SimpleHelp to ensure persistence on victim devices. The group, believed to be a subordinate element within Iran's Ministry of Intelligence and Security, has previously used ScreenConnect, RemoteUtilities, and Syncro. SimpleHelp is not compromised and is used as intended, with the threat actors downloading the tool from the official website. The exact distribution method used to drop the SimpleHelp samples is currently unclear, although the group is known to send spear-phishing messages bearing malicious links from already compromised corporate mailboxes.