Iran Pays $Mulitmillion Ransom To Protect Its Banks

A massive cyber attack that hit Iran recently threatened the stability of its banking system and forced the country's regime to agree to a ransom deal of millions of dollars, according to official sources. Analysis say this attack becomes one of the largest breaches that the country has faced in its cyber history.

A group known as IRLeaks, which has a history of hacking Iranian companies, was likely behind the breach, the officials said. 

The hackers are said to have initially threatened to sell the data they collected, which included the personal account and credit card data of millions of Iranians, on the Dark Web unless they received $10 million in crypto-currency, but later settled on a smaller sum.  

Iran’s highly centralised religious regime is understood to have pushed for the ransom to be paid, fearing that word of the data theft would destabilise the country’s weak financial system, which is under intense strain amid the international sanctions the country faces.

Iran has not acknowledged the breach, which forced banks to shut down cash machines across the country in August.Though the attack was reported at the time by Iran International, an opposition news outlet, neither the suspected hackers nor the ransom demands were disclosed.  Iran’s supreme leader, Ayatollah Ali Khamenei, delivered a cryptic message in the wake of the attack, blaming the US and Israel for “spreading fear among our people,” without acknowledging the country’s banks were under assault. 

“The enemy’s goal is to spread psychological warfare to push us into political and economic retreat and achieve its objectives,” the Ayatollah said.

That accusation seemed plausible given the broader tensions between Israel, the US and Iran. While Tehran blames Israel for the recent assassination of a senior Hamas leader in Iran, Washington accuses Iran of trying to influence the US election by hacking into Donald Trump’s campaign operation. 

Online extortion in Iran is nothing new.  In December, IRLeaks claimed to have stolen the customer data of nearly two dozen Iranian insurance companies, and of hacking into Snapp Food, a delivery service. Though the companies agreed to pay ransom to IRLeaks, it was far less than the group received from the banking hack.

IRleaks entered the banks’ servers via a company called Tosan, which provides data and other digital services to Iran’s financial sector. Using Tosan as a Trojan horse, the hackers appear to have exfiltratd data from both private banks and Iran’s central bank. Of Iran’s 29 active credit institutions, as many as 20 were hit, said the officials, who requested anonymity in order to reveal sensitive information. Among the affected banks were the Bank of Industry and Mines, Mehr Interest-Free Bank, Post Bank of Iran, Iran Zamin Bank, Sarmayeh Bank, Iran-Venezuela Bi-National Bank, Bank Day, Bank-e Shahr, Eghtesad Novin Bank, and Saman, which also has branches in Italy and Germany.

The government ultimately insisted that Tosan to pay the IRLeaks ransom, a personal familiar with the events said.  What isn’t clear is whether the hackers used Tosan to hit other targets in Iran. The firm has a wide customer base, including government entities beyond the central bank.

Iran’s financial sector has long been the country’s Achilles heel and its banks are undercapitalised and overburdened with  by loans they are forced to make to the government, which counts as the sector’s biggest borrower. In February, Iran’s central bank chief said that eight of the country’s banks were facing severe difficulties and would either be merged or dissolved.

 Iranian citizens have little choice but to continue to keep their money in their local banks and rely on them to handle their daily transactions in cash, and  with an inflation rate of nearly 40 percent, Iranians have shown little appetite for  digital payments.

The banking system’s overall fragility leaves individual lenders exposed to sudden bank runs. That danger might explain why the regime refused to publicly acknowledge the attack and pressured Tosan to pay the hackers.

AAAwsat   |    Iran International  |    Politico   |   Scope24   |   Cybersecurity-Insiders    |   Niksun / LinkedIn

Image: Ideogram

You Might Also Read: 

Combatting Zero-Day Exploits In Financial Services:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« US Healthcare Firm Loses 22GB of Data
New Exploits & Examples Of Online Fraud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

National Cyber Security Directorate (DNSC) - Romania

National Cyber Security Directorate (DNSC) - Romania

DNSC (formerly CERT-RO) is the Romanian national cyber security and incident response team.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

National Institute of Information and Communications Technology (NICT) - Japan

National Institute of Information and Communications Technology (NICT) - Japan

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.

ALSO Group

ALSO Group

ALSO is one of the leading technology providers for the ICT industry currently active in 31 countries in Europe and in many countries worldwide via PaaS (Platform as a Service) partners.