Iranian Hackers Have Infiltrated US Infrastructure

A new research published by the security firm FireEye says  Iran's hacking activity show no signs of slowing down. FireEye calls them Advanced Persistent Threat 34, and has spent the last few years burrowing deep into critical infrastructure companies.

Given how aggressively Iran has pursued infrastructure hacking, previously targeting the financial sector and even a dam in upstate New York, the new findings serve as a warning, and highlight the evolving nature of the threat.
FireEye researchers tracked 34 of the group's attacks on institutions in seven Middle Eastern countries between 2015 and mid-2017, but says APT 34 has been operational since at least 2014. 

The group appears to target financial, energy, telecommunications, and chemical companies, and FireEye says it has moderate confidence that its hackers are Iranians. 

They log into VPNs from Iranian IP addresses, adhere to normal Iranian business hours, their work has occasionally leaked Iranian addresses and phone numbers, and their efforts align with Iranian interests. Namely, targeting the country's adversaries.

New APT in Town
There isn't definitive evidence of a direct link between APT 34 and APT 33, an Iranian hacking group and malware distributor FireEye published findings on in September. But researchers have seen APT 34 operating concurrently inside many of the same target networks as other Iranian hackers.

"We have seen, and this is with a lot of the Iranian actors, a very disconcerting or aggressive posture towards critical infrastructure organizations," says John Hultquist, director of intelligence analysis at FireEye. 

"APT 33 has targeted a lot of organisations in critical infrastructure in the Middle East and so has APT 34. They obviously represent opportunities for intelligence collection. But we always have to think about the alternative use of those intrusions or accesses as possible means for disruption and destruction, especially given the destructive incidents we’ve already seen with other Iranian actors."

To establish what Hultquist describes as beachheads, APT 34 uses involved operations to move deeper and deeper into a network, or exploit a toehold within one organisation to pivot into another. FireEye has observed the group compromising someone's email account at a target company, rifling through their archive, and restarting threads as old as a year, to trick the recipient into clicking a malicious attachment. The hackers also use compromised email accounts to spearphishing other companies, and leapfrog into their systems as well.

News Outlet
Another hacker group “Charming Kitten” used false identities to ferret out information, says Israel-based cybersecurity firm ClearSky. The espionage group known as Charming Kitten is believed to be behind a campaign targeting academic researchers, human rights activists, media outlets and political advisors focusing on Iran, according to a report published recently by Israel-based threat intelligence company ClearSky Cyber Security

The group has also set up a news outlet called The British News Agency to lure targets in. Most of the group's targets are in Iran, the US, Israel and the UK, the report said, but some come from countries including France, Germany, Switzerland, Denmark, India, Turkey and the United Arab Emirates.

The report detailed the various methods used to gain access to computers and private social accounts. Those include false identities, the impersonation of real companies, the insertion of malicious code into a breached website, also known as "watering hole attacks," and spear phishing, the process of pretending to be service providers like Gmail or Facebook to trick people into giving out personal information. 

Much effort went into creating a seemingly legitimate website for The British News Agency, including details about the agency and a contact list of the management team. The purpose of the site was to attract the targets and infect them with malware. 
The scope and systemic character of the attack reveal that it's not a private venture, said Head of Threat Intelligence at ClearSky Eyal Sela in an interview with Calcalist, and the threat intelligence community is quite sure Charming Kitten is only one of several such groups that are linked to the Iranian regime. 

The attack was not made for financial gain, said Mr. Sela: "not one person hacked suffered financial damage. The identity of the attacked, human rights activists and people with political ties, does not support the thesis that the campaign is connected to criminal groups." 

The real purpose of the attack is to ferret out information about Iranian dissenters, said ClearSky CEO Boaz Dolev in an interview with Calcalist. "They want to know who the researchers are talking to," he said, adding that the targets' contact lists serve as a list of traitors. "They want to know who in Iran is in contact with such people out of the country." 
According to the report, multiple Israeli researchers of Iran and the Middle East were sent emails and Twitter direct messages from accounts registered with seemingly Jewish Israeli names. Messages coming from one such account were presented as if coming from a journalist and political researcher at KNBC News. 

Other messages were presented as if coming from an Israeli political researcher raised in California who needed help with an article and also wanted to apply for a position at an Israeli university. Another message was described as coming from a Jewish girl living in Iran. These messages often linked to phishing pages. ClearSky cannot estimate how many accounts were successfully infiltrated, but the success rate for such attacks is usually around 10%, said Mr. Dolev. 

ClearSky reports also point out a connection between Charming Kitten and Behzad Mesri, also known as "Skote Vahshat," the Egyptian citizen indicted by the FBI for hacking into HBO and leaking episodes of several series, including Game of Thrones. According to the FBI, Mesri has been a member of an Iran-based hacking group called the Turk Black Hat security team at certain times.

According to ClearSky, Mr. Mesri follows entities connected to Charming Kitten on Twitter, and was in the Turk Black Hat group at the same time as a hacker called ArYaIeIrA, who now also appears in multiple domains owned by Charming Kitten. The report's authors estimate "with medium certainty" the Mr. Mesri is directly connected to Charming Kitten, and potentially is part of Charming Kitten. D.C.-based Security researcher Collin Anderson previously hypothesized. 

The Iranian attackers are active hackers recruited by the Iranian authorities, and not officially people recruited at a young age and then trained for the job said, Mr. Sela.

That's why they leave a public residue, like signatures in the websites they hack. Many of the group's members are Facebook friends with Mr. Mesri, said Mr. Sela: "these are not people that approve every friend request. They have maybe 200 friends. They only confirm people they know."

Calcalistech:       Wired

You Might Also Read:

Iran Responsible  For Cyber Attack On British Parliament:

The Growing Cyber Threat From Iran:

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts:


 

« Popular Streaming Sites Secretly Mine Cryptocurrency
Intelligent & Autonomous Security Robots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

tunCERT

tunCERT

TunCERT is the National Computer Emergency Response Team of Tunisia.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

BalkanID

BalkanID

BalkanID is an Identity governance solution that leverages data science to provide visibility into your SaaS & public cloud entitlement sprawl.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

CNF Technologies

CNF Technologies

CNF Technologies is an award-winning cyber company providing technology-focused research and development to commercial, federal, and Department of Defense clients.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.