Iran’s Cyberwar Could Infiltrate Your Mailbox

Iran’s crackdown on protesters could affect almost anyone in contact with them, thanks to a sophisticated internal police operation that routinely targets not only academics and dissidents but also those who have interacted with them, and even people only tangentially linked. 

Cyber security firms and prominent researchers of Iranian digital espionage efforts say one government-backed group in particular, Infy, will likely continue to increase its attacks even after the current unrest ends.

The Iranian security forces use many of the same tactics that nation-state actors and criminal groups deploy against corporate and political victims, particularly spear phishing, basically, emails from a phony source that urge the recipient to click a link that downloads information-exfiltrating malware. But unlike common crooks, Tehran and its agents are constantly refining and improving their phishing emails.

The Infy group is highly adaptable and regularly attacks targets inside Iran and beyond its borders. The group, or at least some of its code, goes back to 2007, according to research by Palo Alto Networks.  That’s several years before Iran stepped up its cyber warfare capabilities in response to the 2010 revelation of the Stuxnet virus attack. Infy has since become one of the primary malware agents operating out of Iran, with a particular focus on Iranian civil society, according to a 2016 paper by researchers Colin Anderson and Claudio Guarnieri.

Unlike some other Iranian cyber actors who target foreign aerospace and military commercial interests, Infy focuses on individuals who may be a political threat to Iran’s leaders and the way they govern.  

“Infy became one of the most frequently observed agents for attempted malware attacks against Iranian civil society beginning in late 2014, growing in use up to the February 2016 parliamentary election in Iran,” write Anderson and Guarnieri.
“While the near majority of the victims are located in Iran, the remaining hosts are widely distributed around the world, with a higher concentration in the United States, Sweden, Germany and Iraq, locations with large Iranian diasporas or regional interests. Several compromised systems maintain a clear relationship to regional adversaries and foreign entities that Iran maintains an espionage interest in.”

Infy likes to send PowerPoint decks with malware embedded in the title slide. When clicked, they install software that Infy can use to log keystrokes and remove data. Interestingly, the group repeatedly used the name “Amin Jalali” to register the email addresses it uses in attacks. “The contact information on these domains have been updated in recent months with false identities attributed to Poland and India to masque the original registrant, however, the ownership and contact email remains the same,” they report.

Spear phishing is nothing new. But an intelligence service backed by the resources of a nation-state can make it far more effective. Anderson and Guarnieri document a slow and steady evolution in the sophistication and effectiveness of Infy attacks, moving from blank emails containing only files with provocative titles to tailored pitches aimed at specific individuals, primarily, Western media companies that might be in contact with dissidents. 

The level of impersonation grew significantly between the group’s early days and today. In 2016, “one message claimed to be from Mohammad Taghi Karroubi, the son of reformist politician Mehdi Karroubi who ran for presidency in the 2009 elections and has been under house arrest since February 2011,” they write.

Most important, Infy modifies its tactics once defenders sniff them out as Palo Alto’s Tomer Bar and Simon Conant documented within the past six months.

Defense One

You Might Also Read: 

Iran Turns Off The Internet:

Iran Responsible  For Cyber Attack On British Parliament:

Phishing Is  The Top Cyberattack Vector In 2017:

 

« Winter Olympics Targeted
Iran’s Cyber Capabilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center (MCC)

Maritime Cybersecurity Center is a not-for-profit organization focused on regional cybersecurity excellence and readiness, with a special emphasis on the maritime community.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Honeywell Process Solutions (HPS)

Honeywell Process Solutions (HPS)

Honeywell's Industrial Cyber Security Solutions help plants and critical infrastructure sectors defend the availability, reliability and safety of their industrial control systems.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.