thehackernews.com
Open in
urlscan Pro
2606:4700:20::681a:161
Public Scan
URL:
https://thehackernews.com/2021/11/microsoft-warns-about-6-iranian-hacking.html
Submission: On November 22 via api from US — Scanned from DE
Submission: On November 22 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Cybersecurity Newsletter — Stay Informed</div>
<p>Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox daily.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Enter your email address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
Follow us Subscribe to Newsletter * Home * Newsletter * Offers * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Malware * Offers * Contact Resources * THN Store * Free eBooks * Freebies * RSS Feeds About Site * About Us * Our Team * Jobs * Advertise With Us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel MICROSOFT WARNS ABOUT 6 IRANIAN HACKING GROUPS TURNING TO RANSOMWARE November 17, 2021Ravie Lakshmanan Nation-state operators with nexus to Iran are increasingly turning to ransomware as a means of generating revenue and intentionally sabotaging their targets, while also engaging in patient and persistent social engineering campaigns and aggressive brute force attacks. No less than six threat actors affiliated with the West Asian country have been discovered deploying ransomware to achieve their strategic objectives, researchers from Microsoft Threat Intelligence Center (MSTIC) revealed, adding "these ransomware deployments were launched in waves every six to eight weeks on average." Of note is a threat actor tracked as Phosphorus (aka Charming Kitten or APT35), which has been found scanning IP addresses on the internet for unpatched Fortinet FortiOS SSL VPN and on-premises Exchange Servers to gain initial access and persistence on vulnerable networks, before moving to deploy additional payloads that enable the actors to pivot to other machines and deploy ransomware. Another tactic incorporated into the playbook is to leverage a network of fictitious social media accounts, including posing as attractive women, to build trust with targets over several months and ultimately deliver malware-laced documents that allow for data exfiltration from the victim systems. Both Phosphorus and a second threat actor dubbed Curium have been spotted incorporating such "patient" social engineering methods to compromise their targets "The attackers build a relationship with target users over time by having constant and continuous communications which allows them to build trust and confidence with the target," MSTIC researchers said. In many of the cases we have observed, the targets genuinely believed that they were making a human connection and not interacting with a threat actor operating from Iran." A third trend is the use of password spray attacks to target Office 365 tenants targeting U.S., E.U., and Israeli defense technology companies, details of which Microsoft publicized last month, while attributing it to an emerging threat cluster DEV-0343. Furthermore, the hacker groups have also demonstrated the capability to adapt and shape-shift depending on their strategic goals and tradecraft, evolving into "more competent threat actors" proficient in disruption and information operations by conducting a spectrum of attacks, such as cyber espionage, phishing and password spraying attacks, employing mobile malware, wipers and ransomware, and even carrying out supply chain attacks. The findings are especially significant in light of a new alert issued by cybersecurity agencies from Australia, the U.K., and U.S., warning of an ongoing wave of intrusions carried out by Iranian government-sponsored hacking groups by exploiting Microsoft Exchange ProxyShell and Fortinet vulnerabilities. "These Iranian government-sponsored APT actors can leverage this access for follow-on operations, such as data exfiltration or encryption, ransomware, and extortion," the agencies said in a joint bulletin published Wednesday. Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post. SHARE Share Tweet Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram Comments SHARE Iranian Hackers, Microsoft, ransomware Popular This Week 11 Malicious PyPI Python Libraries Caught Stealing Discord Tokens and Installing Shells U.S., U.K. and Australia Warn of Iranian Hackers Exploiting Microsoft, Fortinet Flaws SharkBot — A New Android Trojan Stealing Banking and Cryptocurrency Accounts FBI Issues Flash Alert on Actively Exploited FatPipe VPN Zero-Day Bug Researchers Demonstrate New Way to Detect MitM Phishing Kits in the Wild Experts Expose Secrets of Conti Ransomware Group That Made 25 Million from Victims Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic Comments Latest Stories Other Stories Reduce Recurring Vulnerabilities Watch the video to find out how Alice the AppSec Manager turned her consistent bad days around with help from Secure Code Warrior. Building a software security program for your development team Download this whitepaper to find out why developers need to go beyond the OWASP Top 10 for secure coding mastery. Best Practices to Thwart Business Email Compromise (BEC) Attacks Here is a solution to help you detect and stop spoofing and account takeover attacks. Learn to Code — 13 Online Courses Learn to Code — Get 2021 Master Bundle of 13 Online Courses @ 99% OFF Online Courses and Software Ethical Hacking - Practical Training 10 courses + 1,236 lessons on latest techniques, forensics, malware analysis, network security and programming. 1000+ Premium Online Courses With course certification, Q/A webinars and lifetime access. Cybersecurity Certification Training CISA, CISM, CISSP, PMI-RMP, and COBIT 5 certifications. CompTIA IT Certification Training Lifetime access to 14 expert-led courses. Cybersecurity Newsletter — Stay Informed Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox daily. Email Follow Us 760,100 Followers 1,985,000 Followers 275,100 Followers 18,500 Subscribers 125,500 Followers About * About Us * Advertising * Editorial Team * Contact Pages * RSS Feeds * Deals Store * Privacy Policy * Jobs Deals * Exclusives * Hacking * Development * Android RSS Feeds Contact Us Telegram Channel © The Hacker News, 2021. All Rights Reserved.