Skip to main content

U.S. Cybersecurity Firm Identifies Iranian Hacking Group Breaking into Middle East Networks

FeaturedImage_2018-07-27_123316_YouTube_Matrix_Numbers
U.S. Cybersecurity Firm Identifies Iranian Hacking Group Breaking into Middle East Networks
A United States cybersecurity firm has identified a “highly active” group of hackers reportedly based in Iran, who are attacking corporate and government networks across the Middle East, The Hill reported Wednesday.
A report issued by Symantec said that the hacking collective, which has been dubbed “Leafminer,” has attacked networks in Saudi Arabia, the United Arab Emirates, Qatar, Kuwait, Bahrain, Eqypt, Israel and Afghanistan.
Leafminer’s targets, according to The Hill, include the “energy, telecommunications, financial services, transportation and government” sectors.
According to Vikram Thakur, technical director at Symantec, Leafminer appears to have begun operations in 2017, but has increased its activity since the end of last year and is “continuing to conduct attacks as of right now.”
Symantec’s researchers found a list with approximately 800 target organizations written in Farsi. While all the groups in the list have some connection to Iran, Iran is not itself on the list. “From an analytics perspective, that just adds to the fact that they’re likely to be from Iran,” Thakur observed.
Analysts say that Leafminer seems particularly interested in hacking  into e-mails “to harvest communications and other data, likely for espionage purposes.”
Currently the group’s tactics do not appear to be very sophisticated, however, Thakur believes that they may have expanded the scope of their operations and targeted Western countries.
In 2016, the Justice Department indicted seven Iranians for carrying out cyber-attacks against dozens of American banks as well as a dam located in upstate New York. The hackers were identified as working for private security firms on behalf of Iran’s Islamic Revolutionary Guard Corps.
In November 2015, shortly after the nuclear deal was agreed to, the U.S. reported that Iranian cyber-espionage activities were increasingly aggressive and included attacks on the State Department.
In December of last year, a report released by FireEye, a cybersecurity firm, characterized Iranian hacking attempts as a “coordinated, probably military, endeavor.”
In Iran Has Built an Army of Cyber-Proxies, which was published in the August 2015 issue of The Tower Magazine, Jordan Brunner described Iran’s rise as a cyberwarfare power as a parallel development of its network of global terrorist proxies.
Iran is adept at building terrorist and other illicit networks around the world. Its cyber-capabilities are no different. It uses the inexpensive method of training and collaborating with proxies in the art of cyber-war. It may also have collaborated with North Korea, which infamously attacked Sony in response to the film The Interview. It is possible that Iran assisted North Korea in developing the cyber-capability necessary to carry out the Sony hack. While acknowledging that there is no definite proof of this, Claudia Rosett of the Foundation for Defense of Democracies raised the question in The Tower earlier this year.
More importantly, Iran is sponsoring the cyber-capabilities of terrorist organizations in Lebanon, Yemen, and Syria. The first indication of this was from Hezbollah. The group’s cyber-activity came to the attention of the U.S. in early 2008, and it has only become more powerful in cyberspace since then. An attack that had “all the markings” of a campaign orchestrated by Hezbollah was carried out against Israeli businesses in 2012.
Lebanon’s neighbor, Syria, is home to the Syrian Electronic Army (SEA), which employs cyber-warfare in support of the Assad regime. There are rumors that indicate it is trained and financed by Iran. The SEA’s mission is to embarrass media organizations in the West that publicize the atrocities of the Assad regime, as well as track down and monitor the activities of Syrian rebels. It has been very successful at both. The SEA has attacked media outlets such as The Washington Post, the Chicago Tribune, the Financial Times, Forbes, and others. It has also hacked the software of companies like Dell, Microsoft, Ferrari, and even the humanitarian program UNICEF.
[Photo: Creative Film / YouTube ]

Comments

Popular posts from this blog

Mona Farouk reveals scenes of "scandalous video"Egyptian actress Mona Farouk appeared on

Mona Farouk reveals scenes of "scandalous video"Egyptian actress Mona Farouk appeared on Monday in a video clip to discuss the details of the case she is currently facing. She recorded the first video and audio statements about the scandalous video that she brings together with Khaled Youssef.Farouk detonated several surprises, on the sidelines of her summons to the Egyptian prosecution, that Khalid Youssef was a friend of her father years ago, when she was a young age, and then collected a love relationship with him when she grew up, and married him in secret with the knowledge of her parents and her father and brother because his social status was not allowed to declare marriage .Muna Farouk revealed that the video was filmed in a drunken state. She and her colleague Shima al-Hajj said that on the same day the video was filmed, she was at odds with Shima, and Khaled Yusuf repaired them and then drank alcohol.She confirmed that Youssef was the one who filmed the clips whil...

الحلقة 20 هنادي المطلقة والمحلل (ماذا قال كتاب العرب في هنادي)-----------Khalid Babiker

• الجنس شعور فوضوي يتحكم في الذات والعقل . وله قوة ذاتية لا تتصالح إلا مع نفسها . هكذا قال أنصار المحلل الحلقة 20 هنادي المطلقة والمحلل (ماذا قال كتاب العرب في هنادي) أول طريق عبره الإنسان هو طريق الذكر . بعدها شهق وصرخ . تمرغ في الزيت المقدس . وجرب نشوة الأرغوس . عاجلا أم آجلا سيبحث عن هذا الطريق ( كالأسماك تعود إلى أرض ميلادها لتبيض وتموت ) . وسيعبره . سيعبره بحثا عن الديمومة . وسيشهق وسيضحك . لقد جاء إليه غريبا . سيظل بين جدرانه الدافئة غريبا . وحالما يدفع تلك الكائنات الحية الصغيرة المضطربة في الهاوية الملعونة سيخرج فقيرا مدحورا يشعر بخيانة ما ( ..... ) . لن ينسى الإنسان أبدا طريق الذكر الذي عبره في البدء . سيتذكره ليس بالذاكرة وإنما بالذكر . سيعود إليه بعد البلوغ أكثر شوقا وتولعا . ولن يدخل فيه بجميع بدنه كما فعل في تلك السنوات التي مضت وإنما سيدخل برأسه . بعد ذلك سيندفع غير مبال بالخطر والفضيحة والقانون والدين . الله هناك خلف الأشياء الصغيرة . خلف كل شهقة . كل صرخة مندفعا في الظلام كالثور في قاعة المسلخ . الله لا يوجد في الأشياء الكبيرة . في الشرانق . في المح . ينشق فمه . تن...

Trusting Liar (#5) Leave a reply

Trusting Liar (#5) Leave a reply Gertruida is the first to recover.  “Klasie… ?” “Ag drop the pretence, Gertruida. You all call me ‘Liar’ behind my back, so why stop now? Might as well be on the same page, yes?” Liar’s face is flushed with anger; the muscles in his thin neck prominently bulging. “That diamond belongs to me. Hand it over.” “What are you doing? Put away the gun…” “No! This…,” Liar sweeps his one hand towards the horizon, “…is my place.  Mine!   I earned it! And you…you have no right to be here!” “Listen, Liar, we’re not the enemy. Whoever is looking for you with the aeroplane and the chopper….well, it isn’t us. In fact, we were worried about you and that’s why we followed you. We’re here to help, man!” Vetfaan’s voice is pleading as he takes a step closer to the distraught man. “Now, put down the gun and let’s chat about all this.” Liar hesitates, taken aback after clearly being convinced that the group  had hostile intentions. “I…I’m ...