U.S. sanctions two Iranian cyber operatives over crackdowns on Mahsa Amini protests
The pair started a cyber training academy that supports Iranian intelligence in the brutal response to protests, the U.S. government said.
The pair started a cyber training academy that supports Iranian intelligence in the brutal response to protests, the U.S. government said.
They’re using fake job documents to target victims.
The server appears to belong to a hacking outfit that IBM calls ITG18, and which overlaps with groups known as Charming Kitten and Phosphorous.
Russian-linked hackers known as the Turla group have been piggybacking on Iranian hackers’ tools and infrastructure for years now to run their own attacks.
Researchers have dubbed the group Hexane, and they say it has been particularly active in recent months.
Servers, domains and other infrastructure are a contested resource like any other on the internet.
An unknown person or group started doxing the people behind OilRig sometime last month.
The hack of Visma was done by APT10, according to Recorded Future and Rapid7. Or was it? Other researchers say it had all the hallmarks of another China-linked group, APT 31.
OilRig is staying very active.
A new report focuses on OopsIE, a trojan first tracked earlier this year, being used in spearphishing attacks against a highly targeted a Middle Eastern government agency.