Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2022-09-08 11:08:00 |
Microsoft Warns of Ransomware Attacks by Iranian Phosphorus Hacker Group (lien direct) |
Microsoft's threat intelligence division on Wednesday assessed that a subgroup of the Iranian threat actor tracked as Phosphorus is conducting ransomware attacks as a "form of moonlighting" for personal gain.
The tech giant, which is monitoring the activity cluster under the moniker DEV-0270 (aka Nemesis Kitten), said it's operated by a company that functions under the public aliases Secnerd and |
Ransomware
Threat
Conference
|
APT 35
|
|
 |
2022-08-23 07:50:00 |
Google Uncovers Tool Used by Iranian Hackers to Steal Data from Email Accounts (lien direct) |
The Iranian government-backed actor known as Charming Kitten has added a new tool to its malware arsenal that allows it to retrieve user data from Gmail, Yahoo!, and Microsoft Outlook accounts.
Dubbed HYPERSCRAPE by Google Threat Analysis Group (TAG), the actively in-development malicious software is said to have been used against less than two dozen accounts in Iran, with the oldest known |
Malware
Tool
Threat
Conference
|
Yahoo
APT 35
|
|
 |
2022-05-12 06:56:45 |
Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks (lien direct) |
A ransomware group with an Iranian operational connection has been linked to a string of file-encrypting malware attacks targeting organizations in Israel, the U.S., Europe, and Australia.
Cybersecurity firm Secureworks attributed the intrusions to a threat actor it tracks under the moniker Cobalt Mirage, which it said is linked to an Iranian hacking crew dubbed Cobalt Illusion (aka APT35, |
Ransomware
Malware
Threat
Conference
|
APT 35
APT 15
|
★★★★
|
 |
2022-02-17 23:40:44 |
Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware (lien direct) |
A "potentially destructive actor" aligned with the government of Iran is actively exploiting the well-known Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware.
Cybersecurity firm SentinelOne dubbed the group "TunnelVision" owing to their heavy reliance on tunneling tools, with overlaps in tactics observed to that of a broader group tracked under the moniker Phosphorus |
Ransomware
Conference
|
APT 35
|
|
 |
2022-02-01 02:28:30 |
Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks (lien direct) |
An advanced persistent threat group with links to Iran has updated its malware toolset to include a novel PowerShell-based implant called PowerLess Backdoor, according to new research published by Cybereason.
The Boston-headquartered cybersecurity company attributed the malware to a hacking group known as Charming Kitten (aka Phosphorous, APT35, or TA453), while also calling out the backdoor's |
Malware
Threat
Conference
|
APT 35
APT 35
|
|
 |
2020-08-28 03:36:28 |
Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware (lien direct) |
An Iranian cyberespionage group known for targeting government, defense technology, military, and diplomacy sectors is now impersonating journalists to approach targets via LinkedIn and WhatsApp and infect their devices with malware.
Detailing the new tactics of the "Charming Kitten" APT group, Israeli firm Clearsky said, "starting July 2020, we have identified a new TTP of the group, |
Malware
Conference
|
APT 35
|
|
 |
2020-07-17 03:23:46 |
Iranian Hackers Accidentally Exposed Their Training Videos (40 GB) Online (lien direct) |
An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the "behind-the-scenes look into their methods."
IBM's X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous, or APT35) that |
Threat
Conference
|
APT 35
|
★★★★★
|