Global Upfront Newspapers
CoverEditor's PicksNewsTech

Iran’s Revolutionary Guard has key role in State-backed hack surge, Google warns

  • Tech giant says Tehran group targeted campaign staffers in US 2020 election; used phishing attacks as well as trying to upload a malware app to Play Store

Google warned on Friday of a surge in state-backed hackers, with a report focusing on the “notable campaigns” of a group linked to Iran’s Revolutionary Guard Corps.

The search engine giant was the second tech firm in less than a week to issue a warning about Iranian hackers, with the report coming days after Microsoft said a group targeted Israeli and American defense technology, and also warned that Iran had increased its hacks on Israel fourfold in the past year.

Google said in a blogpost on Friday that an Iranian hacking group known as APT35, or “Charming Kitten,” was carrying out malware and phishing attacks in which the target was tricked into installing software or giving out personal information.

Iran’s Revolutionary Guard Corps was created after the 1979 Islamic Revolution and has an extensive intelligence apparatus as well as forces.

“This is the one of the groups we disrupted during the 2020 US election cycle for its targeting of campaign staffers,” wrote Ajax Bash, a member of the threat analysis team at Google. “For years this group has hijacked accounts, deployed malware, and used novel techniques to conduct espionage aligned with the interests of the Iranian government.” Get The Times of Israel’s Daily Edition by email and never miss our top stories Newsletter email address By signing up, you agree to the terms

The post warned that APT35 was targeting accounts in government, academia, journalism, NGOs, foreign policy and national security, and had been active since 2017. A woman walks below a Google sign on the campus in Mountain View, California, on September 24, 2019. (AP Photo/Jeff Chiu, File)

The company said that APT35 used the compromised website of an unnamed British university to carry out a phishing attack by asking for individuals to confirm their credentials and security information.

Additionally, the hackers used conference-themed phishing emails to try to get users to click on compromised links.

“Attackers used the Munich Security and the Think-20 (T20) Italy conferences as lures in non-malicious first contact email messages to get users to respond. When they did, attackers sent them phishing links in follow-on correspondence,” the search engine giant said.

Google said the hackers have also started to utilize the Telegram API sendMessage function of the encrypted app to gather details of unwitting visitors to their phishing sites.

In a separate instance, Google said that APT35 tried to upload a malware app to the Google Play store.

The tech giant said “the app was disguised as VPN software that, if installed, could steal sensitive information such as call logs, text messages, contacts, and location data from devices.”

The firm said the app was discovered and removed from the Play Store before it was downloaded and installed by any users. Revolutionary Guard troops attend a military parade marking the 39th anniversary of the start of the Iran-Iraq war, in front of the shrine of the late revolutionary founder Ayatollah Khomeini, just outside Tehran, Iran, on September 22, 2019. (Iranian Presidency Office via AP)

Google said that in 2021 so far it had warned over 50,000 account-holders that they may have been targeted by state-backed attempts to hack them using phishing or malware.

“We intentionally send these warnings in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track our defense strategies,” Google explained.

In total, Google said the number of attempted hacks in 2021 had increased by a third compared to the same period, with the increase attributed to an “unusually large campaign” by the Russian group APT28, also known as “Fancy Bear.”

On Monday, Microsoft said that it had identified a group of Iranian hackers targeting Israeli and American defense technology companies using the tech giant’s products, as well as firms running maritime shipping in the Middle East.

The statement came as Israel and Iran have accused each other of attacks on ships in the Middle East, and amid reports of growing efforts by Tehran to avenge the death of its top nuclear scientist Mohsen Fakhrizadeh, killed last year.

In a blog post, Microsoft said it had first identified the hacker cell — nicknamed DEV-0343 — in July.

The company said the hackers carried out “extensive password spraying against more than 250 Office 365 tenants, with a focus on American and Israeli defense technology companies, Persian Gulf ports of entry, or global maritime transportation companies with business presence in the Middle East.”

Among the targets have been “defense companies that support United States, European Union, and Israeli government partners producing military-grade radars, drone technology, satellite systems, and emergency response communication systems.”

“This activity likely supports the national interests of the Islamic Republic of Iran based on pattern-of-life analysis, extensive crossover in geographic and sectoral targeting with Iranian actors, and alignment of techniques and targets with another actor originating in Iran,” the statement said. Illustrative: People walk past a Microsoft office in New York, on November 10, 2016. (AP Photo/Swayne B. Hall)

Microsoft said the hacking efforts could help Iran track “adversary security services and maritime shipping in the Middle East.”

Numerous suspected Iranian cyberattacks on Israel were reported in recent years, including one that targeted its water infrastructure in 2020. The most recent was reported last week.

Microsoft said on Sunday that Iran had increased its hacks on Israel fourfold in the past year.

“Microsoft detected an increased focus from a growing number of Iranian groups targeting Israeli entities… and with that focus came a string of ransomware attacks,” the company’s annual Digital Defense Report said.

Israel and Iran have been engaged in a years-long shadow war, with Israel allegedly directing most of its efforts — including multiple suspected cyberattacks — at sabotaging the Islamic Republic’s nuclear program.

The above article first appeared in Times of Israel, https://www.timesofisrael.com/irans-revolutionary-guard-has-key-role-in-state-backed-hack-surge-google-says/?utm_source=The+Daily+Edition&utm_campaign=daily-edition-2021-10-16&utm_medium=email

Advertize With Us

See Also

Mrs Alem Muluseta: The Ethiopian-born Aid Worker Gunned Down By Soldier In Damboa, Borno State, Nigeria

Global Upfront

I’ll Be Alright If Peter Obi Is Elected President In 2023, Says Governor Akeredolu

Global Upfront

IDF Tank Fire Injures Peacekeepers in Lebanon, UN Says As Israeli Airstrikes On Central Beirut Kill At Least 22

Global Upfront

Re-thinking Nigeria: Beyond Myths, Illusions And Self-deceit, By Pat Utomi

Global Upfront

UK: Dangerous 18-year-old Rapist Who “Devastated,” Sexually Assaulted 5 Young Girls’ in Derbyshire Jailed 12 Years, 6 Months

Global Upfront

Despite Muslim-Muslim Presidential Ticket Controversy, APC Unveils Shettima As Tinubu’s Running Mate

Global Upfront

Here comes Amazon incoming CEO, Andy Jassy, worth over $377M and holds brutal meetings called ‘The Chop’

Global Upfront

Catholic Priest Sent To Jail For Raping, Impregnating 17-year-old Girl in Anambra State

Global Upfront

COVID-19 rate spikes as Nigeria records 28 deaths, 203 new infections

Global Upfront

Terrorists Abduct Pastor, 7 Church Worshippers in Gidigori, Rafi LGA of Niger State

Global Upfront

This website uses Cookies to improve User experience. We assume this is OK...If not, please opt-out! Accept Read More