{"id":1043379,"date":"2021-11-21T21:36:08","date_gmt":"2021-11-22T02:36:08","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/microsoft-warns-of-the-evolution-of-six-iranian-hacking-groups-bleepingcomputer\/"},"modified":"2021-11-21T21:36:08","modified_gmt":"2021-11-22T02:36:08","slug":"microsoft-warns-of-the-evolution-of-six-iranian-hacking-groups-bleepingcomputer","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/microsoft-warns-of-the-evolution-of-six-iranian-hacking-groups-bleepingcomputer\/","title":{"rendered":"Microsoft warns of the evolution of six Iranian hacking groups &#8211; BleepingComputer"},"content":{"rendered":"<p><p>The Microsoft Threat Intelligence Center (MSTIC) haspresented an analysis of the evolution of several Iranian threat actors at the CyberWarCon 2021, and their findings show increasingly sophisticated attacks.<\/p>\n<p>Since September 2020, Microsoft has been tracking six Iranian hacking groups deploying ransomware and exfiltrating data to cause disruption and destructionfor victims.<\/p>\n<p>Over time, these hacking groups have evolved into competent threat actors capable of conducting cyber-espionage, using multi-platform malware, disrupting operations with wipers and ransomware, carrying out phishing and password spraying attacks, and even setting up sophisticated supply chain operations.<\/p>\n<p>All of these groups deploy ransomware to achieve their objectives and were deployed in waves, usually six to eight weeks apart.<\/p>\n<p>This year, Microsoft observed the actors scanning for many vulnerabilities, including those targeting Fortinet FortiOS SSL VPN, Microsoft Exchange Servers vulnerable to ProxyShell, and more.<\/p>\n<p>It is estimated that by scanning for unpatched Fortinet VPN systems alone, the actors obtained over 900 valid credentials in plain text form so far this year.<\/p>\n<p>Another trend that has emerged this past year is an upgraded level of patience and persistence in social engineering campaigns, indicative of a sophisticated actor.<\/p>\n<p>Previously, actors like Phosphorus (Charming Kitten) were sending unsolicited emails with malicious links and laced attachments, a bulk tactic thathad limited success.<\/p>\n<p>Now, Phosphorus follows the time-consuming path of \"interview invitations,\" a method ushered by the North Korean hacking group \"Lazarus.\"<\/p>\n<p>During these attacks, Phosphorus actors call the targets and walk them through clicking on credential harvesting pages as part of the interview process.<\/p>\n<p>A new group that follows equally patient tactics is called \"Curium,\" and Microsoft's analysts say this actor leverages an extensive network of fake social media accounts, usually masqueraded as attractive women.<\/p>\n<p>They contact the targets and build rapport over some time, chatting daily and winning their trust.<\/p>\n<p>Then, one day, they send a malicious document that looks similar to benign files sent previously, resulting in stealthy malware drops.<\/p>\n<p>A similar tactic was used by the hacking group linked to Hamas, whocreated fake dating apps to lure Israel Defence Forces(IDF) into installing malware-laced mobile apps.<\/p>\n<p>It is unclear if these two campaigns are linked.<\/p>\n<p>Although some actors move more methodically, others prefer to use \"brute force\" attacks to obtain access to Office 365 accounts aggressively.<\/p>\n<p>One such threat actor is DEV-0343, who was seentargeting US defense tech companiesand running massive password spraying attackslast month.<\/p>\n<p>Microsoft reports that DEV-0343 moves a lot quicker than the groups mentioned above, typically gaining access to the target accounts on the same day.<\/p>\n<p>Also, the researchers have seen overlaps such as the simultaneous targeting of specific accounts by both DEV-0343 and 'Europium' operators, clear evidence of coordinated action.<\/p>\n<p>Microsoft has been tracking Iranian actors since almost a decade ago, and the tech giant has had some success in taking parts of their infrastructure offline.<\/p>\n<p>Despite these efforts, Phosphorus has managed to deliver significant blows, with a notable example being the hacking of high-ranking officials in October last year.<\/p>\n<p>MSTICs most recent observations underline that Phosphorus is not only alive and well, but a shape-shifting threat backed by collaborators of unprecedented pluralism.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-warns-of-the-evolution-of-six-iranian-hacking-groups\/\" title=\"Microsoft warns of the evolution of six Iranian hacking groups - BleepingComputer\">Microsoft warns of the evolution of six Iranian hacking groups - BleepingComputer<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Microsoft Threat Intelligence Center (MSTIC) haspresented an analysis of the evolution of several Iranian threat actors at the CyberWarCon 2021, and their findings show increasingly sophisticated attacks.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/evolution\/microsoft-warns-of-the-evolution-of-six-iranian-hacking-groups-bleepingcomputer\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187748],"tags":[],"class_list":["post-1043379","post","type-post","status-publish","format-standard","hentry","category-evolution"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1043379"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1043379"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1043379\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1043379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1043379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1043379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}