Facebook disrupts Iranian hackers who targeted US military personnel and defense contractors


The hackers ran a complicated operation to achieve their victims’ belief, Facebook stated, usually posing as representatives of aerospace and protection corporations to construct deep relationships with their targets earlier than directing them to fraudulent web sites. Though the websites seemed and acted like their professional counterparts — together with a US Labor Department job web site — they have been designed to steal information and scan laptop methods.

The group zeroed in on people who work within the US navy and protection business, and in addition focused related victims within the UK and Europe, Facebook stated.

Mike Dvilyanski, Facebook’s head of cyber espionage investigations, informed CNN the corporate has disabled “fewer than 200 operational accounts” on its platform related to the Iranian marketing campaign, and notified an identical variety of Facebook customers that they could have been focused by the group. The Iranian marketing campaign prolonged past Facebook and in addition used different platforms and messaging applied sciences together with electronic mail, Facebook stated. However, it is tough to know the way profitable the espionage marketing campaign could have been.

Until now, the hacking group had been targeted on regional targets within the Middle East, Facebook stated. But the growth to incorporate Western targets displays an evolution within the group’s habits that started final yr.

“Our investigation found that this group invested significant time into their social engineering efforts across the internet, in some cases engaging with their targets for months,” Facebook stated in a weblog publish.

Facebook will not notify the 533 million users exposed in online database

Once the hackers had gained entry right into a goal’s machine, they shared extra recordsdata akin to fraudulent Microsoft Excel spreadsheets that contained hidden malicious software program that would acquire much more data, Facebook stated. The malware confirmed indicators of being extremely custom-made — not an “off-the-shelf” product, stated Dvilyanski — suggesting the hackers have been well-supported. Further investigation confirmed that the malicious software program had been designed by an Tehran-based software program agency linked to Iran’s highly effective Islamic Revolutionary Guard Corps, Facebook stated.

On a convention name with reporters, Dvilyanski stated Facebook’s cybersecurity group is “confident” in regards to the connection between among the malware used within the marketing campaign and the IT agency, Mahak Rayan Afraz, and the hyperlink to the IRGC. A variety of the IT agency’s present and former executives are additionally linked to different corporations beneath US sanction, in line with the Facebook weblog publish.

“As far as I know, this is the first public attribution of the groups’ malware” to an entity linked to the Iranian authorities, Dvilyanski informed reporters on a convention name.

In addition to notifying its customers who had been focused by the marketing campaign and disabling accounts belonging to the hackers, Facebook additionally blocked hyperlinks on its platform to web sites managed by the group, it stated.

The so-called “phishing” techniques utilized by the Iranian hackers have been replicated on a large scale in current months, with experiences of a Russian marketing campaign sending faux emails posing because the US Agency for International Development. On Wednesday, Google stated a separate, doubtless Russian-backed marketing campaign concerned faux LinkedIn messages being despatched to victims in a bid to compromise iOS units. Apple patched the flaw in March.

Leave a Reply

Your email address will not be published. Required fields are marked *