Thứ Hai, Tháng Một 30, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

Iranian hackers target high-value targets in nuclear and genomic security research

13 Tháng Chín, 2022
in Tech
0
Iranian hackers target high-value targets in nuclear and genomic security research
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

Iran's cyber espionage attacks

Hackers linked to the Iranian government have targeted individuals specializing in Middle Eastern affairs, nuclear security, and genomics research as part of the campaign. social engineering Newly designed to hunt for sensitive information.

Enterprise security firm Proofpoint attributes the targeted attacks to a threat agent known as TA453, which often overlaps with monitored network activities under the pseudonyms APT42, Charming Kitten. and Phosphorus.

It all started with a phishing email impersonating legitimate individuals at Western foreign policy research institutions, ultimately designed to gather intelligence on behalf of the Revolutionary Guard Corps. Iranian Islamic Network (IRGC).

Impersonators include people from the Pew Research Centre, the Foreign Policy Research Institute (FRPI), the UK’s Chatham House and the science journal Nature. The technique is said to have been deployed in mid-June 2022.

What sets it apart from other phishing attacks is the use of a Proofpoint tactic called Multiple Personality Impersonation (MPI), where the threat agent uses not one but several characters played by the actor. control in the same email conversation to increase your chances of success.

The idea is to “take advantage of the psychological principle of social proof” and increase the authenticity of the threat agent’s correspondence to get the target to buy into the scheme, a tactic that demonstrates the ability to further promote opponent’s game.

“This is a fascinating technique because it requires more resources to be used on each target – potentially igniting more personalities – and a coordinated approach between different personalities is used by TA453 use,” Sherrod DeGrippo, vice president of research and threat detection at Proofpoint, said in a statement.

When the email initially elicits a response from the target, the personality then sends a follow-up message containing a malicious OneDrive link that downloads a Microsoft Office document, one of which alludes to a crash. between Russia and the US.

The document then uses a technique known as remote template insertion to download Korg, a template consisting of three macros capable of collecting usernames, a list of running processes, and public IP addresses. victim’s statement.

Besides filtering the signaling information, no other post-exploit actions were observed. The lack of “abnormalities” in code execution and command-and-control behavior has led to the assessment that compromised users may be subject to further attacks based on installed software.

This is not the first time that a threat actor has carried out impersonation campaigns. In July 2021, Proofpoint revealed a phishing operation called SpoofedScholars targeting individuals focusing on Middle East issues in the US and UK under the guise of School of Research scholars. East and Africa (SOAS) by University College London.

Then in July 2022, the company network security discovered TA453’s attempts to masquerade as journalists to lure academics and policy experts to click on malicious links that redirect targets to credential-collecting domains.

The disclosure comes amid an explosion of Iran-related cyber activity. Last week, Microsoft ended a string of ransomware attacks mounted by a subgroup of Phosphorus named DEV-0270 using live binaries like BitLocker.

In addition, the company network security Mandiant, now an official part of Google Cloud, detailed the activities of an Iranian spy codenamed APT42 that has been linked to more than 30 activities since 2015.

On top of that, the Ministry of Finance announced sanctions against Iran’s Ministry of Intelligence and Security (MOIS) and the country’s Intelligence Minister, Esmaeil Khatib, in response to “air-activated activities” cyber against the United States and its allies.”

Albania, which has severed diplomatic ties with Iran after blaming it for a series of cyberattacks since July, pointed the finger at “aggressors” over the weekend for having launched another attack on a government system used to monitor border crossings.

“State-linked threats are some of the best at crafting well-thought-out social engineering campaigns to reach the victims they desire,” DeGrippo said.

“Researchers involved in international security, especially those specializing in Middle East or nuclear security studies, should maintain a heightened sense of vigilance when receiving unsolicited emails.”

.

Previous Post

Husband drove a car straight into his wife’s company, causing many injuries

Next Post

How to hide posted videos on TikTok

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
How to hide posted videos on TikTok

How to hide posted videos on TikTok

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem