therecord.media Open in urlscan Pro
2606:4700:4400::6812:20b5  Public Scan

URL: https://therecord.media/microsoft-iranian-hackers-high-profile-experts
Submission: On January 18 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership
 * Cybercrime
 * Nation-state
 * Elections
 * Technology

 * Cyber Daily®
 * Click Here Podcast

Go
Subscribe to The Record
✉️ Free Newsletter

Image: Ashkan Forouzani via Unsplash
Jonathan Greig
January 17th, 2024
 * News
 * Nation-state

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


MICROSOFT: IRANIAN HACKERS TARGETING ‘HIGH-PROFILE’ EXPERTS ON MIDDLE EAST

“High-profile” experts working on Middle Eastern affairs at universities and
research organizations in Belgium, France, Gaza, Israel, the U.K. and the U.S.
have been targeted by hackers allegedly connected to the Iranian government,
according to a new report from Microsoft.

In a blog post, Microsoft’s Threat Intelligence team said that since November a
subset of a hacking group they call Mint Sandstorm has used “bespoke phishing
lures in an attempt to socially engineer targets into downloading malicious
files.”

Microsoft said some incidents it has observed involved new tools it had not seen
before.

“Operators associated with this subgroup of Mint Sandstorm are patient and
highly skilled social engineers whose tradecraft lacks many of the hallmarks
that allow users to quickly identify phishing emails. In some instances of this
campaign, this subgroup also used legitimate but compromised accounts to send
phishing lures,” Microsoft said.

“Additionally, Mint Sandstorm continues to improve and modify the tooling used
in targets’ environments, activity that might help the group persist in a
compromised environment and better evade detection.”

Evidence from several incidents shows the most recent campaign is tied to the
current conflict in Gaza. Some of the phishing lures seen involve the
Israel-Hamas war, and Microsoft researchers believe the goal is to get a variety
of inside perspectives on the conflict.

Mint Sandstorm is known by other researchers as APT35 or Charming Kitten and is
believed to be tied to the Islamic Revolutionary Guard Corps (IRGC), an
intelligence arm of Iran’s military. The targets of their campaigns typically
have access to information important to leaders in Tehran.

More Coverage: Threat-hunter says Iran is stepping up the sophistication of its
cyberattacks

In the past, Microsoft researchers have seen members of the group go after
journalists, researchers, professors, or other people with “resource-intensive
social engineering campaigns.”

“In this campaign, Mint Sandstorm masqueraded as high-profile individuals
including as a journalist at a reputable news outlet,” they added.

“In some cases, the threat actor used an email address spoofed to resemble a
personal email account belonging to the journalist they sought to impersonate
and sent benign emails to targets requesting their input on an article about the
Israel-Hamas war.”

Several other cases involved legitimate but compromised email accounts belonging
to the people they attempted to impersonate. Some of the initial emails did not
carry any malicious content as the hackers sought to develop a relationship with
their targets before beginning the espionage process.

Once a target agreed to look at an article or document, the hackers sent a link
to a malicious domain that took the victim to a .rar file allegedly containing
the documents.

These kinds of tactics “might have played a role in the success of this
campaign,” Microsoft noted. In several cases, the hackers dropped custom
backdoors onto victim systems allowing them to maintain their access.

One backdoor tool — named MediaPL — is a custom-made tool that is built to
masquerade as Windows Media Player, an application used to store and play audio
and video files. The backdoor can send encrypted communications to a
hacker-controlled server, terminate itself or launch commands.

“The ability to obtain and maintain remote access to a target’s system can
enable Mint Sandstorm to conduct a range of activities that can adversely impact
the confidentiality of a system,” they said.

“Compromise of a targeted system can also create legal and reputational risks
for organizations affected by this campaign. In light of the patience,
resources, and skills observed in campaigns attributed to this subgroup of Mint
Sandstorm, Microsoft continues to update and augment our detection capabilities
to help customers defend against this threat.”

In November and December, several leading cybersecurity agencies in the U.S.
warned of a campaign from a hacking group allegedly connected to the IRGC
targeting U.S. water utilities.

U.S. President Joe Biden said on Saturday that the White House sent a private
message to Iran about several recent incidents involving attacks on commercial
ships in the Red Sea.

 * 
 * 
 * 
 * 
 * 

Tags
 * Microsoft
 * Iran
 * Charming Kitten
 * APT 35
 * espionage

Previous article
Tech companies could do ‘heaps more’ to protect users from fraud
No new articles


JONATHAN GREIG



Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has
worked across the globe as a journalist since 2014. Before moving back to New
York City, he worked for news outlets in South Africa, Jordan and Cambodia. He
previously covered cybersecurity at ZDNet and TechRepublic.

 * National Bank of Angola says it mitigated cyberattackJanuary 17th, 2024
 * Indian Air Force potentially targeted with info-stealing malwareJanuary 17th,
   2024
 * Detained Russian student allegedly helped Ukrainian hackers with
   cyberattacksJanuary 16th, 2024
 * Crypto trading firm closes shop after $8 million NY state fine over security
   issuesJanuary 16th, 2024
 * Ransomware gang demands €10 million after attacking Spanish councilJanuary
   16th, 2024
 * UK privacy watchdog to examine practice of web scraping to get training data
   for AIJanuary 15th, 2024
 * Microsoft to keep all European cloud customers’ personal data within
   EUJanuary 12th, 2024
 * British cosmetics firm Lush confirms cyberattackJanuary 12th, 2024
 * FCC presses carmakers, wireless providers to protect domestic abuse survivors
   from stalking toolsJanuary 11th, 2024


FLYING UNDER THE RADAR: ABUSING GITHUB FOR MALICIOUS INFRASTRUCTURE


Flying Under the Radar: Abusing GitHub for Malicious Infrastructure


2023 ADVERSARY INFRASTRUCTURE REPORT


2023 Adversary Infrastructure Report


ANNUAL PAYMENT FRAUD INTELLIGENCE REPORT: 2023


Annual Payment Fraud Intelligence Report: 2023


AGGRESSIVE MALIGN INFLUENCE THREATENS TO SHAPE US 2024 ELECTIONS


Aggressive Malign Influence Threatens to Shape US 2024 Elections


OBFUSCATION AND AI CONTENT IN THE RUSSIAN INFLUENCE NETWORK “DOPPELGÄNGER”
SIGNALS EVOLVING TACTICS


Obfuscation and AI Content in the Russian Influence Network “Doppelgänger”
Signals Evolving Tactics
 * 
 * 
 * 
 * 

 * Privacy
 * About
 * Contact Us

© Copyright 2024 | The Record from Recorded Future News