www.computerweekly.com Open in urlscan Pro
104.18.29.218  Public Scan

Submitted URL: https://go.techtarget.com/r/259115970/45455645?bt_ee=uTdCVWMHO2nM9Yvg9k%2FEd8epr3Id3z6lVrICXI7Nemw%3D&bt_ts=1674750517811
Effective URL: https://www.computerweekly.com/news/252529571/NCSC-exposes-Iranian-Russian-spear-phishing-campaign-targeting-UK?utm_campaign=20...
Submission: On January 27 via manual from NZ — Scanned from NZ

Form analysis 1 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

Text Content

3
Trending Now

Your Guide to 2022: Cyber Security in a Decentralised WorldDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   Your Guide to 2022: Cyber Security in a Decentralised WorldDownload Now
 * 
   UK’s NCSC: Passwordless Authentication GuidelinesDownload Now
 * 
   Building a layered defense to combat advanced phishing threatsDownload Now




Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * IT Salary Survey infographic

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
    * IT in France
    * IT in the Nordics
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Quality/governance
    * Data warehousing
    * Database management
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Compliance and storage
    * Backup
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk


 * Home
 * Hackers and cybercrime prevention

fresnel6 - Fotolia

fresnel6 - Fotolia

News


NCSC EXPOSES IRANIAN, RUSSIAN SPEAR-PHISHING CAMPAIGN TARGETING UK




SPEAR-PHISHING CAMPAIGNS LIKELY LINKED TO IRANIAN AND RUSSIAN ESPIONAGE ACTIVITY
ARE TARGETING PERSONS OF INTEREST IN THE UK, WARNS THE NCSC

 * Share this item with your network:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


By
 * Alex Scroxton, Security Editor

Published: 26 Jan 2023 0:01

Hostile advanced persistent threat (APT) groups aligned with the national
interests of Iran and Russia are targeting UK nationals including academics,
activists, charity and NGO workers, defence and government officials,
journalists, and politicians, with carefully crafted and highly targeted
spear-phishing emails, according to new intelligence from the UK’s National
Cyber Security Centre (NCSC).



The distinct yet technically similar campaigns are attributed with relative
confidence to Iran’s TA453, which also goes by Charming Kitten among other
names, and Russia’s Seaborgium, which also goes by Cold River and was recently
linked to an attack on former MI6 chief Richard Dearlove and a group of hard
Brexit advocates, and an incident targeting US nuclear scientists.

The ongoing pattern of cyber activity is suspected, although not confirmed by
the NCSC, to be linked to intelligence gathering in support of the goals of the
APTs’ supposed government paymasters in Tehran and Moscow.

It is relatively small in scale and does not pose an immediate threat to the
majority of the British public in the grand scheme of things, according to the
NCSC’s operations director, Paul Chichester, who said it was more the
sophistication of the attacks, rather than the volume, that was a worry.

“The UK is committed to exposing malicious cyber activity alongside our industry
partners, and this advisory raises awareness of the persistent threat posed by
spear-phishing attacks,” he said.

“These campaigns by threat actors based in Russia and Iran continue to
ruthlessly pursue their targets in an attempt to steal online credentials and
compromise potentially sensitive systems.

“We strongly encourage organisations and individuals to remain vigilant to
potential approaches and follow the mitigation advice in the advisory to protect
themselves online.”

READ MORE ABOUT SPEAR-PHISHING

 * The Dark Pink advanced persistent threat group used custom malware to
   exfiltrate data from high-profile targets through spear-phishing emails last
   year, according to Group-IB.
 * The increasingly active Ducktail cyber crime operation is refining its
   operations, seeking new methods to compromise its victims’ Facebook Business
   accounts.

The NCSC is today issuing a new advisory addressed directly to potential victims
– something it only generally does when it is relatively certain there is an
urgent need to conduct outreach towards vulnerable organisations or individuals,
so its findings are worth noting.

The two spear-phishing campaigns observed both deploy relatively similar
elements of cyber tradecraft, particularly when it comes to spear-phishing
techniques.

Contact will generally appear benign and may seem to originate from legitimate
contacts, as the groups look to gain the confidence and trust of their intended
victims. The lures observed included fake invitations to conferences or events.

Approaches are being made via email, social media and professional networks, but
notably in this instance, TA453 and Seaborgium have been seen targeting the
personal email accounts of their victims, as opposed to official work accounts.

The NCSC believes this tactic may present an easier route in for the attackers,
taking advantage of people being more inclined to trust people to whom they have
given their personal email address, or being less on their guard when using
personal services. It can also help them bypass email security controls that may
be in place on organisational networks.

The email correspondence may also appear to be part of an ongoing thread, and in
some instances, these groups have even been observed adopting multiple personas
to create convincing email threads, which helps build a rapport and presents a
narrative that the victim may be more inclined to respond to.


SHARING MALICIOUS CONTENT

Ultimately, the objective of the campaigns is to share malicious documents or
links to phishing websites that can lead to downstream credential theft and
compromise. In the observed campaigns, many of these links were disguised as
Zoom meeting URLs.

The NCSC emphasised that while the two campaigns share many similarities, it has
found no evidence that they are linked, or that TA453 and Seaborgium have been
collaborating.

The NCSC is advising people working in targeted industries to be particularly
vigilant, and to adopt a set of basic cyber security principles that can vastly
reduce their chances of being compromised.

These include using strong and separate passwords across email accounts,
activating multi-factor authentication wherever possible, keeping devices and
networks patched and up to date, enabling automated email scanning features from
providers, and disabling mail forwarding. Additionally, as always, it is
important to maintain a healthy degree of scepticism when opening unexpected
emails, even if they seem to be from a close contact.

The Centre for the Protection of National Infrastructure also maintains an
application, Think Before You Link, which can help individuals identify
malicious online profiles and cut the risk of being targeted.



READ MORE ON HACKERS AND CYBERCRIME PREVENTION

 * NCSC WARNS PUBLIC OF POTENTIAL QUEEN-RELATED PHISHING ATTACKS
   
   
   By: Alex Scroxton

 * MULTI-PERSONA IMPERSONATION ADDS NEW DIMENSION TO PHISHING
   
   
   By: Alex Scroxton

 * HOW HOSTILE GOVERNMENT APTS TARGET JOURNALISTS FOR CYBER INTRUSIONS
   
   
   By: Alex Scroxton

 * SPEAR PHISHING
   
   
   By: Mary Shacklett

Latest News
 * CEF selects HPE Greenlake to build out digitisation strategy
 * Royal Mail resumes some international parcel services from UK
 * Final months of 2022 saw highest ever number of bank account switches
 * View All News

Download CW Asia-Pacific
 * In The Current Issue:
   * Top IT predictions in APAC in 2023
   * How the Australian Red Cross coped with a donation surge
   * How Mondelez is driving change with tech
   Download Current Issue

Latest Blog Posts
 * The rise of the green software developer – Green Tech
 * Is it time for time-series databases? – Open Source Insider
 * View All Blogs

Related Content
 * Multi-persona impersonation adds new dimension to ... – ComputerWeekly.com
 * How hostile government APTs target journalists for ... – ComputerWeekly.com
 * Office 365 compromise likely led to Merseyrail ... – ComputerWeekly.com




-ADS BY GOOGLE


Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

CIO
 * Technology diffusion strategies for CIOs and the VC mindset
   
   Whether a technology investment pays off depends in large part on how fast
   and widely it's adopted. CIOs can take a page from the...

 * 3 tips CIOs can use for more sustainable device management
   
   Sustainable device management is an important area CIOs should focus on to
   support organizational ESG goals. Learn how it can ...

 * 10 benefits of adopting project portfolio management
   
   Project portfolio management takes a centralized approach to managing
   projects and focuses on aligning projects with company ...

Security
 * Ransomware trends, statistics and facts in 2023
   
   Supply chain attacks, double extortion and RaaS were just a few of the
   ransomware trends that plagued 2022 and will continue to ...

 * Contractor error led to Baltimore schools ransomware attack
   
   A security contractor for Baltimore County Public Schools mistakenly opened a
   suspicious phishing email attachment in an unsecure...

 * How cyber deception technology strengthens enterprise security
   
   They say the best defense is a good offense. Cyber deception puts that
   philosophy into practice in the enterprise, using a ...

Networking
 * Evaluate Wi-Fi mapping tools and best practices
   
   As Wi-Fi is now a critical component of enterprise network connectivity,
   Wi-Fi mapping helps teams evaluate their wireless ...

 * How cloud-managed Wi-Fi simplifies policy and AP controls
   
   Cloud-managed Wi-Fi provides IT groups with several benefits, including
   policy enforcement, network management and consistent AP ...

 * Enterprises consider NaaS adoption for business agility
   
   As enterprises accelerate toward digitization of their complete IT stack,
   NaaS -- which can lower costs, increase QoS and improve...

Data Center
 * Use ISO 50001:2018 as a guide for green data centers
   
   Data centers use a lot of energy, and it can be difficult to navigate how to
   reduce energy use. ISO 50001:2018 provides guidance ...

 * Everything you need to know about Linux man pages
   
   Admins who aren't familiar with a command can use Linux man pages for better
   understanding. This tutorial outlines how to access ...

 * Dell's next-generation PowerEdge servers target AI inferencing
   
   Dell has delivered versions of its PowerEdge servers using Intel's 4th Gen
   Xeon Scalable processors and AMD's EPYC chips.

Data Management
 * ESG predicts 2023 shifts for DataOps, data management
   
   Organizations are using cloud technologies and DataOps to access real-time
   data insights and decision-making in 2023, according ...

 * Data lake vs. data warehouse: Key differences explained
   
   Data lakes and data warehouses are both commonly used in enterprises. Here
   are the main differences between them to help you ...

 * Data management trends: Convergence and more money
   
   The past year focused heavily on data intelligence, lakehouse development and
   observability as vendors innovated to help ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2023, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information


Close