Anonymous :anarchism: 🏴 · @YourAnonRiots
5841 followers · 36161 posts · Server mstdn.social

Iranian nation-state actor continues to evolve its tactics, deploying novel infection chains and malware (GorjolEcho and NokNok) to infiltrate both Windows and systems.

thehackernews.com/2023/07/iran

#Technology #InfoSec #CyberSecurity #macOS #TA453

Last updated 1 year ago

Anonymous :anarchism: 🏴 · @YourAnonRiots
5841 followers · 36161 posts · Server mstdn.social

Proofpoint APT threat researchers have observed (AKA Charming Kitten) using new tactics and tools to complicate detection efforts and conduct cyber espionage operations against its targets of interest. proofpoint.com/us/blog/threat-

#apt42 #charmingkitten #TA453

Last updated 1 year ago

Tarnkappe.info · @tarnkappeinfo
2090 followers · 4472 posts · Server social.tchncs.de
Jean-Paul de Jong · @dejongj
11 followers · 22 posts · Server infosec.exchange

It is good to be selective in choosing your LinkedIn connections. My golden rule has always been: have I worked with or met this person before, and would I work or meet with them again? With SEABORGIUM and TA453 running active spear-phishing campaigns, this is even more important.

The UK National Cyber Security Centre says that Russia-based SEABORGIUM and Iran-based TA453 actors are still using spear-phishing attacks to gather information from targeted organizations and individuals in the UK and elsewhere.

Even though the tactics, techniques, procedures, and targeting profiles are similar, these campaigns are different, and the two groups are not working together.

My top tips for you.
1. Only accept connections from people you actually know.
2. Re-evaluate your list of connections and consider whether each connection is truly part of your network.
3. Check your privacy settings.
4. Trust, but verify!

ncsc.gov.uk/news/spear-phishin

#cybersecurity #infosec #spearphishing #linkedin #seaborgium #TA453

Last updated 2 years ago

Adam Rawnsley · @adamrawnsley
1756 followers · 244 posts · Server mstdn.social

RT @ChicagoCyber@twitter.com

What happens when a TA’s consistent TTPs change? Today we ( and I) released a blog detailing examples of weird and wacky techniques and targeting from .

proofpoint.com/us/blog/threat-

A personal 🧵 with thoughts.

PS:I’ll tweet later about our methods twitter.com/threatinsight/stat

🐦🔗: twitter.com/ChicagoCyber/statu

#TA453 #cristaneedsatwitter

Last updated 2 years ago

Alexis Dorais-Joncas · @adorais
75 followers · 5 posts · Server infosec.exchange
Yoshi :verified: · @chicagocyber
1046 followers · 60 posts · Server infosec.exchange

What happens when a TA’s consistent TTPs change? Today we ( and I) released a blog detailing examples of weird and wacky techniques and targeting from .

proofpoint.com/us/blog/threat-

With the current situation () in Iran, I think it’s important to note that the Government of Iran (GOI) has had an intelligence interest in Gender Studies and Women’s Rights experts since AT LEAST 2021.

If we want to see how high they rank in interest, we just need to look at how they likely deployed the same malware (GhostEcho/CharmPower) against some of those researchers and activists that they did against Foreign Government embassy personnel.

When we pivot to look at Samantha, you see a persona that’s targeted MENA energy, a US based academic that’s an Iranian HVT, and senior US & European government officials, all using confrontational lures not typically seen from TA453.

Is this an actor gone rogue, willing to do anything to successfully phish at any cost? Maybe. Is it the intern or conscriptee just trying to meet a quota?

We don’t know but it’s definitely interesting to track.

We talked about confrontational conversational phishing, but nothing really says confrontational like compromising multiple email accounts just to deliver a JPEG of intimidation to a target. That, along with the compromise of a close affiliate of one of the former officials targeted in the IRGC Murder For Hire plot, leads us to believe that a subset of TA453 activity is more aggressive than we’ve seen historically.

Please go read it! Let us know what you think.

#cristaneedsamastadon #TA453 #MahsaAmini #apt #iran #irgc #apt42 #phosphorus #charmingkitten

Last updated 2 years ago

Yoshi :verified: · @chicagocyber
839 followers · 43 posts · Server infosec.exchange

When talking to people, one of the biggest questions i get is what does /#CharmingKitten do once they send their phishing links.

This is great work from @abirghattas!

hrw.org/news/2022/12/05/iran-s

#TA453 #iran #apt

Last updated 2 years ago

Yoshi :verified: · @chicagocyber
786 followers · 33 posts · Server infosec.exchange


I’m Josh/Yoshi.
I work as a Senior Threat Researcher hunting for state aligned cyber threat actors (aka APTs).
I focus on threats suspected of originating in the Middle East & North Africa Region, primarily Iranian aligned threats like (), (), and ().

Before this, I did work in healthcare. Before that, I worked for the .

I live in Chicago(land) with 3 kids, 2 dogs and my beautiful wife.

I’m a huge fan of and the

This seems like a pretty cool place, excited to see how it grows.

#introduction #TA453 #charmingkitten #TA450 #muddywater #TA456 #tortoiseshell #threatintel #fbi #starwars #LAChargers

Last updated 2 years ago