Anonymous :anarchism: 🏮 · @YourAnonRiots
5841 followers · 36161 posts · Server mstdn.social

Proofpoint APT threat researchers have observed (AKA Charming Kitten) using new tactics and tools to complicate detection efforts and conduct cyber espionage operations against its targets of interest. proofpoint.com/us/blog/threat-

#apt42 #charmingkitten #TA453

Last updated 1 year ago

Yoshi :verified: · @chicagocyber
1046 followers · 60 posts · Server infosec.exchange

What happens when a TA’s consistent TTPs change? Today we ( and I) released a blog detailing examples of weird and wacky techniques and targeting from .

proofpoint.com/us/blog/threat-

With the current situation () in Iran, I think it’s important to note that the Government of Iran (GOI) has had an intelligence interest in Gender Studies and Women’s Rights experts since AT LEAST 2021.

If we want to see how high they rank in interest, we just need to look at how they likely deployed the same malware (GhostEcho/CharmPower) against some of those researchers and activists that they did against Foreign Government embassy personnel.

When we pivot to look at Samantha, you see a persona that’s targeted MENA energy, a US based academic that’s an Iranian HVT, and senior US & European government officials, all using confrontational lures not typically seen from TA453.

Is this an actor gone rogue, willing to do anything to successfully phish at any cost? Maybe. Is it the intern or conscriptee just trying to meet a quota?

We don’t know but it’s definitely interesting to track.

We talked about confrontational conversational phishing, but nothing really says confrontational like compromising multiple email accounts just to deliver a JPEG of intimidation to a target. That, along with the compromise of a close affiliate of one of the former officials targeted in the IRGC Murder For Hire plot, leads us to believe that a subset of TA453 activity is more aggressive than we’ve seen historically.

Please go read it! Let us know what you think.

#cristaneedsamastadon #TA453 #MahsaAmini #apt #iran #irgc #apt42 #phosphorus #charmingkitten

Last updated 2 years ago

Abir Ghattas :verified: · @abirghattas
311 followers · 14 posts · Server infosec.exchange

Journalist Pierre Alonso from Liberation, was one of the targets we identified as part of the campaign. Check out his đŸ§” where he shares the attackers WhatsApp messages and provide more context to why he might have been targeted.
twitter.com/pierre_alonso/stat

#apt42 #charmingkitten

Last updated 2 years ago

VvN · @VvN
12 followers · 3413 posts · Server mastodon.nl

RT @AbirGhattas@twitter.com

- state-backed actor targeted & compromised journos, activists and politicians in the region. Our technical analysis explains what did they do after compromise and also reveals inadequacies in @Google@twitter.com’s security protections to safeguard its users’ data. twitter.com/AbirGhattas/status

🐩🔗: twitter.com/AbirGhattas/status

#mena #apt42 #iran #icymi

Last updated 2 years ago

Verfassungklage · @Verfassungklage
1436 followers · 51157 posts · Server mastodon.social

: 

Angriffe gegen :innen und :innen.

Mutmaßlich im Auftrag der Iranischen Revolutionsgarden haben Hacker:innen mehr als 20 Journalist:innen und Mitarbeitende von NGOs angegriffen und ausgespĂ€ht. Dabei konnten sie auch sensible Daten abgreifen. ...

netzpolitik.org/2022/hackergru

#hackergruppe #apt42 #journalist #menschenrechtsaktivist

Last updated 2 years ago

Verfassungklage · @Verfassungklage
1607 followers · 51598 posts · Server mastodon.social

: 

Angriffe gegen :innen und :innen.

Mutmaßlich im Auftrag der Iranischen Revolutionsgarden haben Hacker:innen mehr als 20 Journalist:innen und Mitarbeitende von NGOs angegriffen und ausgespĂ€ht. Dabei konnten sie auch sensible Daten abgreifen. ...

netzpolitik.org/2022/hackergru

#hackergruppe #apt42 #journalist #menschenrechtsaktivist

Last updated 2 years ago

Abir Ghattas :verified: · @abirghattas
271 followers · 10 posts · Server infosec.exchange

⚠ and investigation reveals gov't backed hackers have targeted activists, journalists, & researchers working on Middle East issues with phishing attacks.

@humanrightswatch infosec team attributes this campaign to state-backed threat actor .

I spent the past couple of weeks with @tek and @donncha investigating an ongoing social engineering and phishing campaign that impersonated a think tank based in to trick its targets and invite them to a summit.

2 HRW staff were targeted, and after investigating the infrastructure used, we found 18 other targets. at least 3 targets were successfully compromised by

Read the full report and the technical analysis on HRW's website 👇

hrw.org/news/2022/12/05/iran-s

#hrw #amnesty #iran #apt42 #lebanon

Last updated 2 years ago

Recorded Future published a report on a and follow-on credential theft attack highly likely led by an nexus threat activity group targeted against the US-based Washington Institute think tank. While we track this group under the temporary designator TAG56, it depicts many of the known TTPs associated with and has overlaps in victimology: recordedfuture.com/suspected-i

#phishing #iran #apt42

Last updated 2 years ago