Iran Dupes US Military Contractors, Gov’t Agencies in Cyber Campaign

Summary: Iranian state-sponsored hackers infiltrated hundreds of thousands of employee accounts at US companies and government agencies as part of a multiyear cyber espionage campaign aimed at stealing military secrets.

Threat Actor: Iranian state-sponsored hackers | Iranian state-sponsored hackers
Victim: US companies and government agencies | US companies and government agencies

Key Point :

  • An elite team of Iranian state-sponsored hackers successfully infiltrated hundreds of thousands of employee accounts at US companies and government agencies as part of a multiyear cyber espionage campaign aimed at stealing military secrets.
  • The US Departments of Treasury and State, as well as various defense contractors, a New York-based accounting firm, and a New York-based hospitality company, were among the entities compromised in the attacks.
  • Four Iranian nationals, including one alleged member of the Islamic Revolutionary Guard Corps (IRGC) Electronic Warfare division, have been indicted for the attacks.
  • The hackers posed as an Iran-based company offering “cybersecurity services” and used spearphishing emails to trick their targets into clicking on malicious links.
  • In some cases, the hackers posed as women interested in romantic connections to target victims through social media connections.
  • The extent of data compromise and whether classified data was accessed and stolen remains unclear.
  • The indicted individuals are currently at large, and the US State Department is offering a reward of up to $10 million for information leading to their apprehension.

An elite team of Iranian state-sponsored hackers successfully infiltrated hundreds of thousands of employee accounts at US companies and government agencies, according to the Feds, as part of a multiyear cyber espionage campaign aimed at stealing military secrets.

The US Departments of Treasury and State are among those compromised in the elaborate campaign, which lasted from 2016 to 2021 according to a US Justice Department indictment unsealed this week. Various defense contractors with high-level security clearances, a New York-based accounting firm, and a New York-based hospitality company were also affected, according to the documents.

In all, more than a dozen entities and hundreds of thousands of employee accounts were compromised in the attacks, including more than 200,000 accounts at the hospitality victim.

Four Iranian nationals — including one alleged member of the government’s Islamic Revolutionary Guard Corps (IRGC) Electronic Warfare division — have been indicted for the attacks. The defendants are accused of posing as an Iran-based company that purported to provide “cybersecurity services” in a series of spearphishing overtures to their targets. Their aim was to trick email recipients into clicking on a malicious link that executed an unnamed custom malware and allowed account takeover.

In one case, they managed to allegedly take over an administrator email account at a defense contractor, which they then used to create other unauthorized accounts in order to send spearphishing emails to employees of a different defense contractor and a consulting firm.

In some cases, they also successfully posed as women interested in romantic connections, targeting victims through social media connections. This gambit was also aimed at eventually deploying malware onto victim computers, according to the indictment (PDF).

Both approaches align with Iran’s long-standing MO of creating clever social-engineering campaigns to gain targets’ confidence. A recent Charming Kitten effort for example involved the creation of an entire phony webinar platform to compromise its targeted victims. In general, Iran-nexus threat actors are “more advanced and more sophisticated by a significant margin” in their social-engineering efforts, according to Steven Adair, co-founder and president of Volexity, speaking after disclosing the Charming Kitten campaign. “It’s a level of effort and dedication … that is definitely different and uncommon.”

The Extent of Data Compromise Is Unclear

In the campaign revealed this week, once the accounts were compromised, the hacking team allegedly used a complex back-end infrastructure and a custom application called “Dandelion” to manage the attack. Dandelion provided a dashboard that enumerated the victims, their IP addresses, physical locations, Web browsers, and OS; whether they clicked on the malicious spearphishing links; and whether the accounts should be targeted for further activity.

The Justice Department did not publicize many other details on the effort; nor did it reveal whether the state-sponsored attackers were able to access and steal classified data. Thus, the level of compromise they were able to achieve in the five years they lurked within the high-value networks remains unclear.

Unfortunately, jailtime will likely not be on offer in the event of a conviction in the case: Hossein Harooni (حسین هارونی), Reza Kazemifar (رضا کاظمی فر), Komeil Baradaran Salmani (کمیل برادران سلمانی), and Alireza Shafie Nasab (علیرضا شفیعی نسب) all remain at large. The State Department is offering a reward of up to $10 million for information that could help with their apprehension.

Source: https://www.darkreading.com/cyberattacks-data-breaches/iran-dupes-military-contractors-govt-agencies-cybercampaign


“An interesting youtube video that may be related to the article above”