HomeCII/OTIranian State Hackers Serve as Intermediaries for Ransomware Groups

Iranian State Hackers Serve as Intermediaries for Ransomware Groups

Published on

spot_img

A recent warning from the FBI, CISA, and the Department of Defense Cyber Crime Center (DC3) shed light on a group of Iranian cyber actors operating as access brokers for ransomware gangs. These state-sponsored operatives, known as “Pioneer Kitten,” “Fox Kitten,” and “Lemon Sandstorm,” have been active since 2017 and have ramped up their activities through August 2024. Their main focus is on collaborating with ransomware groups to target critical sectors in the U.S. and its allies, including healthcare, finance, education, defense, and government entities.

The Iranian cyber actors not only breach networks but also sell access to ransomware affiliates like NoEscape and BlackCat (ALPHV), enabling them to carry out more effective ransomware attacks. This partnership extends beyond just selling access; the Iranian actors actively participate in strategizing and executing ransomware attacks, aiming to maximize ransom payouts.

While the FBI believes these actors are associated with the Government of Iran (GOI), their activities appear to operate on two fronts. On one hand, they conduct state-sponsored operations targeting countries like Israel, Azerbaijan, and the UAE to steal sensitive technical data. On the other hand, they engage in unsanctioned ransomware-enabling activities, raising questions about the extent of their independence from the Iranian government.

Microsoft also reported on another Iranian threat actor called “Peach Sandstorm,” which targets satellite, communications, energy, and government sectors in the U.S. and UAE, exhibiting espionage activities typically associated with state threat actors.

The collaboration between Iranian cyber actors and ransomware groups marks a shift in how state-sponsored actors operate. By offering full domain control and admin credentials to ransomware affiliates, the Iranian actors simplify the deployment of ransomware attacks. In return, they receive a share of the ransom in cryptocurrency, making it harder to trace their activities. Historically, these actors focused on selling access to networks on underground markets, but now they are actively involved in carrying out ransomware attacks.

These Iranian actors exploit vulnerabilities in widely-used networking devices like Citrix Netscaler, F5 BIG-IP, Pulse Secure/Ivanti VPNs, and Palo Alto Networks’ PAN-OS to gain initial access. Once inside, they employ various tactics to maintain persistence, escalate privileges, and evade detection, including disabling security software and using legitimate tools for remote access.

In addition to ransomware attacks, these Iranian actors have been involved in hack-and-leak campaigns aimed at causing political and social disruption rather than financial gain. To mitigate these threats, organizations are advised to monitor their logs for malicious IP traffic, patch vulnerabilities, and validate security controls against known threat behaviors.

As Iranian cyber actors continue to evolve and collaborate with ransomware groups, the need for increased vigilance across all sectors critical to national security is paramount. The blurred line between cybercrime and state-sponsored espionage underscores the importance of staying vigilant to protect against the potential consequences that extend beyond financial loss to the heart of national security.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...