ShtëpiMenaxhimi i riskutIranian Hackers Target Critical National Infrastructure with Brute Force Attacks

Iranian Hackers Target Critical National Infrastructure with Brute Force Attacks

Publikuar më

spot_img

Intelligence and law enforcement agencies in Australia, Canada, and the US have raised concerns about an Iran-backed cyber campaign that has been active for over a year. According to a joint advisory issued by various agencies, the hackers behind this campaign have been using brute force and other sophisticated techniques to target organizations across several critical infrastructure sectors.

The campaign, which was first detected in October 2023, has specifically focused on critical sectors such as healthcare, government, information technology, engineering, and energy. The cyber threat actors responsible for the attacks have been identified as using techniques like brute force attacks, password spraying, and multifactor authentication (MFA) push bombing to gain access to victim networks.

Prior to infiltrating targeted organizations, the hackers conducted thorough reconnaissance operations to collect crucial information about their victims. By leveraging valid user and group email accounts obtained through brute force attacks, the actors were able to gain persistent access to systems such as Microsoft 365, Azure, and Citrix.

In cases where MFA was enabled, the hackers implemented a technique known as ‘MFA fatigue’ or ‘MFA push bombing’ by bombarding users with push notifications until they either accidentally approved the request or stopped the notifications. Once inside a victim’s network, the threat actors utilized methods like Remote Desktop Protocol (RDP), Kerberos Service Principal Name (SPN), and Microsoft Active Directory to move laterally, escalate privileges, and gather credentials.

To help organizations detect and mitigate the risks posed by this campaign, the joint advisory outlined several recommendations. These included monitoring for suspicious logins with changing usernames, user agent strings, and IP address combinations, as well as looking out for unusual activity in dormant accounts and processes indicating credential dumping.

In terms of mitigation strategies, the advisory suggested reviewing password management practices, disabling access for departing staff, implementing phishing-resistant MFA, and providing cybersecurity training to users. Additionally, organizations were advised to align their password policies with the latest NIST Digital Identity Guidelines, disable the use of RC4 for Kerberos authentication, and continuously review MFA settings to ensure coverage over all active, internet-facing protocols.

The advisory, signed by prominent agencies such as the FBI, NSA, CISA, CSE, AFP, and ACSC, serves as a crucial alert to organizations operating within critical infrastructure sectors. By being vigilant and implementing the recommended detection and mitigation measures, entities can enhance their cybersecurity posture and defend against the ongoing threat posed by these Iran-backed hackers.

Lidhja e burimit

Artikujt e fundit

The Increasing Threat of Cybercrime Affects Us All

In recent years, cybercrime has been on the rise, with phishing attacks and ransomware...

Industrial and Critical Infrastructure Defenders Set to Convene in Atlanta for 2024 ICS Cybersecurity Conference

The buzz around the 2024 ICS Cybersecurity Conference is at its peak as cybersecurity...

Hacking Facebook Without Detection for Free – Step By Step Guide for 2024 #1 Ce [xgvdl5z] – Portal da Câmara dos Deputados

A recent article from a reputable source has shed light on a seemingly alarming...

Hacker Pretends to be Israeli Security Vendor to Distribute Wiper

Cybercriminals have recently posed as a prominent security firm in Israel to carry out...

Më shumë si kjo

The Increasing Threat of Cybercrime Affects Us All

In recent years, cybercrime has been on the rise, with phishing attacks and ransomware...

Industrial and Critical Infrastructure Defenders Set to Convene in Atlanta for 2024 ICS Cybersecurity Conference

The buzz around the 2024 ICS Cybersecurity Conference is at its peak as cybersecurity...

Hacking Facebook Without Detection for Free – Step By Step Guide for 2024 #1 Ce [xgvdl5z] – Portal da Câmara dos Deputados

A recent article from a reputable source has shed light on a seemingly alarming...
sqAlbanian