HomeSecurity ArchitectureIranian backdoors discovered in Middle East telecoms, government agencies, according to Google

Iranian backdoors discovered in Middle East telecoms, government agencies, according to Google

Published on

spot_img

Iran’s Ministry of Intelligence and Security (MOIS) has been identified as the epicenter of a sophisticated cyber operation that serves as the gateway for Iranian hackers to infiltrate the systems of telecommunications and government organizations throughout the Middle East. Mandiant, a Google unit, released a detailed report on Thursday, shedding light on this operation dubbed UNC1860. According to Mandiant, hackers associated with UNC1860 have developed a wide array of specialized tools and passive backdoors that enable them to facilitate other Iranian hacking endeavors.

The report highlighted UNC1860’s involvement in destructive and disruptive operations targeting Israel in late October 2023 with BABYWIPER and Albania in 2022 using ROADSWEEP. Although Mandiant could not independently verify UNC1860’s direct participation in these specific operations, they did uncover tools that were likely designed to facilitate such activities through collaborative efforts.

One of the key aspects of UNC1860 emphasized by Mandiant is its ability to maintain an extensive collection of passive utilities that aid in establishing initial access and lateral movement within targeted systems. These tools are meticulously crafted to evade detection by anti-virus software and provide clandestine access for a myriad of purposes. Mandiant described UNC1860 as a formidable threat actor capable of supporting various objectives, ranging from espionage to network attacks.

Moreover, Mandiant discovered evidence linking UNC1860’s tools to other MOIS-affiliated hacking groups, such as APT34, which is known for infiltrating government systems in countries like Jordan, Israel, Saudi Arabia, and others. Recent revelations exposed APT34’s extensive operation targeting government officials in Iraq, further solidifying the interconnected nature of Iranian cyber activities in the region.

In a significant development, Mandiant was engaged in 2020 to respond to incidents where UNC1860 exploited a victim’s network to scan for IP addresses and vulnerabilities primarily concentrated in Saudi Arabia. Additionally, traces of UNC1860’s interest in domains associated with Qatar were also uncovered. The company pointed out that tools utilized in a March 2024 campaign involving wiper malware targeting Israeli entities could be attributed to UNC1860.

The modus operandi of UNC1860 involves gaining initial access to target environments and subsequently deploying stealthier utilities and passive implants to ensure prolonged presence within compromised systems. Several other cybersecurity firms, including Cisco, Check Point, and Fortinet, have previously highlighted UNC1860’s tools, indicating the widespread recognition of the threat posed by this Iranian cyber actor.

As Iran’s cyber operations continue to escalate in sophistication and boldness, it has garnered increased attention from security researchers and government entities worldwide. Recent revelations by the FBI and other law enforcement agencies implicated Iranian hackers in stealing documents from the campaign of former President Donald Trump, underscoring the country’s growing cyber prowess and audacity on the global stage.

In a tumultuous Middle East landscape characterized by shifting tensions and evolving geopolitical dynamics, Mandiant highlighted the strategic significance of UNC1860’s proficiency in gaining initial access to target environments, positioning it as a valuable asset within the Iranian cyber ecosystem. As geopolitical priorities evolve, UNC1860’s capabilities are poised to be leveraged to advance Iran’s strategic objectives in the cyber domain.

Source link

Latest articles

Google Street View Images Extortion Email Scams Warning

In a digital age rife with scams and cyber threats, the evolution of online...

Assessment of Cloud Security

The recent article on CISO2CISO.com discussing the importance of Cloud Security Assessment has stirred...

Marko Polo hackers caught operating numerous scams

A group of cybercriminals operating under the alias "Marko Polo" has been identified by...

CrowdStrike Broadens Cybersecurity Startup Accelerator through Partnership with AWS and NVIDIA

In an exciting development for the cybersecurity industry, CrowdStrike, in collaboration with Amazon Web...

More like this

Google Street View Images Extortion Email Scams Warning

In a digital age rife with scams and cyber threats, the evolution of online...

Assessment of Cloud Security

The recent article on CISO2CISO.com discussing the importance of Cloud Security Assessment has stirred...

Marko Polo hackers caught operating numerous scams

A group of cybercriminals operating under the alias "Marko Polo" has been identified by...
en_USEnglish