Security experts at ClearSky analyzed attacks recently uncovered by Microsoft that targeted a US presidential candidate, government officials, journalists, and prominent expatriate Iranians. Microsoft Threat Intelligence Center (MSTIC) observed the APT group making more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers and then attack 241 of those accounts.
ClearSky researchers pointed out that these attacks represent a shift in the group tactics because this is the first time that the Charming Kitten group attempted to interfere in the elections of a foreign country.
The experts said, with medium-high confidence, that the campaign uncovered by Microsoft is the same campaign they observed over the past several months.
“We evaluate in a medium-high level of confidence, that Microsoft’s discovery and our findings in our previous and existing reports is a congruent operation” reads the report published by ClearSky, “based on the following issues:
Iran-linked Charming Kitten group, (aka APT35, Phosphorus, Newscaster, and Ajax Security Team) made the headlines in 2014 when experts at iSight issued a report describing the most elaborate net-based spying campaign organized by Iranian hackers using social media.
Microsoft has been tracking the threat actors at least since 2013, but experts believe that the cyberespionage group has been active since at least 2011.
As part of the recently observed campaign, the state-sponsored hackers used three different spear-phishing methods:
Experts have identified more than eight new and unknown domains, all of which bear the ‘.site’ TL, that were involved in the attacks.
Other technical information, along with indicators of compromise (IoCs) are included in the report.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Charming Kitten, Iran)
[adrotate banner=”5″]
[adrotate banner=”13″]
PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…
Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…
Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading…
Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…
Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…
A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…
This website uses cookies.