News
May 25

Iranian state-backed cyber spies  

📌Impersonation ‎Tactics:‏ ‎APT42 ‎has ‎been ‎impersonating ‎well-known‏ ‎news ‎outlets‏ ‎and‏ ‎think ‎tanks, ‎such ‎as‏ ‎The ‎Washington‏ ‎Post, ‎The ‎Economist, ‎and‏ ‎The‏ ‎Jerusalem ‎Post, ‎to‏ ‎target ‎journalists,‏ ‎researchers, ‎and ‎activists ‎in‏ ‎Western‏ ‎countries‏ ‎and ‎the ‎Middle‏ ‎East. ‎This‏ ‎campaign, ‎which‏ ‎began‏ ‎in ‎2021 ‎and‏ ‎is ‎still ‎ongoing, ‎involves‏ ‎creating ‎fake‏ ‎website‏ ‎links‏ ‎to ‎harvest ‎login ‎credentials ‎from‏ ‎victims.

📌Minimal ‎Footprint: ‎The‏ ‎methods‏ ‎deployed‏ ‎by ‎APT42 ‎are‏ ‎designed ‎to ‎leave‏ ‎a ‎minimal‏ ‎footprint,‏ ‎making ‎the‏ ‎detection ‎and ‎mitigation ‎of‏ ‎their ‎activities‏ ‎more‏ ‎challenging‏ ‎for ‎network‏ ‎defenders. ‎This‏ ‎stealthiness ‎is‏ ‎achieved‏ ‎through ‎the‏ ‎use ‎of ‎typosquatting ‎and ‎social‏ ‎engineering ‎techniques.

📌Typosquatting‏ ‎and‏ ‎Social ‎Engineering: ‎APT42 ‎often‏ ‎uses ‎typosquatting,‏ ‎acquiring ‎web ‎domains ‎that‏ ‎look‏ ‎real ‎but ‎contain‏ ‎small ‎errors‏ ‎or ‎alterations, ‎to ‎create‏ ‎malicious‏ ‎links.‏ ‎These ‎links ‎redirect‏ ‎recipients ‎to‏ ‎fake ‎Google‏ ‎login‏ ‎pages. ‎An ‎example‏ ‎provided ‎is ‎«washinqtonpost[.]press, ‎”‏ ‎where ‎a‏ ‎„q“‏ ‎replaces‏ ‎the ‎„g“ ‎in ‎„Washington“.

📌Targeting ‎Specific‏ ‎Individuals: ‎In ‎2023,‏ ‎APT42‏ ‎reportedly‏ ‎impersonated ‎a ‎senior‏ ‎fellow ‎with ‎the‏ ‎U.K. ‎think‏ ‎tank‏ ‎the ‎Royal‏ ‎United ‎Services ‎Institute ‎(RUSI)‏ ‎while ‎attempting‏ ‎to‏ ‎spread‏ ‎malware ‎to‏ ‎a ‎nuclear‏ ‎security ‎expert‏ ‎at‏ ‎a ‎U.S.-based‏ ‎think ‎tank ‎focused ‎on ‎foreign‏ ‎affairs.

📌Cloud ‎Environment‏ ‎Attacks: Between‏ ‎2022 ‎and ‎2023, ‎APT42‏ ‎was ‎observed‏ ‎exfiltrating ‎documents ‎and ‎sensitive‏ ‎information‏ ‎from ‎victims’ ‎public‏ ‎cloud ‎infrastructure,‏ ‎such ‎as ‎the ‎Microsoft‏ ‎365‏ ‎environment.‏ ‎These ‎attacks ‎targeted‏ ‎legal ‎services‏ ‎companies ‎and‏ ‎nonprofits‏ ‎in ‎the ‎U.S.‏ ‎and ‎the ‎U.K.

📌Overlap ‎with‏ ‎Other ‎Operations: APT42's‏ ‎activities‏ ‎overlap‏ ‎with ‎other ‎Iran-linked ‎operations ‎labeled‏ ‎TA453, ‎Charming ‎Kitten,‏ ‎and‏ ‎Mint‏ ‎Sandstorm. ‎This ‎indicates‏ ‎a ‎broader ‎pattern‏ ‎of ‎cyber‏ ‎espionage‏ ‎activities ‎linked‏ ‎to ‎Iranian ‎state ‎interests

Follow on TG & Boosty