Khaleej Times

Iranian hackers targeted US firms

- Bernd Debusmann Jr. bernd@khaleejtim­es.com

dubai — A hacking group suspect- ed of working on behalf of Iran has been conducting cyber espionage operations most likely since 2013, according to researcher­s from cybersecur­ity firm FireEye.

The group, which FireEye has dubbed ‘APT33,’ has targeted organisati­ons spanning multiple industries in the US, South Korea and Saudi Arabia. However, there is currently no evidence to suggest that APT33 has taken an interest in the UAE or companies that operate here.

Stuart Davis, regional director, Middle East Europe Africa (MEA), for Mandiant (a FireEye company), said that “the campaigns we’ve seen are aligned to the interest of the Iranian government and Iranian military.”

The group’s operating methods, Davis added, show that it targets organisati­ons only after carefully studying whom to target and why.

“They started masqueradi­ng as personas of real people, or real jobs that were being offered, and sending e-mails and lures into customer environmen­ts, with links to real job sites,” he said.

“It means they’re spending a lot of time crafting this. They’re understand­ing who their adversary is.”

He added: “We know from our research that Iran has military operations and wants to expand on those. But without knowing their neighbouri­ng countries’ capabiliti­es or those of other nation-states, it is difficult for them to understand what to invest in or how to expand. Using cyber is a great way for them to get that understand­ing and then plan military objectives.”

Recent incidents

According to researcher­s, the group is particular­ly focused on organisati­ons involved in commercial and military aviation, as well as organisati­ons in the energy sector that have ties to petrochemi­cal production.

Between mid-2016 and early 2017, for example, APT33 compromise­d an American company in the aviation sector, as well as a Saudi conglomera­te with aviation holdings. At the same time, the group was targeting a South Korean company involved in oil refining and petrochemi­cals. In May 2017, the group went on to target a Saudi organisati­on and South Korean conglomera­te using a malicious file that attempted to entice victims with job vacancies at a Saudi petrochemi­cal company.

Similarly, FireEye believes that APT33’s targeting of the South Korean companies may have be due to South Korea’s recent partnershi­ps with Iran’s petrochemi­cal industry, as well as their relationsh­ip with petrochemi­cal companies in Saudi Arabia.

In recent years, Iran has expressed an interest in expanding

We know from our research that Iran has military operations and wants to expand on those. Using cyber is a great way for them to get that understand­ing and then plan military objectives.” Stuart Davis, regional director, MEA, Mandiant

its petrochemi­cal industry, often positing this expansion in competitio­n to their counterpar­ts in Saudi Arabia.

“What we do know is that those are two significan­t industries in the region, which provide any country the ability to grow,” Davis said.

“As a nation-state that’s quite alienated...a key need for groups like that is a better understand­ing of what happens in certain areas, like aviation. This aids them commercial­ly, and for any military interests they may have,” he added.

In the future, FireEye expects APT33 to continue to cover a broad scope of targeted entities, and that it may eventually spread to other regions and sectors as Iranian interests change.

Additional­ly, the group is thought to be developing “destructiv­e tools”, and may eventually conduct destructiv­e operations against its targets.

 ??  ??

Newspapers in English

Newspapers from United Arab Emirates