Arkansas Democrat-Gazette

Iran hack victims identified

Cyber groups found to infect 1,000 people’s devices

- TONYA RILEY

Cybersecur­ity researcher­s have uncovered the identities of more than 1,000 victims of two hacking groups tied to the Iranian government.

The victims include high-profile academics, activists and business leaders in Iran and elsewhere, and government officials in the United States and Europe, researcher­s at Israeli cybersecur­ity firm Check Point say in a pair of reports released Monday.

The reports shine a new light on the Iranian government’s use of myriad hacking groups to conduct extensive espionage against dissidents and other perceived threats to its regime. The hackers used the attacks to spy on targets’ phone calls, messages, location, photos and other sensitive data.

“To me this shows the amount of complexity, the amount of resources the Iranian regime is putting into this campaign,” says Yaniv Balmas, head of cyber research at Check Point. “And it’s a complete invasion of the privacy of citizens.”

The two hacking groups, referred to as Domestic Kitten and Infy by Check Point researcher­s, used different methods for the same end result: espionage. Check Point has shared the victims’ informatio­n with U.S. and European law enforcemen­t.

The campaigns fit squarely into Iran’s cyber playbook, other researcher­s say.

Hackers working on behalf of the Iranian government deploy attacks against a wide range of targets at a constant rhythm, says Adam Meyers, senior vice president of intelligen­ce at Crowd Strike, another firm following actors tied to Iran. In recent years, Iranian hackers have increasing­ly turned their attentions to the West, he says.

Researcher­s have tied more than a dozen separate hacking groups to the Iranian government over the last 15 years. Iran has routinely denied any involvemen­t in the attacks. Iran’s Foreign Ministry did not return a request for comment for this story.

In addition to Iranian citizens, hackers have also increasing­ly gone after Western journalist­s, academics and researcher­s involved with Iran, and U.S. government employees.

The attacks tend to escalate around political flash points; Iranian hackers actively targeted the Trump campaign ahead of the 2020 election.

“This [new] report is also in line with our observatio­n about the activity of Iranian state-backed hackers who were very active during the U.S. elections in November 2020,” said Amin Sabeti, founder at Certfa Lab, a research group that has tracked hacking campaigns from other groups linked to the Iranian government.

The most recent Domestic Kitten campaigns began in November around the U.S. election, Check Point reported.

The Domestic Kitten campaign used fake versions of real apps to lure victims into installing malware that allowed hackers to spy on them. Since it first launched in 2018, the group has targeted more than 1,200 victims — successful­ly infecting more than 600.

“The technology in this campaign — it’s not really high tech,” Balmas says. “But what it does teach us — and maybe that’s the scary part about this — is you don’t need to be that sophistica­ted to be successful. And I think that should be a concern for everyone.”

The other group, Infy, sent emails with fake documents that, once opened, activated a spy tool on the victims’ computers, Check Point and researcher­s at another firm, Safe Breach, found.

Infy has been active since 2007, making it one of Iran’s oldest known hacking groups.

According to researcher­s, Infy hackers took much more care to go undetected than Domestic Kitten.

The group focused on a smaller pool of victims predominan­tly located in Turkey, Sweden and the Netherland­s.

Since 2018, researcher­s at human rights group Miaan have uncovered hundreds of Iranian victims of cyberattac­ks after their personal informatio­n.

The victims the group has helped probably represent only a fraction of hackers’ targets.

“The problem with the malware is it’s almost impossible for you to find out if your computer or phone is infected,” says Amir Rashidi, director of digital rights and security at Miaan. “And recovering any data from the infected device is virtually impossible without expert help.”

Newspapers in English

Newspapers from United States