San Francisco Chronicle

Hackers hunt nuclear workers and U.S. officials

- Raphael Satter is an Associated Press writer. By Raphael Satter

LONDON — As President Trump re-imposed harsh economic sanctions on Iran last month, hackers scrambled to break into personal emails of American officials tasked with enforcing them, The Associated Press has found — another sign of how deeply cyberespio­nage is embedded into the fabric of U.S.-Iranian relations.

The AP drew on data gathered by the London-based cybersecur­ity group Certfa to track how a hacking group often nicknamed Charming Kitten spent the past month trying to break into the private emails of more than a dozen U.S. Treasury officials. Also on the hackers’ hit list: highprofil­e defenders, detractors and enforcers of the nuclear deal struck between Washington and Tehran, as well as Arab atomic scientists, Iranian civil society figures and D.C. think tank employees.

“Presumably, some of this is about figuring out what is going on with sanctions,” said Frederick Kagan, a scholar at the American Enterprise Institute who has written about Iranian cyberespio­nage and was among those targeted.

Kagan said he was alarmed by the targeting of foreign nuclear experts.

“This is a little more worrisome than I would have expected,” he said.

The hit list surfaced after Charming Kitten mistakenly left one of its servers open to the internet last month. Researcher­s at Certfa found the server and extracted a list of 77 Gmail and Yahoo addresses targeted by the hackers that they handed to the AP for further analysis.

It’s hard to know how many of the accounts were successful­ly compromise­d or how exactly they were targeted in each case. But even though the addresses likely represent only a fraction of the hackers’ overall efforts, they still provide considerab­le insight into Tehran’s espionage priorities.

“The targets are very specific,” Certfa researcher Nariman Gharib said.

In a report published Thursday, Certfa tied the hackers to the Iranian government, a judgment drawn in part on operationa­l blunders, including a couple of cases where the hackers appeared to have accidental­ly revealed that they were operating from computers inside Iran. The assessment was backed by others who have tracked Charming Kitten. Allison Wikoff, a researcher with Atlanta-based Securework­s, recognized some of the digital infrastruc­ture in Certfa’s report and said the hackers’ past operations left little doubt they were government-backed.

“It’s fairly clear-cut,” she said.

 ?? Raphael Satter / Associated Press ?? Nariman Gharib (left), a researcher for the London-based cybersecur­ity group Certfa, said the “targets are very specific.” The British group tied the hackers to the Iranian government.
Raphael Satter / Associated Press Nariman Gharib (left), a researcher for the London-based cybersecur­ity group Certfa, said the “targets are very specific.” The British group tied the hackers to the Iranian government.

Newspapers in English

Newspapers from United States