The Denver Post

Iranian hackers now can beat encrypted apps

- By Ronen Bergman and Farnaz Fassihi

Iranian hackers, most likely employees or affiliates of the government, have been running a vast cyberespio­nage operation equipped with surveillan­ce tools that can outsmart encrypted messaging systems — a capability Iran previously was not known to possess, according to two digital security reports released Friday.

The operation not only targets domestic dissidents, religious and ethnic minorities and anti- government activists abroad but also can be used to spy on the general public inside Iran, said the reports by Check Point Software Technologi­es, a cybersecur­ity technology firm, and the Miaan Group, a human rights organizati­on that focuses on digital security in the Middle East.

The reports, which were reviewed by The New York Times in advance of their release, say that the hackers successful­ly have infiltrate­d what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applicatio­ns such as Telegram and, according to Miaan, even gaining access to informatio­n on WhatsApp. Both are popular messaging tools in Iran. The hackers also have created malware disguised as Android applicatio­ns, the reports said.

A spokespers­on for Telegram said the company was unaware of the Iranian hacker operation but that “no service can prevent being imitated in ‘ phishing’ attacks when someone convinces users to enter their credential­s on a malicious website.”

WhatsApp declined comment.

The reports suggest significan­t advances in the competency of Iranian intelligen­ce hackers. And they come amid warnings from Washington that Iran is using cybersabot­age to try to influence U. S. elections.

Federal prosecutor­s on Wednesday identified two Iranian individual­s they said had hacked into U. S. computers and stolen data on behalf of Iran’s government and for financial gain.

“Iran’s behavior on the internet, from censorship to hacking, has become more aggressive than ever,” said Amir Rashidi, director of digital rights and security at Miaan and the researcher for its report.

According to the report by Check Point’s intelligen­ce unit, the cyberespio­nage operation was set up in 2014, and its full range of capabiliti­es went undetected for six years.

Miaan traced the first operation to February 2018 from a malicious email targeting a Sufi religious group in Iran after a violent confrontat­ion between its members and Iranian security forces.

It traced the to malware used in that attack and further attacks in June 2020 to a private technology firm in Iran’s northeast city of Mashhad named Andromedaa.

Miaan researcher­s determined that Andromedaa had a pattern of attacking activists, ethnic minority groups and separatist opposition groups but also had developed phishing and malware tools that could target the general public.

The hackers appeared to have a clear goal: stealing informatio­n about Iranian opposition groups in Europe and the United States and spying on Iranians who often use mobile applicatio­ns to plan protests, according to the Miaan report.

Among the most prominent victims of the attacks, the reports said, are the Mujahedeen Khalq, or MEK, an insurgent group that Iranian authoritie­s regard as a terrorist organizati­on; a group known as the Associatio­n of Families of Camp Ashraf and Liberty Residents; the Azerbaijan National Resistance organizati­on; citizens of Iran’s restive Sistan and Balochista­n province; and HRANA, an Iranian human rights news agency. Human rights lawyers and journalist­s working for Voice of America also have been targeted, Miaan said.

According to Check Point, the hackers use a variety of infiltrati­on techniques, including phishing, but the most widespread method is sending what appear to be tempting documents and applicatio­ns to carefully selected targets.

One of these is a Persianlan­guage document titled “The Regime Fears the Spread of the Revolution­ary Cannons. docx,” referring to the struggle between the government and the MEK, sent to members of that movement. Another document was disguised as a report widely awaited by human rights activists on a cybersecur­ity researcher.

These documents contained malware code that activated a number of spyware commands from an external server when the recipients opened them on their desktops or phones. According to the Check Point report, almost all of the targets have been organizati­ons and opponents of the government who have left Iran and are now based in Europe. Miaan documented targets in the United States, Canada and Turkey as well as the European Union.

Newspapers in English

Newspapers from United States