San Francisco Chronicle - (Sunday)

Microsoft seizes websites traced to Iranian hackers

- By Karen Weise Karen Weise is a New York Times writer.

Microsoft took control of 99 websites that it said Iranian hackers had used to try to steal sensitive informatio­n from targets in the United States, according to court documents unsealed last week.

By taking over the sites, Microsoft can stop future cyberattac­ks and monitor how previously infected computers were compromise­d, the company said.

The hackers “specifical­ly directed” their attacks on people in Washington, Microsoft said in the filing. The hacking group typically has targeted the personal email accounts of people working in both the public and private sectors, including dissidents and workers in government agencies, Microsoft said in court documents.

People working in the Treasury Department and similar agencies in other Western government­s were among those targeted, according to a person with knowledge of the attacks who spoke on the condition of anonymity.

The Treasury Department, which did not immediatel­y respond to a request for comment, oversees economic sanctions against Iran.

Microsoft sued the hackers in the U.S. District Court in Washington and asked to gain control of the sites, saying the hackers had harmed its brand and the value of its trademarks by impersonat­ing its products to trick victims. On March 15, Judge Amy Berman Jackson granted a temporary restrainin­g order that let Microsoft take over the websites.

Microsoft said the hacking group, which it calls Phosphorus but is also known as APT 35 and Charming Kitten, had been linked to Iran. The group uses a technique known as spear phishing, sending email and social media links to victims while imitating the personas of people or institutio­ns they may know. That either prompts the users to click on links that install malware that lets the hackers spy on the victims’ computers, or prompts the victims to enter their login credential­s, which the hackers then later use to log in to official systems.

The Iranian hackers faked the look and language of several Microsoft products, including LinkedIn, OneDrive and Hotmail, Microsoft said in the documents.

By seizing the sites, Microsoft set up what is known as a “sinkhole,” which lets it monitor the traffic that otherwise would have been captured by the hackers.

“While we’ve used daily security analytics tracking to stop individual Phosphorus attacks and notify impacted customers, the action we executed last week enabled us to take control of websites that are core to its operations,” Tom Burt, a Microsoft security executive, said in a blog post.

Microsoft has used this legal and technical approach before, including for fighting the botnets that spit out spam email. It also used the approach against Fancy Bear, a hacking group widely considered to be affiliated with Russian intelligen­ce, which Microsoft said had targeted think tanks and political groups in the United States and Europe.

 ?? Ted S. Warren / Associated Press 2014 ?? The hackers “specifical­ly directed” their attacks on people in Washington, Microsoft said in its filing.
Ted S. Warren / Associated Press 2014 The hackers “specifical­ly directed” their attacks on people in Washington, Microsoft said in its filing.

Newspapers in English

Newspapers from United States