It was the “most elaborate social-engineering campaign” these security researchers had ever seen.
A new report from iSight Partners, a Dallas-based computer-security firm, exposed on Thursday a three-year cyberespionage campaign carried out by Iranian hackers. The digital attacks, which infected about 2,000 U.S. personal computers since 2011, targeted members of the U.S. military and Congress, as well as diplomats, lobbyists, and Washington-based journalists.
The long-term campaign, dubbed “Newscaster” by the security firm, employed a dozen fake social-media accounts on sites such as Facebook, Twitter, and LinkedIn. Hackers sent targets links that, when accessed, would unleash malware. They directed people to fake login screens to steal their user names and passwords. They impersonated journalists and defense contractors, and even set up a fake news website to lure victims.
All signs pointed to Iran as the source. Nicole Perlroth writes in The New York Times:
There were many clues. The fake NewsOnAir.org website was registered in Tehran and sites that hackers used to deploy their malware were also hosted in Iran. The malware that the hackers used contained several Persian words. The time stamps of hackers’ activity tracked with professional working hours in Tehran. They even took the day off on Iranian weekends and holidays.
Another telltale sign, researchers said, was the content the hackers posted on their personas’ social media. In some cases, they posted Iranian jokes to their Facebook pages. One hacker used a Facebook page to ask followers, “What’s kind of sanction will lead to undermining the Iranian nation?”
It’s unclear exactly what information these hackers stole. But the fact that such a highly coordinated attack went unnoticed for several years suggests that the technical skills of Iranian hackers, usually outdone by far-superior Chinese and Russian hackers, are improving. This time last year, a wave of attacks targeting American energy companies was traced to Iran. Back then, U.S. intelligence officials were already worried about Iranian hackers’ growing talents.
What We're Following See More »
"Christopher Steele, the former British intelligence officer who wrote the explosive dossier alleging ties between Donald Trump and Russia," says in a new book by The Guardian's Luke Harding that "Trump's land and hotel deals with Russians needed to be examined. ... Steele did not go into further detail, Harding said, but seemed to be referring to a 2008 home sale to the Russian oligarch Dmitry Rybolovlev. Richard Dearlove, who headed the UK foreign-intelligence unit MI6 between 1999 and 2004, said in April that Trump borrowed money from Russia for his business during the 2008 financial crisis."
"The British publicist who helped set up the fateful meeting between Donald Trump Jr. and a group of Russians at Trump Tower in June 2016 is ready to meet with Special Prosecutor Robert Mueller's office, according to several people familiar with the matter. Rob Goldstone has been living in Bangkok, Thailand, but has been communicating with Mueller's office through his lawyer, said a source close to Goldstone."
"Russian Ambassador Sergey Kislyak said on Wednesday that it would take him more than 20 minutes to name all of the Trump officials he's met with or spoken to on the phone. ... Kislyak made the remarks in a sprawling interview with Russia-1, a popular state-owned Russian television channel."