Iranian hacking groups are evolving, warns Microsoft

Cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets

Microsoft have outlined six cyber espionage groups in Iran behind a spate of ransomware attacks occurring roughly every six weeks since September last year.

In a blog post, researchers at the Microsoft Threat Intelligence Center (MSTIC) said that an analysis of several threat actors based in Iran revealed that the hackers have become increasingly sophisticated in the use of tools, techniques, and procedures.

The tech giant said that three noticeable trends have emerged. First, these Iranian cyber espionage groups are increasingly utilizing ransomware to either collect funds or disrupt their targets. Second, they are more patient and persistent while engaging with their targets.

Thirdly, while Iranian operators are more patient and persistent with their social engineering campaigns, they continue to employ aggressive brute force attacks on their targets.

Microsoft said that since September 2020, it had observed six Iranian threat groups deploying ransomware to achieve their strategic objectives. These ransomware deployments were launched in waves every six to eight weeks on average. One of the tracked groups, called Phosphorus, was seen targeting vulnerable security products.

“In one observed campaign, Phosphorus targeted the Fortinet FortiOS SSL VPN and unpatched on-premises Exchange Servers globally with the intent of deploying ransomware on vulnerable networks,” said researchers.

Related Resource

Busting the myths about SSO

Why SSO capability is critical to the success of IAM

Pixelated black and white image with whitepaper title above on white backgroundFree download

Researchers said that this group collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel so far this year. The group then shifted to scanning for unpatched on-premises Exchange Servers vulnerable to ProxyShell.

The same group also used BitLocker to encrypt data and ransom victims at several targeted organizations.

“After compromising the initial server (through vulnerable VPN or Exchange Server), the actors moved laterally to a different system on the victim network to gain access to higher value resources. From there, they deployed a script to encrypt the drives on multiple systems. Victims were instructed to reach out to a specific Telegram page to pay for the decryption key,” the researchers said.

The hackers also stole credentials by sending “interview requests” to target individuals through emails that contain tracking links to confirm whether the user has opened the file. If a victim responds, they then send a link to a fake Google Meeting, which leads to a credential harvesting page.

Another group mentioned in the report was Curium that instead of using phishing emails, uses a network of fictitious social media accounts to build trust with targets and deliver malware.

Featured Resources

The challenge of securing the remote working employee

The IT Pro Guide to Sase and successful digital transformation

Free Download

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Free download

Practices for maximising the business value of digital infrastructure Consumption-as- a-Service subscriptions

IDC PeerScape

Free Download

Container network security guide for dummies

Enforcing Kubernetes best practices

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
Solving cyber security's diversity problem
Careers & training

Solving cyber security's diversity problem

5 Jan 2022