Iran General NewsIs Russia Helping Iran to Hack US Military Contractors?

Is Russia Helping Iran to Hack US Military Contractors?

-

Iran Focus 

London, 16 May – In April, US computer security experts had to combat a threat from a gang of hackers, believed to be Iranian, who were trying to hack into the network of a military contractor.

Had the hackers been successful, it could have been a major problem for US national security, but luckily, the defenders managed to block them at every turn.

The defenders believe that Russia may have been involved in this hacking attempt, as the Iranian hackers were using a toolset that belonged to a Russian mercenary hacker who attacked Ukraine in 2015 and shut down parts of the country’s power grid.

Carl Wright, an executive at TrapX, the Silicon Valley security firm that thwarted the hackers last month, said: “This is the very first time we’ve catalogued an attack where Iranian hackers are working with Russian hackers-for-hire.”

TrapX cannot name the victim of the attack due to confidentiality agreements.

Tom Kellermann, a computer security expert who previously served as the chief cybersecurity officer at Trend Micro, the Tokyo-based security giant, and was a member of a commission advising the Obama administration on online security, said that this Iran-Russia hacking partnership was “historic”.

He said: “Iranian hackers have dramatically increased their cyber weaponry and tactical proficiency as a result.”

The Iranian hackers, known as OilRig, have previously hacked oil companies in Saudi Arabia and Israel, before targeting military, financial and energy companies in Europe and the US.

However, security experts have dismissed the Iranian hackers as the “B-Team” arguing that they are not as advanced as Chinese, Russian or Eastern European hackers.

Moshe Ben-Simon, vice president of TrapX Labs, the company’s research arm, noted that 70% of the code used in April’s attack was identical to that used by OilRig in the past but the final stage was completely different.

He said: “It was a departure from anything they’ve done in over 200 documented attacks.”

He noted that it took weeks to crack the tool and extract information.

Other security experts note that it is possible for the Iranian hackers to have taken the Russian hacking tool without permission and customise it.

TrapX rebuts this though, noting that several of the web domains were registered to a Russian alias and three of the emails are still being used in Russian hacking forums and on the Dark Web.

Wright also notes that the hacker has been renting out services on the Dark Web.

 

Latest news

Parliamentary Election Rejected by 92% of Eligible Voters in Tehran

The second round of the twelfth parliamentary elections of the Iranian regime in Tehran was held with an "8...

Alarming Threat of Land Subsidence in Iran’s Urban Areas and Infrastructure Facilities

Ali Javidaneh, the head of the Iranian regime’s Mapping Organization, has raised concerns about the situation of land subsidence...

Strikes Continue in Gold Markets Across Iran

Despite the efforts of Iranian regime security entities, the Ministry of Industry, Mine and Trade, and the Gold and...

Iran: Three Nurses Dead from Burnout in One Month

Three nurses in Iran have lost their lives due to "excessive work" in the span of one month, the...

Iranian Chamber of Commerce Reports Worsening Economic Conditions

In its latest report on the state of the Purchasing Managers Index (PMI), the Research Center of the Iranian...

Canadian Intel: Tehran’s Operations in Canada Have Become More Aggressive and Widespread

The Canadian Security Intelligence Service announced in its annual report on foreign interventions in Canada in 2023 that during...

Must read

Comments on Iran by new British Foreign Secretary

Iran Focus: London, May 09 - The new British...

S.Africa Engen buys Saudi crude to replace Iran

Reuters: Engen has turned to top oil exporter Saudi...

You might also likeRELATED
Recommended to you

Exit mobile version