Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Iranian hackers have launched a new network to target US political campaigns
Global Security

Iranian hackers have launched a new network to target US political campaigns

AdminBy AdminAugust 30, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 30, 2024Ravi LakshmananCyber ​​threat / Cyber ​​espionage

Cybersecurity researchers have discovered a new network infrastructure created by Iranian threat actors to support activities related to recent attacks on political campaigns in the United States.

Insikt group Recorded Future has linked the infrastructure to a threat it tracks as GreenCharlie, an Iran-linked cyber threat group that overlaps with APT42, Charming Kitten, Damselfly, Mint Sandstorm (formerly Phosphorus), TA453 and Yellow Garuda.

Cyber ​​security

“The group’s infrastructure is meticulously designed using dynamic DNS (DDNS) providers such as Dynu, DNSEXIT and Vitalwerks to register domains used in phishing attacks,” the cybersecurity firm said in a statement. said.

“These domains often use deceptive themes related to cloud services, file sharing, and document visualization to lure targets into revealing sensitive information or downloading malicious files.”

Examples include terms such as “cloud”, “uptimezone”, “doceditor”, “cloud join” and “page viewer”, among others. Most domains were registered using the .info top-level domain (TLD), a departure from the previously observed .xyz, .icu, .network, .online, and .site TLDs.

The adversary is experienced in conducting targeted phishing attacks that use extensive social engineering techniques to infect users with malware such as POWERSTAR (aka CharmPower and GorjolEcho) and HARBALwhich was recently identified by Google-owned Mandiant as being used in campaigns against Israel and the US

GORBLE, THE DOMESTIC CATand POWERSTAR are rated as variants of the same malware, a series of PowerShell implants that have been continuously developed and deployed by GreenCharlie over the years. It should be noted that Proofpoint detailed the dubbing of another POWERSTAR successor blacksmith which was used in a phishing campaign targeting a prominent Jewish figure in late July 2024.

The infection process is often multi-step, which involves gaining initial access via phishing, then establishing communication with command and control (C2) servers, and ultimately stealing data or delivering an additional payload.

Recorded Future’s findings show that the threat has registered a large number of DDNS domains since May 2024, with the company also identifying links between Iranian IP addresses (38.180.146(.)194 and 38.180.146(.)174) and GreenCharlie infrastructure during from July to August 2024.

In addition, a direct connection between GreenCharlie clusters and the C2 servers used by GORBLE was discovered. The operations are believed to be facilitated using Proton VPN or Proton Mail to hide their activities.

“GreenCharlie’s phishing operations are highly targeted, often using social engineering techniques that exploit current events and political tensions,” Recorded Future said.

Cyber ​​security

“The group has registered numerous domains since May 2024, many of which are likely to be used for phishing activities. These domains are linked to DDNS providers that allow IP addresses to change quickly, making it difficult to track the group’s activities.”

Disclosure occurs against the background of a escalating Iranian malicious cyber activity against the US and other foreign targets. Earlier this week, Microsoft revealed that several sectors in the US and UAE were targeted by an Iranian threat actor codenamed Peach Sandstorm (aka Refined Kitten).

Additionally, US government agencies said another Iranian hacker group, the state-backed Pioneer Kitten, was working as an Initial Access Broker (IAB) to facilitate ransomware attacks against the education, financial, health, defense and government sectors in USA in collaboration with Team NoEscape, RansomHouse and BlackCat.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.