Future Tech

Iranian cyberspies target US defense orgs with a brand new backdoor

Tan KW
Publish date: Sat, 23 Dec 2023, 10:10 PM
Tan KW
0 460,865
Future Tech

Iranian cyberspies are targeting defense industrial base organizations with a new backdoor called FalseFont, according to Microsoft.

In a series of Xeets posted Thursday, Redmond's threat intel team said it spotted a nation-state backed gang it calls Peach Sandstrom attempting to deliver the (presumably Windows) malware to defense-sector employees.

"FalseFont is a custom backdoor with a wide range of functionalities that allow operators to remotely access an infected system, launch additional files, and send information to its C2 servers," Microsoft said. "It was first observed being used against targets in early November 2023."

Mandiant, which tracks the Iran-backed crew as APT33, says it targets organizations in the US, Saudi Arabia and South Korea for "strategic cyberespionage," with a particular interest in both commercial and military aviation companies as well as those in the energy sector with ties to petrochemical production.

"We identified APT33 malware tied to an Iranian persona who may have been employed by the Iranian government to conduct cyber threat activity against its adversaries," the threat hunters said in an alert updated in October.

In research published a month earlier, Microsoft said it had seen the crew engaged in password spraying attempts against "thousands of organizations."

When these brute-force attacks were successful, Peach Sandstorm then used a combination of publicly available and custom tools for to snoop around on the network, maintain persistence and move laterally through the victim's IT systems, we're told. 

"In a small number of intrusions," Redmond added, "Peach Sandstorm was observed exfiltrating data from the compromised environment."

Hundreds of e-commerce sites compromised by card stealers

Cyber crooks compromised 443 online shops, using JavaScript-sniffers to steal these e-merchants' customers' credit card or payment information, according to Europol.

The coordinated effort to combat digital skimming attacks included cops from 17 countries, the European Union Agency for Cybersecurity (ENISA), and private-sector security shops Group-IB and Sansec.

Over the course of two months, the law enforcement agencies notified the online retailers that their customers' payment details had been stolen as part of the crooks' online fraud scheme.

In these attacks, thieves use snippets of JavaScript code to intercept customers' card data during the online checkout process without the retailers or customers realizing they've been compromised. They often go undetected for a long time - and by the time they are spotted, the crooks have already been on shopping sprees of their own, or put the financial info up for sale on illicit marketplaces. 

Countries participating in the Greece-led effort include Albania, Belgium, Bosnia and Herzegovina, Colombia, Croatia, Finland, Germany, Georgia, Hungary, Moldova, Netherlands, Poland, Romania, Spain, the United Kingdom and the United States.

During the operation, Group-IB's threat intelligence team identified 23 families of JS-sniffers, including ATMZOW, health_check, FirstKiss, FakeGA, AngryBeaver, Inter and R3nin, we're told. The security firm says, as of the end of 2023, there's 132 known JS-sniffer families that have been used to compromise websites across the globe.

Russian infosec worker to be extradited to Moscow

Kazakhstan will reportedly extradite a network security specialist to Moscow, despite the US government's demand to send him to Washington.

The Eastern Bloc country detained Nikita Kislitsin, an employee of Russian infosec shop FACCT, on June 22 at the request of the US, which accused him of committing cyber crimes, according to a statement by his employer.

"According to the information we have, the claims against Kislitsin are not related to his work at FACCT, but are related to a case more than ten years ago when Nikita worked as a journalist and independent researcher," the statement said, presumably referring to his work as former editor of Hacker magazine.

The US extradition request seems to be related to earlier charges against Kislitsin, who is accused of breaking into the social networking service Formspring in 2012. 

A 2014 indictment [PDF] alleges that, after breaking and entering, Kislitsin stole usernames, email addresses, and passwords, and then tried to sell the stolen database for 5,000 euros a pop.

Shortly after the Feds demanded Kislitsin be extradited to America, Moscow came out with its own extradition request, which appears to have won the battle - at least according to the the General Prosecutor's Office of the Russian Federation.

On Thursday, the government agency said Kislitsin will be sent back to Russia where he will face criminal charges related to hacking. 

"According to the investigation, in October 2022, Kislitsin, together with his accomplices, unlawfully gained access to the server data of one of the commercial organizations," the general prosecutor's statement said. "After this, they were copied."

After allegedly stealing the org's data, Kislitsin then tried to extort the firm for $550,000 rubles in cryptocurrency. ®

 

https://www.theregister.com//2023/12/23/iranian_cyberspies_target_us_defense/

Discussions
Be the first to like this. Showing 0 of 0 comments

Post a Comment