Iranian Charming Kitten hackers targeted Israeli organizations in October
2023-11-10 02:16:24 Author: therecord.media(查看原文) 阅读量:11 收藏

An Iranian hacking group targeted organizations in Israel’s transportation, logistics and technology sectors last month amid an uptick in Iranian cyber activity since the start of Israel’s war with Hamas.

Researchers at the cybersecurity company CrowdStrike’s Counter Adversary Operations attributed the activity to Charming Kitten, an Iranian advanced persistent threat (APT) group, in a report published Thursday. The group, often linked to the regime’s Islamic Revolutionary Guard Corps, is also known as APT35 and Imperial Kitten.

The CrowdStrike report came as Microsoft researchers cautioned that Iran’s information operations might be inflating the efficacy of a few publicly reported cybersecurity incidents in Israel since the war began October 7. Hamas and Iran are longtime allies.

The activity that CrowdStrike observed in October is connected with behavior the company tracked since 2022, the report says. The researchers honed in on strategic web compromise (SWC) tactics — a social engineering technique in which hackers lure a target to a compromised website. The goal is generally to exfiltrate data, CrowdStrike said.

The researchers found that initially the malicious websites used the open-source analytics software Matomo to profile the details of users who visited them, but more recently the group has used a custom script to collect browser information and IP addresses.

Charming Kitten has been observed deploying a variety of malware strains, most commonly from the IMAPLoader family, which uses email command-and-control servers. In at least one attack in October, Charming Kitten used malicious Microsoft Excel documents to deploy malware as part of a phishing operation.

Although the researchers do not go into detail about the specific attacks on organizations carried out since the start of the war, they explain why they believe Charming Kitten is behind them, including its use of strategic web compromise infrastructure, the industries targeted — namely Israeli organizations in transportation, maritime and technology — and the use of job-themed decoys.

Other cybersecurity companies have recently detected attempted cyberattacks by Iran-linked groups on Israeli targets, including education and tech organizations and other unspecified entities.

More bark than bite?

While the activity of Iranian hacker groups targeting Israel has been in headlines over the last month, their cyber operations in response to the war may not be as coordinated or impactful as they claim, researchers at Microsoft said Thursday.

“Observations from Microsoft telemetry suggest that, at least in the cyber domain, Iranian operators have largely been reactive since the war began, exploiting opportunities to try and take advantage of events on the ground as they unfold​,” they said.

Only 11 days after Hamas launched its attack on October 7 did Iran enter the cyber fray, with the first of two attacks on Israeli infrastructure.

“While online personas controlled by Iran exaggerated the claims of impact from these attacks, the data suggests that both attacks were likely opportunistic in nature,” they wrote. “Specifically, operators leveraged existing access or acquired access to the first available target. Further, the data shows that, in the case of a ransomware attack, Iranian actors’ claims of impact and precision targeting were almost certainly fabricated.”

Through what researchers called “well-integrated deployment of information operations,” Iran has inflated the efficacy of its cyber operations over the last month, for example after compromising connected webcams in Israel. Its information arm claimed the cameras were from a specific Israeli military site, when in fact “the compromised cameras were located at scattered sites outside any one defined region.

“This suggests that despite Iran actors’ strategic claims, this camera example was ultimately a case of adversaries continuing to opportunistically discover and compromise vulnerable connected devices and try to reframe this routine work as more impactful in the context of the current conflict,” they said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

James Reddick has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.


文章来源: https://therecord.media/charming-kitten-targeted-israel-cyberattacks
如有侵权请联系:admin#unsafe.sh