google-site-verification: google30a059f9a075f398.html

Iran’s Cyberwar on Dissidents Could Infiltrate Your Mailbox

CyberWisdom Commentary:

Nextgov reported that Iran’s crackdown on protesters may affect almost all those who come into contact with them, thanks to a complex internal police operation that is not only academics and dissidents but also those who deal with them or even only have a tangential relationship with those People. Well-known researchers at cybersecurity companies and Iran’s digital espionage agency said that especially one government-backed organization, especially Infy, may continue to increase attacks even after the current riots have ended.

The Iranian security forces have taken many of the same tactics that national and criminal groups have targeted business and political victims, especially spear phishing – basically, emails from counterfeit sources urge recipients to click on links to download information – Disclosure of malware But unlike common crooks, Tehran and its agencies are constantly improving and improving their phishing mail.

Patrick Tucker, Defense One Iran’s crackdown on protesters could affect almost anyone in contact with them, thanks to a sophisticated internal police operation that routinely targets not only academics and dissidents but also those who have interacted with them — and even people only tangentially linked. Cybersecurity firms and prominent researchers of Iranian digital espionage efforts say, one government-backed group, in particular, Infy, will likely continue to increase its attacks even after the current unrest ends. The Iranian security forces use many of the same tactics that nation-state actors and criminal groups deploy against corporate and political victims, particularly spear phishing — basically, emails from a phony source that urge the recipient to click a link that downloads information-exfiltrating malware. But unlike common crooks, Tehran and its agents are constantly refining and improving their phishing emails. The Infy group is highly adaptable and regularly attacks targets inside Iran and beyond its borders. The group, or at least some of its code, go back to 2007, according to research by Palo Alto Networks. Engaging post, Read More…

thumbnail courtesy of nextgov.com

If you like to receive more of these curated news alerts then subscribe to my mailing list. and come back soon at https://www.safeharboroncyber.com/Blog/ to read further CyberWisdom Commentaries.

Add a Comment

Your email address will not be published. Required fields are marked *