What's new

Iranian state hackers caught with their pants down

BATMAN

ELITE MEMBER
Joined
Mar 31, 2007
Messages
29,895
Reaction score
-28
Country
Pakistan
Location
Switzerland
Iranian state hackers caught with their pants down in intercepted videos
Iranian state hackers got caught with their pants down recently when researchers uncovered more than 40GB of data, including training videos showing how operatives hack adversaries’ online accounts and then cover their tracks.

The operatives belonged to ITG18, a hacking group that overlaps with another outfit alternatively known as Charming Kitten and Phosphorous, which researchers believe also works on behalf of the Iranian government. The affiliation has long targeted US presidential campaigns and US government officials. In recent weeks, ITG18 has also targeted pharmaceutical companies. Researchers generally consider it a determined and persistent group that invests heavily in new tools and infrastructure.

In May, IBM’s X-Force IRIS security team obtained the 40GB cache of data as it was being uploaded to a server that hosted multiple domains known to be used earlier this year by ITG18. The most telling contents were training videos that captured the group’s tactics, techniques, and procedures as group members performed real hacks on email and social media accounts belonging to adversaries.

Included in the footage was:

  • Almost five hours of video showing operators searching through and exfiltrating data from multiple compromised accounts belonging to two people, one a member of the US Navy and the other a seasoned personnel officer in the Hellenic Navy.
  • Failed phishing attempts that targeted US State Department officials and an Iranian American philanthropist. The failures were the result of emails bouncing because they appeared suspicious.
  • Online personas and Iranian phone numbers used by group members.
The haul of data is a potential intelligence coup because it allows researchers (and presumably US officials) to identify the strengths and weaknesses of an adversary that is steadily improving its hacking talent. Defenders can then improve protections designed to keep the attackers out. The bird’s-eye view may also have signaled plans for future ITG18 operations.

A rare opportunity
“Rarely are there opportunities to understand how the operator behaves behind the keyboard, and even rarer still are there recordings the operator self-produced showing their operations,” IBM researchers Allison Wikoff and Richard Emerson wrote in a post published Thursday. “But that is exactly what X-Force IRIS uncovered on an ITG18 operator whose OPSEC failures provide a unique behind-the-scenes look into their methods, and potentially, their legwork for a broader operation that is likely underway.”

The videos were shot using a desktop recording tool called Bandicam and ranged from two minutes to two hours. Timestamps indicated the videos were recorded a day or so before they were uploaded. Five of the videos showed operators pasting passwords into compromised accounts and then demonstrating how to efficiently exfiltrate contacts, photos, and other data stored there and in associated cloud storage.

itg18-bandicam-640x425.png


The footage also showed the settings that group members changed in the security configurations of each compromised account. The changes allowed the hackers to connect some of the accounts to Zimbra, an email collaboration program that can aggregate multiple accounts into a single interface. Using Zimbra made it possible to manage hacked email accounts simultaneously.


Enlarge
/ An image capture of an ITG18 operator syncing a persona account to Zimbra.
BM X-Force IRIS
Three other videos revealed that the operators had compromised several accounts associated with an enlisted member of the US Navy and an officer in the Hellenic Navy. ITG18 members had credentials for what appear to be their personal email and social media accounts. In many cases, the hackers deleted emails notifying the targets that there had been suspicious logins to their accounts.

Painstaking detail
The attackers also accessed files showing the military units the Navy personnel were in, their naval base, residence, personal photos and videos, and tax records. The operators methodically combed through targets’ other accounts, including those on video-streaming sites, pizza-delivery services, credit-reporting agencies, mobile carriers, and more.

“The operators appear to have been meticulously gathering trivial social information about the individuals,” the IBM researchers wrote. “In total, the operator attempted to validate credentials for at least 75 different websites across the two individuals.

Other videos displayed the Iran-based phone number and other profile details for a fake persona ITG18 members used in their operations. The video also revealed attempts to send phishing emails to the Iranian American philanthropist and two possible State Department officials.

Another potentially useful discovery: when operators used a password to successfully gain initial access to an account that was protected by multifactor authentication, they would proceed no further. That suggests that Charming Kitten’s previously revealed ability to bypass multifactor authentication is limited.

The behind-the-scenes account IBM obtained demonstrates the double-edged sword that’s wielded by espionage hackers. While their operations often yield useful information on their targets, the targets can also turn that around in Spy vs. Spy fashion.
 
.
Fake news, A bunch of script kiddies. And they were not wearing any pants? I believe it is not moral to catch people on video when they are not wearing pants.
 
.
Fake news, A bunch of script kiddies. And they were not wearing any pants? I believe it is not moral to catch people on video when they are not wearing pants.

Only moral thing is to hit oil tankers and pollute the environment.
 
.
time is right for Pakistani youth to learn cyber security.hackers everywhere.
 
.
Fake news, A bunch of script kiddies. And they were not wearing any pants? I believe it is not moral to catch people on video when they are not wearing pants.
This guy doesn't even know what hacking means. This little kids' job done for fun is not what id call hacking.

Iranian attack on different sites of USA and their naval assets is what I call state sponsored hacking/CyberAttack.

These Madrassa kids are desperate. Leave them alone in their Fantasy World. Phone numbers and phishing attempts. :sarcastic::sarcastic::sarcastic:

time is right for Pakistani youth to learn cyber security.hackers everywhere.
Man bunch of kids are making fun, Stop interrupting them
 
.
Iranian state hackers caught with their pants down in intercepted videos
Iranian state hackers got caught with their pants down recently when researchers uncovered more than 40GB of data, including training videos showing how operatives hack adversaries’ online accounts and then cover their tracks.

The operatives belonged to ITG18, a hacking group that overlaps with another outfit alternatively known as Charming Kitten and Phosphorous, which researchers believe also works on behalf of the Iranian government. The affiliation has long targeted US presidential campaigns and US government officials. In recent weeks, ITG18 has also targeted pharmaceutical companies. Researchers generally consider it a determined and persistent group that invests heavily in new tools and infrastructure.

In May, IBM’s X-Force IRIS security team obtained the 40GB cache of data as it was being uploaded to a server that hosted multiple domains known to be used earlier this year by ITG18. The most telling contents were training videos that captured the group’s tactics, techniques, and procedures as group members performed real hacks on email and social media accounts belonging to adversaries.

Included in the footage was:

  • Almost five hours of video showing operators searching through and exfiltrating data from multiple compromised accounts belonging to two people, one a member of the US Navy and the other a seasoned personnel officer in the Hellenic Navy.
  • Failed phishing attempts that targeted US State Department officials and an Iranian American philanthropist. The failures were the result of emails bouncing because they appeared suspicious.
  • Online personas and Iranian phone numbers used by group members.
The haul of data is a potential intelligence coup because it allows researchers (and presumably US officials) to identify the strengths and weaknesses of an adversary that is steadily improving its hacking talent. Defenders can then improve protections designed to keep the attackers out. The bird’s-eye view may also have signaled plans for future ITG18 operations.

A rare opportunity
“Rarely are there opportunities to understand how the operator behaves behind the keyboard, and even rarer still are there recordings the operator self-produced showing their operations,” IBM researchers Allison Wikoff and Richard Emerson wrote in a post published Thursday. “But that is exactly what X-Force IRIS uncovered on an ITG18 operator whose OPSEC failures provide a unique behind-the-scenes look into their methods, and potentially, their legwork for a broader operation that is likely underway.”

The videos were shot using a desktop recording tool called Bandicam and ranged from two minutes to two hours. Timestamps indicated the videos were recorded a day or so before they were uploaded. Five of the videos showed operators pasting passwords into compromised accounts and then demonstrating how to efficiently exfiltrate contacts, photos, and other data stored there and in associated cloud storage.

itg18-bandicam-640x425.png


The footage also showed the settings that group members changed in the security configurations of each compromised account. The changes allowed the hackers to connect some of the accounts to Zimbra, an email collaboration program that can aggregate multiple accounts into a single interface. Using Zimbra made it possible to manage hacked email accounts simultaneously.


Enlarge
/ An image capture of an ITG18 operator syncing a persona account to Zimbra.
BM X-Force IRIS
Three other videos revealed that the operators had compromised several accounts associated with an enlisted member of the US Navy and an officer in the Hellenic Navy. ITG18 members had credentials for what appear to be their personal email and social media accounts. In many cases, the hackers deleted emails notifying the targets that there had been suspicious logins to their accounts.

Painstaking detail
The attackers also accessed files showing the military units the Navy personnel were in, their naval base, residence, personal photos and videos, and tax records. The operators methodically combed through targets’ other accounts, including those on video-streaming sites, pizza-delivery services, credit-reporting agencies, mobile carriers, and more.

“The operators appear to have been meticulously gathering trivial social information about the individuals,” the IBM researchers wrote. “In total, the operator attempted to validate credentials for at least 75 different websites across the two individuals.

Other videos displayed the Iran-based phone number and other profile details for a fake persona ITG18 members used in their operations. The video also revealed attempts to send phishing emails to the Iranian American philanthropist and two possible State Department officials.

Another potentially useful discovery: when operators used a password to successfully gain initial access to an account that was protected by multifactor authentication, they would proceed no further. That suggests that Charming Kitten’s previously revealed ability to bypass multifactor authentication is limited.

The behind-the-scenes account IBM obtained demonstrates the double-edged sword that’s wielded by espionage hackers. While their operations often yield useful information on their targets, the targets can also turn that around in Spy vs. Spy fashion.
Sir IMO, every country use such tactics, same as every court has Intelligence Apparatus to deal with hostile forces and secure own interests.
We should not single out any country on these basis, if it is must to point the fingers then we we should start from USA and Europe for innovations in this field.
 
. .
Sir IMO, every country use such tactics, same as every court has Intelligence Apparatus to deal with hostile forces and secure own interests.
We should not single out any country on these basis, if it is must to point the fingers then we we should start from USA and Europe for innovations in this field.

You may find thieves in Europe but this does not justify a thieves else where. Neither you can justify a theft by saying it's happening all over the world. However, you are welcome to expose US and Europe, leave slandering to those who have no substance and logic.

Why pollute the water? How is that moral ? Besides...hacker vs hackers happens daily. So.e u win some u lose.

Every one on pdf is a fan of houthi junkies... .

Oil spill from Yemen tanker 'would be four times worse than Exxon Valdez' – UN
 
.
You may find thieves in Europe but this does not justify a thieves else where. Neither you can justify a theft by saying it's happening all over the world. However, you are welcome to expose US and Europe, leave slandering to those who have no substance and logic.

There is a vast difference between thieves/corrupts and such organisations, which are created to counter the modern spying techniques to blunt the enemies attack with their (governments) vested interests.
By your logic, ISI is also needs to be dismantled; just think after dismantling ISI what will be the scenarios in Pakistan.
What is a responsibility of an armed forces of a country? They usually counter the enemy's aggression - results in killing on both sides - In Islam kill (Qattal), getting killed (Shahadat) is a noble designation and proven in Islamic History. On the other hand Islam tells us, unjustified act of murdering a human being is a greater sin and will never be forgiven.
So please, keep certain act of personal gains by illegal means like theft or corruption, out of this discussion.
 
.

Pakistan Defence Latest Posts

Pakistan Affairs Latest Posts

Back
Top Bottom