Menu
Iranian cyberespionage group attacked over 1,600 high-profile targets in one year

Iranian cyberespionage group attacked over 1,600 high-profile targets in one year

Security researchers believe they've identified the group's main programmer

In a single year, a cyberespionage group with possible ties to the Iranian government has targeted over 1,600 defense officials, diplomats, researchers, human rights activists, journalists and other high-profile individuals around the world.

The group, known as Rocket Kitten, has been active since early 2014 and its attacks have been analyzed by various security vendors. However, a major breakthrough in the investigation came recently when researchers from Check Point Software Technologies obtained access to the command-and-control servers used by the attackers.

Compared to other cyberespionage groups, Rocket Kitten is not very sophisticated, but it is persistent. It makes extensive use of social engineering through spear-phishing attacks that infect victims with custom-written malware, the Check Point researchers said in a report published Monday.

The attackers were not very concerned with operational security and left major weaknesses in their infrastructure, which researchers were able to exploit. This allowed them to extract messages between the different members of the group from the custom-built Web application that it used to coordinate phishing attacks, as well as a list of over 1,600 intended victims that were targeted between August 2014 and 2015.

The list included human rights activists, business executives, ministry officials, nuclear scientists, military personnel, national security and foreign policy researchers, scholars, persons of influence, representatives of NATO and other countries, and employees of educational institutions and media outlets. The largest number of victims were from Saudi Arabia, the U.S., Iran, the Netherlands and Israel.

Iranian professors, scientists, journalists and investors living abroad were also targeted.

It seems that the attackers did not take into consideration the possible compromise of their own command-and-control server and have infected their own computers with their custom keylogger-type malware, most likely for testing purposes.

This allowed the researchers to identify an Iranian software engineer who they believe is the main developer of the group's tools. This was done by correlating data copied by the malware from the developer's workstation with online research.

"In this case, as in other previously reported cases, it can be assumed that an official body recruited local hackers and diverted them from defacing web sites to targeted espionage at the service of their country," the Check Point researchers said. Such inexperienced personnel with limited training often lack operational security awareness, the researchers said, with the result that they leave "a myriad of traces to the origin of the attack and their true identities."


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments