Iranian spies accidentally leaked videos of themselves hacking emails > 자유게시판

본문 바로가기

Iranian spies accidentally leaked videos of themselves hacking emails

페이지 정보

작성자 Taren Holtze 댓글 0건 조회 5회 작성일 25-06-22 21:49

본문

A group of Iranian hackers has been caught red-handed demonstrating how to break into email accounts and steal data. 

Researchers at IBM's X-Force security team have obtained roughly five hours of video footage that appears to have been recorded directly from the screens of hackers.

The hackers are working for a group IBM calls ITG18, and which other security firms refer to as APT35 or Charming Kitten.

The group is one of the most active state-sponsored espionage teams linked to the government of Iran. 

'This kind of thing is a rare win for the defenders,' said Emily Crose, a former NSA employee now working as a security researcher for industrial control system security firm Dragos. 

'It's like playing poker, and having your opponents lay their entire hand out flat on the table in the middle of the last flop.' 




Researchers at IBM's X-Force security team uncovered the Iran-backed hack from May

The leaked videos, seen by Wired, were found among 40 gigabytes of data that the hackers had apparently stolen from victim accounts, including US and Greek military personnel. 

The data also suggested that the hackers targeted US State Department staff and an unnamed Iranian-American philanthropist.

The files were all uploaded by accident in May to an exposed server, just as IBM was monitoring the machine. 




RELATED ARTICLES

Previous

1

Next



Twitter hackers who used high-profile accounts to scam... FBI leads probe into catastrophic Twitter breach that saw...



Share this article

Share


The videos appear to be training demonstrations the Iran-backed hackers made to show junior team members how to handle hacked accounts. 

They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, and siphoning off other Google-hosted data from victims. 

Cybersecurity experts said the unmasking of the Iranians at work was unprecedented.

'We don't get this kind of insight into how threat actors operate really ever,' says Allison Wikoff, a senior analyst at IBM X-Force whose team discovered the videos. 

She told Wired: 'When we talk about observing hands-on activity, it's usually from incident response engagements or endpoint monitoring tools. 

'Very rarely do we actually see the adversary on their own desktop. It's a whole other level of "hands-on-keyboard" observation.'  




Emails were hacked into in Yahoo and Google accounts and the data siphoned off in minutes





ITG18, also known as APT35 or Charming Kitten, is one of the most active state-sponsored espionage teams linked to the government of Iran

The researchers say the APT35 hackers appear to have stolen photos, emails, tax records, and other personal information from both targeted individuals. 

In some clips, the researchers say they observed the hackers working through a text document full of usernames and passwords for a long list of non-email accounts, from phone carrier to bank accounts. 

Wikoff said they were astonished at how quickly the hackers worked. 

The Google account's data was stolen in around four minutes, and a Yahoo account took less than three minutes. 

'To see how adept they are at going in and out of all these different webmail accounts and setting them up to exfiltrate, it is just amazing,' she said. 

'It's a well-oiled machine.'

They did not, however, expect their findings to stop the group from hacking. 


Iran

댓글목록

등록된 댓글이 없습니다.

충청북도 청주시 청원구 주중동 910 (주)애드파인더 하모니팩토리팀 301, 총괄감리팀 302, 전략기획팀 303
사업자등록번호 669-88-00845    이메일 adfinderbiz@gmail.com   통신판매업신고 제 2017-충북청주-1344호
대표 이상민    개인정보관리책임자 이경율
COPYRIGHTⒸ 2018 ADFINDER with HARMONYGROUP ALL RIGHTS RESERVED.

상단으로