Iran-nexus threat groups refine attacks against critical infrastructure | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Iran, long considered a steady and persistent cyber threat to the U.S., has raised its game in the months since the two nations went to war in February. 

Iranian-backed cyber threat groups, which range from state-sponsored actors to pro-Iranian hacktivists and financially motivated hackers, appear to have evolved some of their motivations and capabilities in cyber, according to analysts and security researchers. 

“What we are seeing are attacks that are aiming to have a more destructive effect,” Annie Fixler, director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies told Cybersecurity Dive. 


What we are seeing are attacks that are aiming to have a more destructive effect.

Annie Fixler

Director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies


Specifically, Iran-linked actors have increased the use of data wiping malware in recent attacks against Israel and demonstrated greater capability to evade detection, according to researchers at Palo Alto Networks. 

In another alarming development, Darktrace last week published an analysis of a malware strain called ZionSiphon, to potentially tamper with chlorine levels and pressure controls in Israeli water facilities. The malware was embedded with pro-Iran and Palestinian messaging for additional psychological impact. 

Recent military strikes by Iran may have combined exploitation of flaws in video cameras and kinetic military strikes, according to Check Point Research. The activity may indicate a higher level of coordination and could be used potentially against critical infrastructure, surveillance and other targeted threat activity, CCTI’s Fixler noted.

Meanwhile, the bombing campaign by the U.S. and Israel exposed weaknesses in Iran’s traditional military capabilities, such as its limited ability to control and defend its own airspace and directly challenge allied bombing campaigns. But the Iranians have used cyberattacks as a way to send messages to neighboring Gulf states, Israel, the U.S., and to its own political dissidents, for intimidation, espionage and destructive acts.

Iran-nexus hackers target critical infrastructure

  • February 28

    U.S. and Israel launch coordinated bombing campaign against Iran.

  • March 11

    Medtech company Stryker hit by wiper attack.

  • March 19

    DOJ announces seizure of domains linked to Handala.

  • April 7

    FBI, CISA warn of Iran-nexus hackers targeting flaws at water, energy providers.

Cyber threat warnings

In March, cyber-threat-sharing groups across various critical infrastructure sectors issued a joint advisory warning about the heightened threat of cyberattacks from Iran-aligned actors. 

“Since we released the report, we have indeed seen reports from the critical infrastructure community about Iranian-aligned activity,” Scott Algeier, executive director of the Information Technology-ISAC, told Cybersecurity Dive. 

The data-wiping cyberattack on medical device maker Stryker in March represented the most high-profile example of an Iran-linked attack, Algeier noted, but there have been reports of cyberattacks targeting critical sites as well. Iran-nexus actors are continuing to focus on programmable logic controllers used in OT environments, for instance, he said. 

Nick Andersen, acting director at CISA, said at a Thursday hearing before the House Appropriations Subcommittee on Homeland Security that Iran-linked actors have stepped up activity against poorly configured critical infrastructure sites in the U.S., but have thus far been unable to make significant inroads. 

CISA and other agencies have warned for several years about hacktivist groups exploiting weak security controls at critical infrastructure sites. 

Anderson noted the U.S. has a “tremendous amount” of IT and OT being used to support critical infrastructure that is exposed to the public internet, unsecured and “not necessarily taking advantage of modern security practices” like changing default passwords.

“When we look at them [Iran] as a specific nation-state threat actor, they’ve been very opportunistically focused where we see unsecured devices that are internet accessible,” Andersen testified during the hearing. “It provides them with an opportunity to attempt to make connections to those devices.”


When we look at them [Iran] as a specific nation-state threat actor, they’ve been very opportunistically focused where we see unsecured devices that are internet accessible.

Nick Andersen

Acting Director at CISA


CISA and the FBI, meanwhile, led a joint advisory about the Iran-nexus threat activity on April 7, warning that malicious hackers were targeting Rockwell Automation/Allen-Bradley devices at water utilities, energy facilities and other industrial sites. 

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW