Upsurge in Iranian hacking attempts against US gas and oil companies, experts warn

Upsurge in Iranian hacking attempts against US gas and oil companies, experts warn

  • In recent weeks, Iranian hackers have focused on US government agencies and on sectors of the economy, including oil and gas, cyber security companies have said
  • According to CrowdStrike and FireEye, the hackers have reportedly sent waves of spear phishing emails, cyber security companies that regularly monitor the activity
  • It is clear that Trojan e-mails resemble legitimate e-mails, but those containing malicious software were widely sent to various government agencies
  • An email seemed to have come from the president's headquarters and seemed to be trying to recruit people for a position as economic advisor
Advertisements

Cyber ​​security companies have noticed that a revival of attacks on the US government and critical infrastructure has been reported by hackers supported by Iran.

In recent weeks, hackers thought they were working for Tehran, targeting US government agencies and sectors of the economy, including oil and gas,

According to hacks CrowdStrike and FireEye, the hackers have sent waves of spear-phishing emails, two cyber security companies that regularly monitor the activity.

It remains unclear whether the hackers were able to extract information from the target sources, ABC reports, but it is clear that Trojan e-mails resemble legitimate e-mails but contain malicious software.

Advertisements

In recent weeks, hackers thought they were working on behalf of Tehran, focusing on US government agencies and on sectors of the economy, including oil and gas.

In recent weeks, hackers thought they were working on behalf of Tehran, focusing on US government agencies and on sectors of the economy, including oil and gas.

Crowdstrike

Crowdstrike

FireEye

FireEye

According to CrowdStrike and FireEye, the hackers reportedly sent waves of spear phishing emails, two cyber security companies that regularly monitor the activity

Hacking is in the midst of increased tensions between the two countries in recent weeks, with Iran supposedly taking down an American drone and Trump reconsidering retaliation strikes at three locations in the region at the last minute.

& # 39; Both parties are desperate to know what the other party is thinking & # 39 ;, says John Hultquist, director of intelligence analysis at FireEye. ABC.

Advertisements

& # 39; You can absolutely expect the regime to use all available tools to reduce uncertainty about what is going to happen, about what the next US step will be. & # 39;

CrowdStrike has shared images of the spear-phishing emails with the Associated Press.

It remains unclear whether the hackers were able to extract information from targeted sources, ABC reports, but it is clear that trojan emails resemble legitimate emails, but those containing malicious software were widely sent

It remains unclear whether the hackers were able to extract information from targeted sources, ABC reports, but it is clear that trojan emails resemble legitimate emails, but those containing malicious software were widely sent

It remains unclear whether the hackers were able to extract information from targeted sources, ABC reports, but it is clear that trojan emails resemble legitimate emails, but those containing malicious software were widely sent

An email seemed to have come from the president's headquarters and seemed to be trying to recruit people for a position as economic adviser.

Advertisements

Another was more generic and seemed to contain details about updating the global address book of Microsoft Outlook.

The NSA said in a statement: & # 39; There have been serious problems with malicious Iranian cyber actions in the past.

& # 39; In these times of heightened tensions, it is appropriate that everyone is alert to signs of Iranian aggression in cyberspace and that there are appropriate defense mechanisms. & # 39;

The oil and gas sector in the US has long been a target for Iranian hackers, but those efforts diminished considerably after the nuclear agreement was signed.

The US and Iran have a checkered history when it comes to cyber activity, with a series of tit-for-tat attacks on each other's systems in the last decade

The US and Iran have a checkered history when it comes to cyber activity, with a series of tit-for-tat attacks on each other's systems in the last decade

Advertisements

The US and Iran have a checkered history when it comes to cyber activity, with a series of tit-for-tat attacks on each other's systems in the last decade

However, there was a resurgence after Trump withdrew the US from the deal in May 2018, according to cyber experts.

The US and Iran have a checkered history when it comes to cyber activity, with a series of tit-for-tat attacks on each other's systems in the last decade.

In 2010, the Stuxnet virus disrupted the operation of thousands of centrifuges at a uranium enrichment plant in Iran.

Iran blamed the US and Israel and accused them of trying to undermine its nuclear program through secret operations.

Advertisements

Meanwhile, Iranian hackers are reported to have attacked Saudi Arabian company Saudi Aramco in 2012, with 30,000 computers losing their entire data stores and leaving with an image of a burning American flag on screens.

. [TagsToTranslate] Dailymail

- Advertisement -