Vad som tros vara statsunderstödda iranska hackare har lyckats att ta sig förbi skyddet av krypterade appar och tjänster och därmed lyckats att samla in information från dissidenter och politiska motståndare till den nuvarande regimen i landet, skriver New York Times.
Säkerhetsforskare har avslöjat en mer än sex år lång kampanj riktad mot regimkritiker, aktivister och motståndare till den nuvarande regimen i Iran. Hackare har lyckats att ta sig runt det skydd som vanligen telegram och andra appar ger och på det sättet kommit över information.
The reports, which were reviewed by The New York Times in advance of their release, say that the hackers have successfully infiltrated what were thought to be secure mobile phones and computers belonging to the targets, overcoming obstacles created by encrypted applications such as Telegram and, according to Miaan, even gaining access to information on WhatsApp. Both are popular messaging tools in Iran. The hackers also have created malware disguised as Android applications, the reports said.
Enligt forskarna så har kampanjen innehållit flera olika attacker:
Among the different attacks we found were:
- Four variants of Windows infostealers intended to steal victims’ personal documents as well as access their Telegram Desktop and KeePass account information
- An Android backdoor that extracts two-factor authentication codes from SMS messages, records the phone’s voice surroundings, and more
- Malicious Telegram phishing pages, distributed using fake Telegram service accounts
The above tools and methods appear to be mainly used against Iranian minorities, anti-regime organizations and resistance movements such as:
-
Association of Families of Camp Ashraf and Liberty Residents (AFALR)
-
Azerbaijan National Resistance Organization
-
Balochistan citizens


0 kommentarer