IRANIAN HACKERS SELLING DATA UNDERGROUND | SELLING TO COMPROMISED COMPANY'S | 2021

IRANIAN HACKERS 



IRANIAN HACKERS SELLING DATA UNDERGROUND | SELLING TO COMPROMISED COMPANY'S | 2021


Underground forums:- wherever participants exchange data on abusive techniques and interact within the sale of misery products and services, square measure a kind of on-line social network (OSN).


Iranian hackers square measure commerce access to compromised firms on an associate underground forum
The Iranian hacker cluster who's been assaultive company VPNs for months is currently attempting to legitimize a number of the hacked systems by commerce access to some networks to alternative hackers.

One of Iran's state-sponsored hacking teams has been noticed commerce access to compromised company networks on associate underground hacking forum, cyber-security firm Crowdstrike aforesaid during a report nowadays.

The company known the cluster exploitation the codename Pioneer Kitten, that is another designation for the clusterconjointly referred to as Fox Kitten or Parisite.

The group, that Crowdstrike believes maybe a contractor for the Iranian regime, has spent 2019 and 2020 hacking into company networks via vulnerabilities in VPNs and networking instrumentality, such as:

Pulse Secure "Connect" enterprise VPNs (CVE-2019-11510)
Fortinet VPN servers running FortiOS (CVE-2018-13379)
Palo Alto Networks "Global Protect" VPN servers (CVE-2019-1579)
Citrix "ADC" servers and Citrix network gateways (CVE-2019-19781)
F5 Networks BIG-IP load balancers (CVE-2020-5902)

The cluster has been breaching network devices exploitation the on top of vulnerabilities, planting backdoors, then providing access to alternative Iranian hacking teamslike APT33 (Shamoon), drill rig (APT34), or Chafer, in step with a report from cyber-security firm Dragos.

These alternative teams would then are available in, expand the "initial access" Pioneer Kitten managed to get by moving laterally across a network exploitation a lot of advanced malware and exploits, then looking and stealing sensitive data doubtless of interest to the Iranian government.

However, during a report nowadays, Crowdstrike says that Pioneer Kitten has conjointly been noticed commerce access to a number of these compromised networks on hacking forums, since a minimum of July 2020.


Crowdstrike believes the cluster is just attempting to diversify its revenue stream and legitimize networks that haven't any intelligence worth for Iranian intelligence services.

Classic targets of Iranian state-sponsored hacking teams sometimes embrace firms and governments within the North American nation, Israel, and alternative Arabic countries within the geographical area. Targeted sectors have sometimes enclosed defense, healthcare, technology, and government. anything is presumably out of scope for Iranian government hackers, and really doubtless to be created obtainable on hacking forums to alternative gangs.

Today, the most important customers of "initial access brokers" (like Pioneer Kitten) square measure sometimes ransomware gangs.

Post a Comment

0 Comments