Gbetu TV (News They Are Not Talking About)
News

3 Iranian Hackers, others charged over Ransomware Attacks

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Wednesday announced sweeping sanctions against ten individuals and two entities backed by Iran’s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks at least since October 2020.

 

The agency said the cyber activity mounted by the individuals is partially attributable to intrusion sets tracked under the names APT35, Charming Kitten, Nemesis Kitten, Phosphorus, and TunnelVision.

 

“This group has launched extensive campaigns against organizations and officials across the globe, particularly targeting U.S. and Middle Eastern defense, diplomatic, and government personnel, as well as private industries including media, energy, business services, and telecommunications,” the Treasury said.

 

The Nemesis Kitten actor, which is also known as Cobalt Mirage, DEV-0270, and UNC2448, has come under the scanner in recent months for its pattern of ransomware attacks for opportunistic revenue generation using shoppingmode Microsoft’s built-in BitLocker tool to encrypt files on compromised devices.

 

Microsoft and Secureworks have characterized DEV-0270 as a subgroup of Phosphorus (aka Cobalt Illusion), with ties to another actor referred to as TunnelVision. The Windows maker also assessed with low confidence that “some of DEV-0270’s ransomware attacks are a form of moonlighting for personal or company-specific revenue generation.”

 

What’s more, independent analyses from the two cybersecurity firms as well as Google-owned Mandiant has revealed the group’s connections to two companies Najee Technology (which functions under the aliases Secnerd and Lifeweb) and Afkar System, both of which have been subjected to U.S. sanctions.

 

It’s worth noting that Najee Technology and Afkar System’s connections to the Iranian intelligence agency were first flagged by an anonymous anti-Iranian regime entity called Lab Dookhtegan earlier this year.

 

“The model of Iranian government intelligence functions using contractors blurs the lines between the actions tasked by the government and the actions that the private company takes on its own initiative,” Secureworks said in a new report detailing the activities of Cobalt Mirage.

 

While exact links between the two companies and IRGC remain unclear, the method of private Iranian firms acting as fronts or providing support for intelligence operations is well established over the years, including that of ITSecTeam (ITSEC), Mersad, Emennet Pasargad, and Rana Intelligence Computing Company.

 

On top of that, the Secureworks probe into a June 2022 Cobalt Mirage incident showed the metadata associated with a PDF file containing the ransom text had tagged Ahmad Khatibi as its creator, who happens to be the CEO and owner of the Iranian company Afkar System.

 

Ahmad Khatibi Aghda is also part of the 10 individuals sanctioned by the U.S., alongside Mansour Ahmadi, the CEO of Najee Technology, and other employees of the two enterprises who are said to be complicit in targeting various networks globally by leveraging well-known security flaws to gain initial access to further follow-on attacks.

 

Some of the exploited flaws, according to a joint cybersecurity advisory released by Australia, Canada, the U.K., and the U.S., as part of the IRGC-affiliated actor activity are as follows –

  • Fortinet FortiOS path traversal vulnerability (CVE-2018-13379)
  • Fortinet FortiOS default configuration vulnerability (CVE-2019-5591)
  • Fortinet FortiOS SSL VPN 2FA bypass (CVE-2020-12812)
  • ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207), and
  • Log4Shell (CVE-2021-44228, CVE-2021-45046, and/or CVE-2021-45105)

 

“Khatibi is among the cyber actors who gained unauthorized access to victim networks to encrypt the network with BitLocker and demand a ransom for the decryption keys,” the U.S. government said, in addition to adding him to the FBI’s Most Wanted list.

 

“He leased network infrastructure used in furtherance of this malicious cyber group’s activities, he participated in compromising victims’ networks, and he engaged in ransom negotiations with victims.”

 

Coinciding with the sanctions, the Justice Department separately charged Ahmadi, Khatibi, and a third Iranian national named Amir Hossein Nickaein Ravari for engaging in a criminal extortion scheme to inflict damage and losses to victims located in the U.S., Israel, and Iran.

 

All three individuals have been charged with one count of conspiring to commit computer fraud and related activity in connection with computers; one count of intentionally damaging a protected computer; and one count of transmitting a demand in relation to damaging a protected computer. Ahmadi has also been charged with one count of intentionally damaging a protected computer.

 

That’s not all. The U.S. State Department has also announced monetary rewards of up to $10 million for any information about Mansour, Khatibi, and Nikaeen and their whereabouts.

 

“These defendants may have been hacking and extorting victims – including critical infrastructure providers – for their personal gain, but the charges reflect how criminals can flourish in the safe haven that the Government of Iran has created and is responsible for,” Assistant Attorney General Matthew Olsen said.

 

The development comes close on the heels of sanctions imposed by the U.S. against Iran’s Ministry of Intelligence and Security (MOIS) and its Minister of Intelligence, Esmaeil Khatib, for engaging in cyber-enabled activities against the nation and its allies.

__________________________ Join us on WhatsApp ______________________________
Tags: Ahmad Khatibi Aghda APT35 Charming Kitten Cobalt Mirage DEV-0270 Esmaeil Khatib Islamic Revolutionary Guard Corps’ (IRGC) Matthew Olsen Microsoft Nemesis Kitten Office of Foreign Assets Control (OFAC) Phosphorus Secureworks TunnelVision UNC2448
FADAKA LOUIS

Recent Posts

  • Education

JAMB set to release 2024 UTME results

The Joint Admissions and Matriculation Board (JAMB) has concluded plans to release the results of the 2024 Unified Tertiary Matriculation…

29 April 2024
  • Health

Why drinking cold water is dangerous, even in hot weather

Cardiologists and public health physicians have warned Nigerians against excessive consumption of cold water, stressing that it can lead to…

29 April 2024
  • Technology

China’s robotic spacecraft to be sent to the moon

The Chang’e 6, China’s next robotic spacecraft to the moon, has been scheduled to set out on its journey in…

29 April 2024
  • Education

Lagos Indian school where Nigerians are denied admission

Gbenga Oloniniran writes about the discrimination experienced by some Nigerians on the premises of foreign businesses where they are met…

29 April 2024
  • Technology

NASA is officially headed to Saturn moon

It's scientifically ambitious. It's aeronautically daring. And it's unflinchingly expensive. It's NASA's newly approved mission to Saturn's moon, Titan, where…

29 April 2024
  • Politics

Mali: Political parties call for presidential elections to end military transition

Since the coup d’état on May 24, 2021, a transition government has been in charge of Mali and shows no…

29 April 2024