Iranian cyberattack against U.S. uncovered

 

Researchers have tracked a hacking campaign from government-backed Iranian hackers on critical U.S. energy infrastructure.

 The campaign was active from late 2021 to 2022.

  • The threat actor that deployed this hacking campaign was Mint Sandstorm, previously known as Phosphorus.
  •  Mint Sandstorm is believed to be tied to the Islamic Revolutionary Guard Corps.
  • In this hacking campaign that lasted more than six months, Mint Sandstorm targeted:
    • U.S. seaports,
    • energy companies,
    • transit systems,
    • and utility and gas companies. 
  • The activity is suspected to be retaliatory and in response to attacks targeting its maritime, railway, and gas station payment systems that took place between May 2020 and late 2021.
  • Researchers stated that these attacks show Sandstorm's ability to constantly refine its tactics as part of highly-targeted phishing campaigns to obtain access to targeted environments.
  • Mint Sandstorm has previously attacked U.S. companies such as HBO, threatening to leak scripts from famous TV shows such as Game of Thrones. The hacker who deployed the attack was later indicted.
  • The group was also involved in a hacking campaign that targeted U.S. infrastructure after the 2015 Nuclear deal between Iran and the U.S. The Iranian government denied having any knowledge of the cyberattack.
  • In 2022, the U.S. Department of Treasury sanctioned several members of Mint Sandstorm for previous hacking campaigns.

Post a Comment

Previous Next

Contact Form