Security News > 2020 > February > Cyber-wrath of Iran for top general's assassination hasn't progressed beyond snooping and nicking logins... yet

Cyber-wrath of Iran for top general's assassination hasn't progressed beyond snooping and nicking logins... yet
2020-02-27 16:09

The Iranian cybercrime group that was expected to spearhead the rogue Middle East nation's revenge for the US assassination of General Qasem Soleimani has quite the arsenal at its digital fingertips.

They added: "From a threat management and risk assessment perspective, we advise organisations not to conflate ongoing espionage operations with a retaliatory response. However, continually leveraging threat intelligence to assess and improve controls will help network defenders secure their environments against malicious activity regardless of intent."

In plain language, this means an uptick in nefarious activity on your network probably doesn't mean you are on the front line of Iran's revenge attacks against the West for bumping off their top espionage bloke.

The attack methods mentioned by Secureworks in its blog post included some fairly standard phishing techniques, such as enabling macros embedded in Microsoft Office documents.

Usefully, at the end of its blog post Secureworks also published a list of URLs that it said had been associated with Iranian malware command-and-control systems.


News URL

https://go.theregister.co.uk/feed/www.theregister.co.uk/2020/02/27/iran_revenge_cyberattacks_hacking_crew/