Iran

Hackers apparently based in Iran have mounted a three-year campaign of cyberespionage against high-ranking U.S. and international officials, including a four-star admiral, to gather intelligence on economic sanctions, antinuclear proliferation efforts and other issues, according to cybersecurity investigators.



Using an elaborate ruse involving more than a dozen personas working for a fake U.S. news organization, the hackers developed connections to their targets through websites like Facebook and LinkedIn to trick them into giving up personal data and log-on information, the investigators say.


The alleged campaign, which dates back at least to 2011 and is still under way, principally has focused on U.S. and Israeli targets in public and private sectors, but also has included similar officials in countries such as the U.K., Saudi Arabia, Syria and Iraq, according to the investigators.


The campaign was uncovered by the cybersecurity firm iSight Partners, which has been tracking it for six months. The iSight report provides the first detailed public look inside what the investigators say is an extensive cyberespionage campaign against the U.S. by Iranian hackers, and shows to an extent not previously understood their ability to conduct extensive and lengthy targeting of key individuals, much in the mold of Chinese cyberspies.


'It is such a complex and broad-reaching, long-term espionage campaign for the Iranians,' said Tiffany Jones, a senior vice president at iSight and a former National Security Council aide in the George W. Bush administration. 'What they lack in technical sophistication, they make up in creativity and persistence.'


ISight, which is based in Dallas, specializes in cyberthreat intelligence. Its clients include government agencies and companies across the Fortune 500.


An expanded version of this report appears on WSJ.com .


Thank You for Visiting Iran.

Share to

Facebook Google+ Twitter Digg Reddit

0 comments "Iran"

Post a Comment