Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says

0
52

[ad_1]


A latest assault the place a menace group calling itself “Holy Souls” accessed a database belonging to satirical French journal Charlie Hebdo and threatened to dox greater than 200,000 of its subscribers was the work of Iranian state-actor Neptunium, Microsoft mentioned on Feb. 3.The assault seems to have been a response by the Iranian authorities to a cartoon contest that Charlie Hebdo introduced in December, the place the journal invited readers from around the globe to submit caricatures “ridiculing” Iran’s Supreme Chief Ali Khamenei. Outcomes of the competition have been to be printed on Jan. 7, the eighth anniversary of a lethal 2015 terror assault on Charlie Hebdo — in retaliation for publishing cartoons of Prophet Mohammed — that left 12 of its staffers lifeless.Doxing May Have Put Subscribers at Threat of Bodily TargetingMicrosoft mentioned it decided Neptunium was liable for the assault primarily based on artifacts and intelligence that researchers from its Digital Menace Evaluation Middle (DTAC) had collected. The information confirmed that Neptunium timed its assault to coincide with the Iranian authorities’s formal criticism of the cartoons, and its threats to retaliate towards Charlie Hebdo for them in early January, Microsoft mentioned.Following the assault, Neptunium introduced it had accessed private data belonging to some 230,000 Charlie Hebdo subscribers, together with their full names, telephone numbers, postal addresses, e-mail addresses, and monetary data. The menace actor launched a small pattern of the info as proof of entry and provided the total tranche to anyone prepared to purchase it for 20 Bitcoin — or about $340,000 on the time, Microsoft mentioned. “This data, obtained by the Iranian actor, may put the journal’s subscribers liable to on-line or bodily focusing on by extremist organizations,” the corporate assessed — a really actual concern on condition that Charlie Hebdo followers have been focused greater than as soon as outdoors of the 2015 incident.Lots of the actions that Neptunium took in executing the assault, and following it, have been in step with ways, methods, and procedures (TTPs) that different Iranian state actors have employed when finishing up affect operations, Microsoft mentioned. This included using a hacktivist identification (Holy Souls) in claiming credit score for the assault, the leaking of personal information, and using pretend — or “sockpuppet” — social media personas to amplify information of the assault on Charlie Hebdo.For example, following the assault, two social media accounts (one impersonating a senior French tech government and the opposite an editor at Charlie Hebdo) started posting screenshots of the leaked data, Microsoft mentioned. The corporate mentioned its researchers noticed different pretend social media accounts tweeting information of the assault to media organizations, whereas others accused Charlie Hebdo of engaged on behalf of the French authorities.Iranian Affect Operations: A Acquainted ThreatNeptunium, which the US Division of Justice has been monitoring as “Emennet Pasargad,” is a menace actor related to a number of cyber-enabled affect operations in recent times. It’s one among many apparently state-backed menace actors understanding of Iran which have closely focused US organizations in recent times.Neptunium’s campaigns embrace one the place the menace actor tried to affect the end result of the US 2020 basic elections by, amongst different issues, stealing voter data, intimidating voters through e-mail, and distributing a video about nonexisting vulnerabilities in voting programs. As a part of the marketing campaign, Neptunium actors masqueraded as members of the right-wing Proud Boys group, FBI’s investigation of the group confirmed. Along with its Iran government-backed affect operations, Neptunium can be related to extra conventional cyberattacks courting again to 2018 towards information organizations, monetary firms, authorities networks, telecommunications companies, and oil and petrochemical entities.The FBI mentioned that Emennet Pasargad is definitely an Iran-based cybersecurity firm engaged on behalf of the federal government there. In November 2021, a US grand jury in New York indicted two of its workers on a wide range of prices, together with laptop intrusion, fraud, and voter intimidation. The US authorities has provided $10 million as reward for data resulting in the seize and conviction of the 2 people.Neptunium’s TTPs: Reconnaissance & Internet SearchesThe FBI has described the group’s MO as together with first-stage reconnaissance on potential targets through Internet searches, after which utilizing the outcomes to scan for weak software program that the targets could possibly be utilizing. “In some situations, the target might have been to use a lot of networks/web sites in a specific sector versus a selected group goal,” the FBI has famous. “In different conditions, Emennet would additionally try and determine internet hosting/shared internet hosting providers.”The FBI’s evaluation of the group’s assaults reveals that it has particular curiosity in webpages working PHP code, and externally accessible MySQL databases. Additionally of excessive curiosity to the group are WordPress plug-ins akin to revslider and layerslider, and web sites that run on Drupal, Apache Tomcat, Ckeditor, or Fckeditor, the FBI mentioned. When trying to interrupt right into a goal community, Neptunium first verifies if the group may be utilizing default passwords for particular functions, and it tries to determine admin or login pages. “It needs to be assumed Emennet might try frequent plaintext passwords for any login websites they determine,” the FBI mentioned.

[ad_2]