Explore our Topics:

FBI and CISA warn of Iran-based ransomware attacks

The cybercriminals collaborate with ransomware affiliates to target healthcare and finance, and other US and foreign industries.
By admin
Sep 5, 2024, 9:52 AM

Iran-based cybercriminals are partnering with known cyber gangs to deploy ransomware on US industries.  

The big picture: A group of Iran-based cyber actors is actively exploiting vulnerabilities in US organizations across multiple sectors, collaborating with ransomware affiliates to extort victims. 

Driving the news: The FBI, CISA, and the Department of Defense Cyber Crime Center (DC3) released a joint Cybersecurity Advisory warning of ongoing cyber attacks by Iranian-based actors against US and foreign organizations. 

  • The attacks target education, finance, healthcare, defense sectors, and local government entities. 
  • Actors exploit vulnerabilities in network devices from Citrix, F5, Pulse Secure, and others. 
  • The group collaborates with ransomware affiliates including NoEscape, Ransomhouse, and ALPHV (BlackCat).

Zoom in: The Iranian cyber group’s tactics include: 

  • Exploiting public-facing networking devices using known vulnerabilities 
  • Creating backdoors and webshells for persistence 
  • Using stolen credentials to access other parts of victim networks 
  • Collaborating with ransomware affiliates to encrypt victim data and extort payments 

Reality check: While some activities support Iranian government interests, the ransomware operations likely aren’t sanctioned by the government. 

  • The actors use the cover company name “Danesh Novin Sahand” for their activities. 
  • They’ve been active since at least 2017, with recent activity observed in August 2024. 

What’s next: The FBI recommends organizations: 

  • Review logs for suspicious IP addresses provided in the advisory 
  • Apply patches for known vulnerabilities in network devices 
  • Check systems for indicators of compromise, including specific usernames and tools 

Go deeper: Read the full advisory here. Read more on how to build resilient cybersecurity approaches here


Show Your Support

Subscribe

Newsletter Logo

Subscribe to our topic-centric newsletters to get the latest insights delivered to your inbox weekly.

Enter your information below

By submitting this form, you are agreeing to DHI’s Privacy Policy and Terms of Use.