More Iranian Threat Ops Uncovered After U.S. Condemns Albanian Hacking Incident
Facebook engineers can't say how the company keeps track of user data, CISA plans to kick off incident reporting efforts in a few days, Healthcare cyberattacks trigger greater patient mortality, more
Metacurity is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.
Researchers at Mandiant say that a group of prolific Iranian hackers known as APT42 has likely been key to Iran's Islamic Revolutionary Guard Corps efforts to track its domestic and foreign adversaries in recent years by targeting US government officials, Iranian dissidents, and journalists.
Mandiant says that APT42 has conducted at least 30 operations in 14 countries since 2015. However, this is likely only a small part that surfaced due to operation security mistakes that allowed them to be tracked. The hackers have tried to break into the email accounts of US government officials focused on Iran policy and the mobile phones of Iranian dissidents. Between March and June last year, the hackers used a compromised email account of someone working at a US-based think tank to target US government officials focused on Middle East and Iran policy.
The research …
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.