BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Thousands of US organizations have become victims of espionage by the Iranian group APT33

    Why did Iran need to collect intelligence from American companies?

    According to the Microsoft Threat Intelligence team, the Iranian hacking group APT33 has been conducting widespread attacks since February 2023 with the intention of stealing passwords and other sensitive data.

    According to Microsoft, the Iranian hacker collective APT33 (Peach Sandstorm, HOLMIUM, Refined Kitten) poses a significant threat to the internet. The group has been attacking thousands of organizations in the United States and other nations since February 2023. Defense, satellite, and the pharmaceutical industries all attract the attention of hackers.

    APT33 employs a technique known as "password spraying," in which hackers try to access numerous accounts with a single password or a list of widely used passwords. This approach is distinct from brute force attacks, which target a single account by choosing a password from a lengthy list. By using this technique, attackers can significantly raise their chances of success while lowering the chance that their accounts will be automatically blocked.

    In order to gain access to victim networks, hackers also made use of flaws in unpatched Confluence and ManageEngine devices. Once inside, APT33 used the Roadtools and AzureHound frameworks to collect data from the victims' cloud environments and scout out their Azure Active Directory. Additionally, hackers created new subscriptions using stolen Azure credentials or abused Azure Arc to take control of devices connected to the victims' networks.

    Microsoft came to the conclusion that the campaign was probably being run to gather intelligence for Iranian interests based on the target organizations' profiles and the activity that was being observed.

    Over the past ten years, Iranian cybercriminals have launched some of the most devastating cyberattacks, wiping out entire computer networks in the Middle East and the US. You can learn more about the organization of the groups, their objectives, and their capabilities by reading our in-depth analysis of Iranian hacking activities.

    A financial app used by millions of Iranians for online transactions was the target of a recent attack announced by the Iranian hacking group Black Reward, which has previously attacked the Iranian government.

    Author DeepWeb
    Hacked Las Vegas: what makes Scattered Spider and BlackCat unique
    Who is responsible for the cyberattack on the website of the Canadian Armed Forces?

    Comments 0

    Add comment