Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Iranian hackers maintain two years of access to the Middle East CNI through VPN flaws and malware
Identity

Iranian hackers maintain two years of access to the Middle East CNI through VPN flaws and malware

userBy userMay 3, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 3, 2025Ravi LakshmananMalware/Operation Technology

The Iranian state-sponsored threat groups stem from a long-term cyber invasion targeting key national infrastructure (CNI) in the Middle East that lasted nearly two years.

Activities that lasted at least from May 2023 to February 2025 included “a widespread espionage and network prepositions that are often suspected, accompanied by tactics often used to maintain sustained access for future strategic advantages.”

Network Security Company noted that the attacks display tradecraft overlaps with known Iranian nation-state threat actors called Lemon Sandstorm (formerly Rubidium), which is also tracked as Parisite, Pioneer Kitten, and UNC757.

Since at least 2017, the aerospace, oil and gas, water and electricity sectors, as well as the electricity sectors of the Middle East, Europe and Australia have been rated active. According to industrial cybersecurity company Dragos, the enemy exploited the known virtual private network (VPN) security flaws in Fortinet, Pulse Secure and Palo Alto Networks to gain initial access.

Last year, US Cybersecurity and Intelligence Agency pointed its fingers at Lemon Sandstorm to deploy ransomware against entities in the US, Israel, Azerbaijan and the United Arab Emirates.

Cybersecurity

The attacks analyzed by Fortinet on CNI entities have been unfolding in four stages starting in May 2023, employing weapons of tools that evolve when victims enact measures.

May 15, 2023 – April 29, 2024 – Access victim’s SSL VPN system using stolen login credentials, drop web shells on public servers, deploy three backdoors, chaos, honeyfnet, and HXLibrary for long-term access, April 30, 2024 – 224- 224- 22 By by by by fums by fums by fums by fums by fut by food for food for fore A new backdoor called NeoExpressrat. We will use tools like Plink and Ngrok to dig deep into the network, perform targeted removal of victim emails, and implement lateral movements on November 23, 2024 and December 13, 2024 to virtualization infrastructure. Victims, December 14, 2024 – Current – By leveraging known biotime vulnerabilities (CVE-2023-38951, CVE-2023-38951, and CVE-2023-38952), attempts to reinvest into the network and spear phishing attacks targeting victims who have been victimized after adopting Microsoft 365 signals.

It is worth noting that both Havoc and Meshcentral are open source tools that act as command and control (C2) frameworks, respectively, and as remote monitoring and management (RMM) software. On the other hand, SystemBC refers to commodity malware that often serves as a precursor to ransomware deployment.

Here’s a brief description of the custom malware family used in the attack –

hanifnet – Unsigned .NET executable hxlibrary that can retrieve and execute commands from a C2 server (first deployed in August 2023) – designed to fetch a malicious IIS module C2 server that is designed to fetch three identical text files hosted in Google Docs and send the web to sell basection to the Web basector. Windows Local Security Authority Sub -System Service (LSASS) Process Memory (first deployed in November 2023) Remote Injector – Loader Component used to run next-stage payloads like HAVOC (first deployed in April 2024) – Web Shell used for initial reconnasance (first deployed in April 2024) Discord for Follow -on Communications (first deployed in August 2024) Dropshell – Web Shell with basic file upload functionality (first deployed in November 2024) DarkLoadLibrary – Open Source Loader used to launch SystemBC (first deployed in December 2024)

The link to Lemon Sand Storm comes from C2 Infrastructure – apps.gist.githubapp[.]Internet and Gupdate[.]Net – Previously, it was flagged as associated with threat actor operations carried out during the same period.

Cybersecurity

Fortinet said the victim’s limited operational technology (OT) network is a key target for attacks based on the widespread reconnaissance of threat actors and violations of network segments hosting OT adjacent systems. However, there is no evidence that the enemy has invaded the OT network.

The majority of malicious activities are rated as practical keyboard operations performed by different individuals, taking into account command errors and consistent work schedules. Furthermore, a deeper investigation into the incident revealed that threat actors may have accessed the network on May 15, 2021.

“Through the intrusion, the attackers leveraged chained proxies and custom implants to bypass network segmentation and move laterally within the environment,” the company said. “At a later stage we consistently checked four different proxy tools for accessing internal network segments, demonstrating a sophisticated approach to maintain persistence and avoiding detection.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRomanian Election 2025: Who is standing and what is at risk? |Election News
Next Article Pakistan’s test fire ballistic missile as tension with India | Border Dispute News
user
  • Website

Related Posts

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

June 20, 2025

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

June 20, 2025

Troilerization Github repository found in a campaign targeting 67 gamers and developers

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

The more sustainability and transparency you get, the better your decisions will be

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

A massive 7.3 TBPS DDOS attack targets hosting providers and delivers 37.4 TB in 45 seconds

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meta Earth Network 2.0: Pioneering Web3 Innovation with Rewards and Global Events

Top 10 Startups and High-Tech Funding News – June 19, 2025

Sifflet raises $18 million to power AI using reliable data as a demand for observability

Is WhatsApp becoming a weapon of war?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.