Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Iran hackers penetrate key world networks: researchers
by Staff Writers
Washington (AFP) Dec 03, 2014


Iranian hackers have managed to penetrate and steal information from governments and companies around the world since 2012, posing a grave security threat, researchers say in a new report,

The report by the security firm Cylance released Tuesday said the hackers have "extracted highly sensitive materials" from government agencies and major critical infrastructure companies in the united States, Britain, Canada, China, France, Germany, India, Israel, Kuwait, Mexico, Pakistan, Qatar, Saudi Arabia, South Korea, Turkey and the United Arab Emirates.

Cylance researchers called the effort "Operation Cleaver" and said it has "conducted a significant global surveillance and infiltration campaign."

The group is believed to work from Tehran, with help from others located in the Netherlands, Canada, and Britain, the report said

Targets include government networks as well as companies involved in military, oil and gas, energy and utilities, transportation, airlines, airports, hospitals, telecommunications, technology, education, aerospace and other sectors.

"During intense intelligence gathering over the last 24 months, we observed the technical capabilities of the Operation Cleaver team rapidly evolve faster than any previously observed Iranian effort," the report said.

"As Iran's cyber warfare capabilities continue to morph, the probability of an attack that could impact the physical world at a national or global level is rapidly increasing. Their capabilities have advanced beyond simple website defacements."

- Retaliation for Stuxnet worm -

The report said Iran appeared to ramped up its cyberwarfare capabilities after being hit by attacks including the Stuxnet worm, a program widely believed to be led by the United States or Israel, and which targeted its nuclear energy program.

"Stuxnet was an eye-opening event for Iranian authorities, exposing them to the world of physical destruction via electronic means," Cylance researchers said.

"Retaliation for Stuxnet began almost immediately in 2011."

Cylance said it has likely uncovered just "a fraction of Operation Cleaver's full scope" and added that "if the operation is left to continue unabated, it is only a matter of time before the world's physical safety is impacted by it."

Cylance said the effort is a "state-sponsored campaign" with the potential to affect airline safety, industrial systems and other critical networks.

"This campaign could be a way to demonstrate Iran's cyber capabilities for additional geopolitical leverage, due to the breadth and depth of their global targets," the report said.

It also said the hackers may be looking at collaborating with counterparts in North Korea to attack companies in South Korea. The group is also recruiting from universities in the United States and elsewhere and potentially using "hackers for hire."

"Perhaps the most bone-chilling evidence we collected in this campaign was the targeting and compromise of transportation networks and systems such as airlines and airports in South Korea, Saudi Arabia and Pakistan," the report said.

The infiltration mean "their entire remote access infrastructure and supply chain was under the control of the Cleaver team, allowing permanent persistence under compromised credentials."

This led to "complete access to airport gates and their security control systems," and a takeover of payment systems to allow fraudulent purchases.

The 86-page report says evidence of Iranian involvement is clear, with Persian hacker names used throughout the campaign and many domains used registered in Iran.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Hacker group targets company financial info
Washington (AFP) Dec 01, 2014
A hacker group has tapped into email accounts of executives in more than 100 companies that could give them lucrative access to market-moving information, a US security firm said Monday. San Francisco-based FireEye said the mysterious group, dubbed FIN4, showed deep familiarity with the way businesses work and appeared to target the accounts of officials with knowledge of merger and acquisit ... read more


CYBER WARS
Chinese Hypersonic Strike Vehicle May Overcome US Missile Defense: Expert

India test fires nuclear capable strategic missile

Ballistic Missile Launches Detected by Russia's Aerospace Defense

U.S Navy sending Aegis-equipped destroyers to Japan

CYBER WARS
Taiwan develops new missiles to counter China's threat

RAF launches Paveway guided bombs from Eurofighter Typhoon and F-35

Brazil, Russia in talks on air defense system

The fear and the chaos of a missile attack in east Ukraine

CYBER WARS
NGC delivers first operational MQ-8C Fire Scout to the US Navy

France studies how to intercept mystery drones over nuclear plants

Sagem demos drone for use in civilian airspace

Sense and Avoid system for UAVs in civilian airspace closer to reality

CYBER WARS
LockMart completes environmental testing on 4th MUOS bird

Harris Corporation supplying Falcon III radios to Canadian military

GenDyn Canada contracted to connect military to WGS system

Northrop Grumman continues Joint STARS sustainment services

CYBER WARS
Precision guided projectile hits the mark in recent testing

Air Force orders additional programmable bomb fuzes

US delivers anti-mortar radars to Ukraine: Pentagon

Marines get counter-IED training from A-T Solutions

CYBER WARS
New Pentagon chief inherits friction with White House

Raytheon to provide Qatar with IAMD Command and Control System

Kalashnikov fight Russia sanctions with fashion line

Pentagon chief Hagel out as IS war heats up

CYBER WARS
Obama to nominate Pentagon chief Friday

Putin, Hollande in surprise Ukraine talks amid warship controversy

US denies funding opposition to oust Sri Lanka leader

China condemns Philippines over disputed sea arbitration

CYBER WARS
'Giant' charge density disturbances discovered in nanomaterials

LLNL team develops efficient method to produce nanoporous metals

Thin film produces new chemistry in 'nanoreactor'

Ultra-short X-ray pulses explore the nano world




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.