• فارسی
  • العربیه
  • AL
  • Personal Story
  • Videos
  • About Us
  • Fake News
Sunday, March 26, 2023
Iran Probe
  • Home
  • Reports and Articles
    • Articles
    • Reports
  • Terrorism
    • Foreign Targets
    • Iranian Dissidents
    • Regional Interferences
  • Iranian Intelligence Offshoots
    • Iran-Interlink
    • Nejat Society
    • Habilian
  • Demonization Campaign
    • Name calling
    • Iran-Iraq War
    • Kurds and Shiites Allegation
  • Iran’s Operatives
    • NIAC and Iran Lobbies
    • Vavak/ MOIS Agents
  • Ashraf 3
    • Dignitaries visiting Ashraf 3
    • Gatherings
    • In Media
    • Locals and Ashraf 3
  • Resources
    • Court Judgments
    • Legal Opinions
    • Press Displays
    • Publication
    • Source Articles
No Result
View All Result
  • Home
  • Reports and Articles
    • Articles
    • Reports
  • Terrorism
    • Foreign Targets
    • Iranian Dissidents
    • Regional Interferences
  • Iranian Intelligence Offshoots
    • Iran-Interlink
    • Nejat Society
    • Habilian
  • Demonization Campaign
    • Name calling
    • Iran-Iraq War
    • Kurds and Shiites Allegation
  • Iran’s Operatives
    • NIAC and Iran Lobbies
    • Vavak/ MOIS Agents
  • Ashraf 3
    • Dignitaries visiting Ashraf 3
    • Gatherings
    • In Media
    • Locals and Ashraf 3
  • Resources
    • Court Judgments
    • Legal Opinions
    • Press Displays
    • Publication
    • Source Articles
No Result
View All Result
Iran Probe
No Result
View All Result
Home Fake News

FBI warns over Iran’s cyber group

FBI says the group poses a broader cybersecurity threat outside of information operations

January 30, 2022
in Fake News
Share on FacebookShare on Twitter

The FBI has issued an alert detailing the tools, techniques and tactics of an Iranian group, giving US organizations tips to defend against its malicious cyber activities.

Back in October 2021, a grand jury in the US District Court for the Southern District of New York indicted two Iranian nationals employed by Emennet Pasargad for computer intrusion, computer fraud, voter intimidation, interstate threats, and conspiracy offenses for their alleged participation in a campaign aimed at influencing and interfering with the 2020 US Presidential Election.

The Department of the Treasury Office of Foreign Assets Control designated Emennet along with four members of the company’s management and the two indicted employees for attempting to influence the election. The Department of State’s Rewards for Justice Program also offered up to $10 million for information on the two indicted actors.

But the FBI information indicates Emennet poses a broader cybersecurity threat outside of information operations.

“Since 2018, Emennet has conducted traditional cyber exploitation activity targeting several sectors, including news, shipping, travel (hotels and airlines), oil and petrochemical, financial, and telecommunications, in the United States, Europe, and the Middle East,” it said.

Emennet is known to use virtual private network (VPN) services TorGuard, CyberGhost, NordVPN, and Private Internet Access. The group also uses web search to identify leading US business brands and then scans their websites for vulnerabilities to exploit. In some but not all cases, the exploit attempts were targeted and the group would also try to identify hosting and shared hosting services.

Emennet was particularly interested in finding webpages running PHP code and identifying externally accessible MySQL databases, in particular phpMyAdmin. They also were keen on WordPress, the most popular CMS on the web, as well as Drupal and Apache Tomcat.

“When conducting research, Emennet attempted to identify default passwords for particular applications a target may be using, and tried to identify admin and/or login pages associated with those same targeted websites. It should be assumed Emennet may attempt common plaintext passwords for any login sites they identify,” the FBI warned.

It said the group has attempted to leverage cyber intrusions conducted by other actors for their own benefit, for example searching for data hacked and leaked by other actors, and attempting to identify webshells that may have been placed or used by other cyber actors.

The group also uses a range of open-source penetration testing and research tools, including SQLmap, and it probably uses additional tools: DefenseCode Web Security Scanner, Wappalyzer, Dnsdumpster, Tiny mce scanner, Netsparker, WordPress security scanner (wpscan), and, of course, Shodan.

Michael George, CEO of Invicti Security, the parent company of Netsparker, said: “We have no evidence of any such use on authorized versions of our software which would be in clear violation of our service agreements. We actively block use of authorized versions of our software by restricted parties based on location and other know your customer (KYC) best practices. Invicti Security remains committed to upholding the highest ethical standards and ensuring our customers are able to continuously secure their web applications.”

Read More:

Meta discovered Fake accounts run by Iranian regime

Tags: IranIranian hackersSlider
ShareTweetSendShare
Previous Post

Reuters: UN urged to open query into Iran’s 1988 killings and Raisi role

Next Post

COMMENT: Act on Iran’s human rights abuses to rein in nuclear ambitions

Related Posts

Fake News

Photos of MEK leaders are burned in ‘Albania’, but it is suspected that the perpetrators are Iranian agents

August 13, 2022
Fake News

A senior member of the US Congress: The constant pattern of deception and double behavior of the Iranian regime

May 27, 2022
Fake News

Iran’s Cyber Army: A Force of Disinformation for a Cursed Cause

April 2, 2022

Stay Connected

Latest Posts

NCRI-US Nowruz Event: Iranian Resistance Rises Against Oppression

March 23, 2023

Amb. Lincoln Bloomfield Attends Senate Meeting in Support of Iran Protests

March 18, 2023

EU Parliament Calls for Sanctioning Khamenei, Raisi and Montazeri

March 16, 2023

Former Vice President Mike Pence spoke on Saturday at Iranian Freedom event

March 13, 2023

‘It is very urgent for the European Union to proscribe Iran’s IRGC’

March 10, 2023

Can monarch’s son divert Iran’s ongoing revolution?

March 9, 2023

Follow Us On Twitter

About Iran Probe

Iran Probe

Iran Probe is the English version of the Iran Efshagar website that began its work back in 2004 in Farsi...
In the past few years Iran Efshagar has been able to expose the lies of the Iranian regime and its agents, who are active under the cloak of opposition figures or the regime’s lobbies in Europe and the United States.

Browse by Category

  • Ashraf 3
    • Dignitaries visiting Ashraf 3
    • Gatherings
    • In Media
    • Locals and Ashraf 3
  • Camps Ashraf and Liberty
    • Ashraf
      • Deadly Attacks
      • Iraq Nationwide Support
      • Medical Siege
      • Other atrocities
      • Psychological Torture
      • TIPF
      • Visit of International Delegations
    • Liberty
      • Attacks
      • Iraqi Camp Management
      • Liberty Medical Siege
      • Liberty News
      • Logistical Siege
      • Safety and Security
      • UNHCR Statements
  • Demonization Campaign
    • Iran-Iraq War
    • Kurds and Shiites Allegation
    • Name calling
  • Fake News
  • Iran's Operatives
    • NIAC and Iran Lobbies
    • Vavak/ MOIS Agents
  • Iranian Intelligence Offshoots
    • ADVT
    • Habilian
    • Iran-Interlink
    • Nejat Society
  • News
  • Personal Story
  • Reports and Articles
    • Articles
    • Reports
  • Resources
    • Court Judgments
    • Legal Opinions
    • Press Displays
    • Publication
    • Source Articles
  • Terrorism
    • Foreign Targets
    • Iranian Dissidents
    • Regional Interferences
  • Uncategorized
  • Videos

External Links

Stay Connected

Copyright © 2008 - 2020 by Iran Efshagar - English. All rights reserved.

No Result
View All Result
  • Home
  • Reports and Articles
    • Articles
    • Reports
  • Terrorism
    • Foreign Targets
    • Iranian Dissidents
    • Regional Interferences
  • Iranian Intelligence Offshoots
    • Iran-Interlink
    • Nejat Society
    • Habilian
  • Demonization Campaign
    • Name calling
    • Iran-Iraq War
    • Kurds and Shiites Allegation
  • Iran’s Operatives
    • NIAC and Iran Lobbies
    • Vavak/ MOIS Agents
  • Ashraf 3
    • Dignitaries visiting Ashraf 3
    • Gatherings
    • In Media
    • Locals and Ashraf 3
  • Resources
    • Court Judgments
    • Legal Opinions
    • Press Displays
    • Publication
    • Source Articles

Copyright © 2008 - 2020 by Iran Efshagar - English. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist