Tuesday, July 16, 2024
HomeIran News NowWorld News IranIran Regime's Hackers Used Female 'Honey Pot' to Lure Foreign Targets: Researchers

Iran Regime’s Hackers Used Female ‘Honey Pot’ to Lure Foreign Targets: Researchers

1060x600-cd15734b52d946b1ea261431cddae0a0

Hackers believed to be working for the Iranian authorities have impersonated a young female photographer on social media for more than a year, luring men working in industries strategically important to the regime’s regional adversaries, according to research published Thursday.

The so-called Mia Ash persona has been active on sites including LinkedIn, Facebook Inc, WhatsApp and Blogger since at least April of last year, researchers at Dell SecureWorks said, Reuters reported.

The campaign showed the Iranian regime engaged in a social engineering plot to ensnare its targets with a “honey pot”, a classic espionage trap often involving seduction, more commonly used by criminal hackers, the report said.

Dell SecureWorks observed Mia Ash sending specific malware, concealed as a “photography survey” with an attachment, to a victim that matched malware sent by Iranian hacking group Cobalt Gypsy during an unsuccessful “spearphishing” email attempt to the same victim’s employer in January.

The malware, known as PupyRAT, would give an attacker complete control of a compromised computer and access to network credentials, suggesting government espionage. The researchers did not have visibility into how many targets were compromised or what Mia Ash sought to gain with the access.

The fake profile used publicly available social media images of a real photographer based in Eastern Europe to create an identity of an attractive woman in her mid-twenties who lived in London and enjoyed travel, soccer, and popular musicians including Ed Sheeran and Ellie Goulding, Dell SecureWorks said. Her social media biographies appeared to lift details from a New York photographer’s LinkedIn profile.

Dell SecureWorks said it had high confidence Mia Ash was created and operated by the Iranian hacking group known as Cobalt Gypsy.

Mia Ash primarily lured middle-aged men who worked as technicians and engineers at oil and gas, aerospace and telecommunications firms in the Middle East that had been previously targeted by the same group. Those include Saudi Arabia and Israel in addition to India and the United States.

Mia Ash’s victims failed to notice that none of her profiles included a way to contact her for photography services, according to Allison Wikoff, a senior security researcher at Dell SecureWorks who tracked Mia Ash’s activity.

LinkedIn removed the fake Mia Ash profile before Dell SecureWorks finished its research, Wikoff said.

Facebook, where Mia Ash listed her relationship status as “it’s complicated,” took down the profile last week after being contacted by Dell SecureWorks.

Cobalt Gypsy, also known as OilRig, has been previously accused of operating a network of fake LinkedIn profiles to pose as recruiters at major companies, including Northrop Grumman Corp and General Motors Co, but the Mia Ash persona showed an elevated level of persistence, Wikoff said.

Another report released this week by researchers at Tokyo-based Trend Micro and ClearSky of Israel described efforts to impersonate major technology brands including Twitter Inc and Microsoft Corp by another hacking group widely suspected of having links to Iran’s regime.