• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Allies Warn of Iranian Ransom Attacks Using Log4Shell

You are here: Home / General Cyber Security News / Allies Warn of Iranian Ransom Attacks Using Log4Shell
September 16, 2022

Cybersecurity businesses in the US, UK, Australia and Canada have warned that Iranian state-sponsored hackers are exploiting Log4j vulnerabilities in ransomware strategies.

An inform revealed this week reported Tehran’s Islamic Innovative Guard Corps (IRGC) was behind various attacks exploiting VMware Horizon Log4j bugs on unprotected networks to enable disk encryption and information extortion.

These consist of February attacks versus a US municipal govt and an aerospace enterprise which leveraged the authentic Log4Shell bug CVE-2021-44228 as well as linked vulnerabilities CVE-2021-45046 and CVE-2021-45105.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


This is in maintaining with previous IRGC campaigns that exploited ProxyShell vulnerabilities in Microsoft Exchange and zero-day flaws in Fortinet FortiOS merchandise, the alert claimed.

“After getting accessibility to a network, the IRGC-affiliated actors most likely figure out a system of motion based on their perceived price of the info. Relying on the perceived price, the actors may possibly encrypt data for ransom and/or exfiltrate data,” it spelled out.

“The actors could market the information or use the exfiltrated data in extortion functions or ‘double extortion’ ransom functions the place a risk actor works by using a combination of encryption and knowledge theft to pressure targeted entities to pay out ransom calls for.”

If the state-backed actors are trying to get to produce money for the Islamic Republic through these initiatives, it would mark a new section in Iranian danger exercise. Tehran has largely centered up to now on cyber-espionage for geopolitical functions and attacks designed to disrupt physical and critical infrastructure, as in the the latest campaign against Albania.

“Based on the newest intelligence throughout the 5 Eyes, this advisory once more underscores that corporations of all sizes continue to be targeted by capable and significantly sophisticated adversaries,” argued Australian Cyber Security Centre manager, Abigail Bradshaw.

“It’s certainly critical that businesses reinforce their cyber-defenses by reviewing these protective actions and utilizing them straight away. In unique, I urge organizations to patch their systems versus a variety of already acknowledged critical vulnerabilities.”

Also this 7 days, the US indicted 3 Iranian nationals allegedly responsible for ransomware attacks from hundreds of modest enterprises, governing administration organizations, non-income and educational and religious institutions across the US, UK, Israel and even Iran.

At the similar time, the US Treasury declared sanctions on 10 folks and two entities linked to the IRGC, which includes the three men indicted by the Section of Justice (DoJ).


Some components of this post are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Uber Hacker May Have Compromised Secret Bug Reports
Next Post: Hackers Targeting WebLogic Servers and Docker APIs for Mining Cryptocurrencies hackers targeting weblogic servers and docker apis for mining cryptocurrencies»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.