• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian state broadcaster irib hits by destructive wiper malware

Iranian State Broadcaster IRIB Hits by Destructive Wiper Malware

You are here: Home / General Cyber Security News / Iranian State Broadcaster IRIB Hits by Destructive Wiper Malware
February 21, 2022

An investigation into the cyberattack targeting Iranian national media company, Islamic Republic of Iran Broadcasting (IRIB), in late January 2022 resulted in the deployment of a wiper malware and other personalized implants, as the country’s countrywide infrastructure carries on to deal with a wave of attacks aimed at inflicting critical destruction.

“This implies that the attackers’ intention was also to disrupt the state’s broadcasting networks, with the harm to the Television set and radio networks maybe extra significant than formally claimed,” Tel Aviv-based mostly cybersecurity firm Examine Issue explained in a report revealed very last 7 days.

The 10-2nd attack, which took area on January 27, included the breach of state broadcaster IRIB to air photographs of Mujahedin-e-Khalq Corporation (MKO) leaders Maryam and Massoud Rajavi together with a get in touch with for the assassination of the Supreme Chief Ayatollah Ali Khamenei.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

“This is an incredibly sophisticated attack and only the entrepreneurs of this technology could exploit and injury the backdoors and characteristics that are mounted on the techniques,” Deputy IRIB main Ali Dadi was quoted as saying to state Television set channel IRINN.

Also deployed all through the class of the hack were customized-manufactured malware capable of getting screenshots of the victims’ screens as perfectly as backdoors, batch scripts, and configuration information applied to put in and configure the destructive executables.

Examine Stage reported it did not have ample evidence to make a official attribution to a unique menace actor, and it really is at the moment not recognised how the attackers attained preliminary accessibility to the specific networks. Artifacts uncovered so significantly involve documents dependable for –

  • Creating backdoors and their persistence,
  • Launching the “malicious” video and audio data files, and
  • Installing the wiper malware in an attempt to disrupt functions in the hacked networks.

Guiding the scenes, the attack included interrupting the video clip stream using a batch script to delete the executable associated with TFI Arista Playout Server, a broadcasting program made use of by IRIB, and enjoy the video clip file (“TSE_90E11.mp4”) in a loop.

Prevent Data Breaches

The intrusion also paved the way for the installation of a wiper whose key objective is to corrupt the data files stored in the personal computer, not to point out erase the master boot history (MBR), crystal clear Windows Party Logs, delete backups, kill procedures, and change users’ passwords.

On top of that, the threat actor leveraged four backdoors in the attack: WinScreeny, HttpCallbackService, HttpService and ServerLaunch, a dropper introduced with HttpService. Taken with each other, the distinctive items of malware enabled the adversary to seize screenshots, receive instructions from a remote server, and carry out other malicious functions.

“On a single hand, the attackers managed to pull off a complex procedure to bypass security techniques and network segmentation, penetrate the broadcaster’s networks, create and run the destructive tools that greatly rely on inside know-how of the broadcasting computer software utilised by victims, all while remaining beneath the radar through the reconnaissance and first intrusion stages,” the scientists said.

“On the other hand, the attackers’ tools are of rather small high-quality and sophistication, and are released by clumsy and occasionally buggy 3-line batch scripts. This may possibly help the principle that the attackers could have experienced enable from inside of the IRIB, or indicate a but unidentified collaboration in between diverse groups with diverse competencies.”

Located this report exciting? Abide by THN on Facebook, Twitter  and LinkedIn to study a lot more distinctive material we put up.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «a free solution to protect your business from 6 biggest A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022
Next Post: New Android Banking Trojan Spreading via Google Play Store Targets Europeans new android banking trojan spreading via google play store targets»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.