National Iranian hacker using malicious software and phishing attacks network LinkedIn users

Tensions caused by cyber warfare between the United States and its allies and Iran intensified. Some information security experts believe hackers in Iran the ability and resources far behind the US government, but the US private company's technology infrastructure is not as powerful as the United States government. Information security company FireEye representation, APT34 hacker organizations related with the Iranian government has begun to deploy a social platform LinkedIn phishing activity. Hackers Send an invitation to the US to join LinkedIn professional network, will inject malware victims of the system and extract confidential information via the back door.

National Iranian hacker using malicious software and phishing attacks network LinkedIn users

FireEye experts said that hackers target the financial, energy companies and government organizations and other strategic sectors. One strategy used by hackers is to send fake invitations from renowned institutions such as the University of Cambridge, which is actually a link to download malicious files.

During this event, a hacker using the new malware variants collect information from infected systems, and later by the keeper redirected to the attacker. In addition, hackers use to steal credentials tool data stored in the Windows Vault extraction.

For hackers, such as LinkedIn platform is the ideal foundation for the collection of personal information, the user can almost accept any request to establish a connection. Experts of the International Institute for Security Studies Network said that the incident showed that Iran choose to attack civilian targets carried out cyberwarfare, as these objectives have not advanced resources to prevent, detect and manage network security threats.

via:Forbes

Guess you like

Origin www.linuxidc.com/Linux/2019-07/159538.htm
Recommended