Skip to content

Five Eyes Warn of Rising Iranian Cyber Threats

Iranian state-sponsored hackers are actively exploiting software vulnerabilities to target critical infrastructure and government institutions. Stay vigilant and protect your systems.

This image is a poster. In this poster we can see a person's hand holding a pan and there is text....
This image is a poster. In this poster we can see a person's hand holding a pan and there is text. We can see missiles and fire.

Five Eyes Warn of Rising Iranian Cyber Threats

The Australian Cyber Security Centre (ACSC), along with other Five Eyes nations, has released a joint advisory on September 15, warning of ongoing Iranian state-sponsored cyber threats. The alert highlights recent activities and provides guidance for targeted entities.

The advisory reveals that Iranian state-sponsored actors, particularly the Islamic Revolutionary Guard Corps (IRGC), have been actively targeting a wide range of entities across multiple sectors in the US, UK, Australia, and Canada. These include government institutions, critical infrastructure, research organizations, and companies involved in technology and energy.

The hackers have been exploiting known vulnerabilities in software such as Fortinet, Microsoft Exchange, VMware Horizon, and Log4j2 in SysAid applications to gain initial access. After infiltrating systems, they may deploy tools to support ransom and extortion operations or steal data for further extortion. In Germany, for instance, these actors primarily target government institutions and critical infrastructure sectors.

The DOJ recently indicted three Iranians for conducting cyber-attacks against critical infrastructure and other organizations. The actors often operate under the auspices of Najee Technology Hooshmand Fater LLC in Karaj, Iran, and Afkar System Yazd Company in Yazd, Iran. The advisory notes that since November 2021, hacking attempts by Iranian Government-sponsored APT cyber-actors have continued.

The joint advisory warns of a rise in malicious cyber activity by APT actors connected with Iran's IRGC. It offers detection and mitigation advice and encourages targeted entities to report incidents to the ACSC and monitor alerts and advisories. Organizations are urged to remain vigilant and take necessary steps to protect their systems from these persistent threats.

Read also:

Latest