Tuesday, October 27, 20:14
Home security Top hackers reveal their techniques in online video!

Top hackers reveal their techniques in online video!

One of Iran's top hacking groups has left one server exposed online, in which IBM security investigators found videos showing hackers "in action". Researchers consider these videos to be lessons in hacking techniques used by Iranian hackers to train "new recruits". The videos were recorded with a screen recording application called BandiCam, which proves that they were deliberately pulled and not accidentally pulled by operators infected by the malware their. The videos show Iranian hackers performing various tasks, showing the techniques that recruits hackers must follow to breach a victim's account, using a list of violators. credentials. The accounts e-mail were the primary targets of hackers, with social media accounts also being accessible, in cases where the credentials of the target account were compromised.

hackers video techniques

The researchers report that this is a meticulous and well-thought-out process, with operators having access to every account of a targeted victim, no matter how important his or her online profile was. The accounts accessed included, inter alia, the accounts held by the alleged victim for music and video streaming, delivery, credit reporting, banks, video-games and mobile phone companies.


Iranian hackers entered the settings of each account and searched for personal information that may not be included in other online accounts, in an attempt to create as complete a profile as possible for each target. IBM does not detail how the hackers obtained the credentials for each victim. Therefore, it is not clear whether the hackers had infected the targets with malware or whether they had purchased the credentials from an "underground" market.

In some of the videos, Iranian hackers show techniques for stealing data from each account. This includes extracting all contacts of the target account, photos and documents from related services in cloud storage such as Google Drive. IBM researchers point out that in some cases, operators also had access to Google Takeout to extract information such as its full content Google Their account, including location history, information from Chrome and connected Android devices.

hackers video techniques

Operators then added the victim's email credentials to one Zimbra instance operated by the Iranian team, which would allow hackers to remotely monitor multiple accounts from one backend panel. Other videos also show the operators creating puppet email accounts, which IBM researchers believe the hackers will use for future attacks.


In addition, investigators say they have identified some of the victims' accounts depicted in videos leaked by Iranian hackers. These include a member of their Navy USA and a Greek Navy officer.

The videos also show failed attempts to access target accounts, such as those of State Department officials. The videos in which the account breach attacks failed, mainly concern accounts that use two-factor authentication (2FA).

Iranian hackers

The researchers say that the server on which they found all these videos was part of the infrastructure of the attack of an Iranian group called ITG18, but is better known by the names Charming Kitten, Phosphorous and APT35. It is one of the most active hacking groups funded by Iran. Some of the group's most recent campaigns include attacks on a US presidential campaign in 2020, as well as US pharmaceutical companies, during the pandemic Mesures COVID-19.


Previous campaigns ITG18 / APT35 have also targeted US military, financial regulators and nuclear scientists as sectors that have attracted Iranian interest due to growing military tensions between the two countries, economic sanctions imposed on Iran, and of Iran's nuclear program.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Pohackontas
Pohackontashttps://www.secnews.gr
Every accomplishment starts with the decision to try.

LIVE NEWS

00:01:47

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...