International security agencies have raised alarms about Iranian cyber actors compromising networks across critical infrastructure sectors.
These actors reportedly sell login access to these networks, posing significant risks to global cybersecurity.
This article delves into the methods used by these actors and the sectors affected and recommends measures for organizations to safeguard against such threats.
The advisory was jointly released by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC).
Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Watch Here
The document warns network defenders about Iranian cyber actors employing brute force and other techniques to infiltrate organizations within critical infrastructure sectors, including healthcare, government, information technology, engineering, and energy.
Since October 2023, Iranian cyber actors have utilized various methods to compromise organizational networks.
These include brute force attacks like password spraying, and multifactor authentication (MFA) push bombing. Once access is gained, these actors modify MFA registrations to maintain persistent access.
They conduct network discovery to obtain additional credentials and information that can be sold on cybercriminal forums, enabling other malicious actors to exploit these networks further.
These cyber actors target sectors crucial to national security and public safety. The healthcare and public health sectors, government entities, information technology firms, engineering companies, and energy providers are among those affected.
Compromising such networks can lead to severe consequences, including data breaches, operational disruptions, and potential threats to public safety.
The advisory provides several recommendations for organizations to protect themselves against these threats. Key measures include:
To detect potential compromises, organizations are advised to look for signs such as multiple failed authentication attempts across accounts, suspicious logins from unexpected geographic locations, and unusual user agent strings.
Additionally, monitoring for MFA registrations from unfamiliar devices or locales can help identify unauthorized access attempts.
Mitigation strategies include promptly disabling user accounts for departing staff and ensuring password policies align with the latest guidelines. Providing basic cybersecurity training to users can also enhance an organization’s overall security posture.
Iranian cyber actors’ sale of login access highlights the evolving nature of cyber threats facing critical infrastructure worldwide.
Organizations must remain vigilant and proactive in implementing robust cybersecurity measures to protect their networks from such sophisticated attacks.
By following the recommendations outlined in the advisory, they can better safeguard their systems against unauthorized access and potential exploitation by cybercriminals.
How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…