Summer Mirage: How an Iranian-based Group Prepped for Future Cyber Attacks

Prevailion Tailored Intelligence Summer Mirage image

Prevailion’s Tailored Intelligence research team has identified fresh sources that pin a series of cyberattacks over the summer on an Iranian threat group known as Muddy Water. These attacks are believed to be an extension of the previously documented BlackWater campaign in April, which created a series of compromised systems.

The discovery of these compromises comes days after the Department of Homeland Security issued a bulletin warning of potential Iranian cyber attacks, and these campaigns reveal that Iranian-based threat actors are well-positioned to launch attacks at a moment’s notice.

One of the tactics used by Muddy Water throughout the summer capitalized on global interest in President Donald Trump’s Federal Reserve chairman nominee Stephen Moore. The threat actors distributed a document with wording sourced from an April 23rd article in The New York Times referencing Moore, which was used as bait to install remote trojans into unsuspecting victims. Moore later pulled his name from consideration.

The campaign’s roots were cultivated throughout the summer in an untold number of compromised systems. These dormant compromises are an ideal infrastructure from which threat actors like Muddy Water can launch future attacks. 

Based on these findings, Prevailion’s team recommends at-risk organizations to take the following steps to protect themselves: 

  • Update and properly configure end-point antivirus solutions
  • Review and/or configure organization-wide email filters
  • Ensure employees do not enable macros on documents coming from untrusted sources

The Latest

U.S. Hackers have likely “gone to ground”

Karim Hijazi, who served as the director of intelligence of the cybersecurity firm Mandiant and now serves as CEO of the security firm Prevailion, said the hackers will likely have “gone to ground” at this point.

Who’s Impacted by TA505 and Why It Matters

While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another sophisticated crime actor that companies need to be watching out for.The group is called TA505 and it is believed to be […]

‘Most pristine espionage effort’ in modern history right under the US’s nose

“This was the most pristine espionage effort, unlike anything we’ve seen in a very long time,” said Karim Hijazi, a former intelligence community contractor. “Everyone in the cybersecurity community is freaking out, because we don’t know where this could stop.”

Copyright 2021 Prevailion, Inc. All rights reserved

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.