U.S. Networks Face New Threat as Iran-Linked Hackers Deploy Dindoor Backdoor

U.S. Networks Face New Threat as Iran-Linked Hackers Deploy Dindoor Backdoor

An Iranian hacking group has infiltrated U.S. companies, including banks and airports, using advanced malware and targeting defense industry suppliers amid escalating tensions.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

Research from Broadcom's Symantec and Carbon Black Threat Hunter Team reveals that the Iranian hacking group MuddyWater has infiltrated various U.S. companies, including banks and airports, as well as a software firm with ties to Israel. Allegedly connected to the Iranian Ministry of Intelligence and Security, this group’s activities have been linked to cyber operations that began in early February, coinciding with military actions involving the U.S. and Israel against Iran.

The security analysis indicates that the targeted software company, which serves the defense and aerospace sectors, appears to be a primary focus of these attacks. A new backdoor, referred to as Dindoor, exploits the Deno JavaScript runtime and has been identified alongside attempts to exfiltrate sensitive data to a Wasabi cloud storage bucket. Meanwhile, another backdoor named Fakeset was discovered within the networks of a U.S. airport and a non-profit organization, with origins traced back to Backblaze servers.

Notably, the digital certificate used for Fakeset has been linked to other malware such as Stagecomp and Darkcomp, suggesting a consistent operational signature by MuddyWater. Experts have highlighted that Iranian cyber capabilities are increasingly sophisticated, demonstrating advanced techniques in social engineering and spear-phishing, amidst a growing wave of cyber warfare stemming from the ongoing military tensions in the region.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close