SME Times is powered by   
Search News
Just in:   • Very disappointing, does not bring any happiness into the lives of ordinary people, says Opposition on Union Budget 2026  • Union Budget 2026-27 highlights: Customs simplified, duties slashed; tax reforms ease trade and living  • PFC, REC to be restructured as part of financial sector reforms in Budget 2026-27  • Budget 2026-27 rolls out tax incentives for cooperatives  • Union Budget: Defence soars to Rs 7.85 lakh crore, big bets on electronics, biopharma and railways 
Last updated: 11 Jan, 2019  

Iran.9.Thmb.jpg Iran-based group behind 'unprecedented' global hacking: FireEye

Iran.9.jpg
   Top Stories
» Union Budget: Defence soars to Rs 7.85 lakh crore, big bets on electronics, biopharma and railways
» Budget 2026-27 hikes Govt capex to Rs 12.2 lakh crore in big push to infra
» India to ensure Aatmanirbharta, Budget driven by Yuvashakti: FM Sitharaman
» Cabinet approves Union Budget 2026-27
» Budget 2026 to focus on defence, capex, infrastructure, fiscal discipline
IANS | 11 Jan, 2019
Iran-based cyber criminals are likely behind a sophisticated "unprecedented" hacking campaign targeting entities across the Middle East and North Africa, Europe and North America, according to US cybersecurity firm FireEye.

The researchers at FireEye have identified a wave of DNS (Domain Name System) hijacking that has affected dozens of domains belonging to government, telecommunications and internet infrastructure entities.

"While we do not currently link this activity to any tracked group, initial research suggests the actor or actors responsible have a nexus to Iran," FireEye said in a blog post on Thursday.

"Preliminary technical evidence allows us to assess with moderate confidence that this activity is conducted by persons based in Iran and that the activity aligns with Iranian government interests," researchers wrote in the blog.

The hacking campaign has targeted victims across the globe on an almost unprecedented scale, with a high degree of success.

The teams at FireEye tracked the activity for several months -- mapping and understanding the innovative tactics, techniques and procedures (TTPs) deployed by the attacker.

They also worked closely with victims, security organisations and law enforcement agencies where possible to reduce the impact of the attacks and/or prevent further compromises.

"While this campaign employs some traditional tactics, it is differentiated from other Iranian activity we have seen by leveraging DNS hijacking at scale. The attacker uses this technique for their initial foothold, which can then be exploited in a variety of ways," explained researchers.

A large number of organisations have been affected by this pattern of DNS record manipulation and fraudulent SSL (Secure Sockets Layer) certificates.

"They include telecoms and ISP providers, internet infrastructure providers, government and sensitive commercial entities," said FireEye.

This type of attack is difficult to defend against, because valuable information can be stolen, even if an attacker is never able to get direct access to an organisation's network.

"Implement multi-factor authentication on your domain's administration portal, search for SSL certificates related to your domain and revoke any malicious certificates, conduct an internal investigation to assess if attackers gained access to your environment," suggested researchers.
 
Print the Page
Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
₹91.2
₹89.5
UK Pound
₹123.35
₹119.35
Euro
₹107
₹103.35
Japanese Yen ₹57.9 ₹56.1
As on 22 Jan, 2026
  Daily Poll
What is your primary "Make or Break" expectation from the Finance Minister this year?
 The Tax Relief
 The Working Capital Fix
 The Compliance Holiday
 The Payment Shield
 The Tech Subsidy
 All
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter