By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
Tech News

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

By Viral Trending Content 5 Min Read
Share
SHARE

Oct 18, 2024Ravie LakshmananCyber Intelligence / Critical Infrastructure

Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber actors to infiltrate critical infrastructure organizations via brute-force attacks.

“Since October 2023, Iranian actors have used brute force and password spraying to compromise user accounts and obtain access to organizations in the healthcare and public health (HPH), government, information technology, engineering, and energy sectors,” the agencies said in a joint advisory.

The attacks have targeted healthcare, government, information technology, engineering, and energy sectors, per the Australian Federal Police (AFP), the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), the Communications Security Establishment Canada (CSE), the U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA).

Cybersecurity

Another notable tactic outside of brute force and password spraying concerns the use of multi-factor authentication (MFA) prompt bombing to penetrate networks of interest.

“Push bombing is a tactic employed by threat actors that floods, or bombs, a user with MFA push notifications with the goal of manipulating the user into approving the request either unintentionally or out of annoyance,” Ray Carney, director of research at Tenable, said in a statement.

“This tactic is also referred to as MFA fatigue. Phishing-resistant MFA is the best mechanism to prevent push bombing, but if that’s not an option, number matching – requiring users to enter a time-specific code from a company approved identity system – is an acceptable back up. Many identity systems have number matching as a secondary feature.”

The end goal of these attacks is to likely obtain credentials and information describing the victim’s network that can then be sold to enable access to other cybercriminals, echoing an alert previously issued by the U.S. in August 2024.

The initial access is followed by steps to conduct extensive reconnaissance of the entity’s systems and network using living-off-the-land (LotL) tools, escalate privileges via CVE-2020-1472 (aka Zerologon), and lateral movement via RDP. The threat actor has also been found to register their own devices with MFA to maintain persistence.

The attacks, in some instances, are characterized by the use of msedge.exe to establish outbound connections to Cobalt Strike command-and-control (C2) infrastructure.

“The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access,” the agencies said, adding they “sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.”

The alert comes weeks after government agencies from the Five Eyes countries published guidance on the common techniques that threat actors use to compromise Active Directory.

Cybersecurity

“Active Directory is the most widely used authentication and authorization solution in enterprise information technology (IT) networks globally,” the agencies said. “Malicious actors routinely target Active Directory as part of efforts to compromise enterprise IT networks by escalating privileges and targeting the highest confidential user objects.”

It also follows a shift in the threat landscape wherein nation-state hacking crews are increasingly collaborating with cybercriminals, outsourcing some parts of their operations to further their geopolitical and financial motives, Microsoft said.

“Nation-state threat actors are conducting operations for financial gain and enlisting the aid of cybercriminals and commodity malware to collect intelligence,” the tech giant noted in its Digital Defense Report for 2024.

“Nation-state threat actors conduct operations for financial gain, enlist cybercriminals to collect intelligence on the Ukrainian military, and make use of the same infostealers, command-and-control frameworks, and other tools favored by the cybercriminal community.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

London Phone Thieves Rejecting Samsung Galaxy Phones for iPhones

Samsung Galaxy S26 Ultra Release Date Revealed

Dell Technologies Accelerates Enterprise AI with Powerful, Automated Solutions

Purple Promo Codes and Deals: Up to 30% Off

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

TAGGED: critical infrastructure, Cyber Intelligence, Cyber Security, Cyber Threat, Cybersecurity, healthcare, Internet, national security, phishing attack
Share This Article
Facebook Twitter Copy Link
Previous Article Binance Executive Too Sick For Court, Nigerian Trial Postponed
Next Article ETH held in accumulation wallets jumps 65% since the start of 2024
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Un Nuovo Crash di Bitcoin è Possibile? Perché la Salute della Rete Conta Davvero e Come Potrebbe Intervenire Bitcoin Hyper
Crypto
Children among 25 killed in one of Russia's deadliest strikes on western Ukraine
World News
London Phone Thieves Rejecting Samsung Galaxy Phones for iPhones
Tech News
Europe’s markets mixed, easing crash fears ahead of Nvidia report
Business
EU aims to retrain 600,000 workers for defence sector to eliminate skills shortage
World News
Nicki Minaj thanks Trump for leadership on Christians in Nigeria, calls for urgent action in UN speech
Business
“Grand Theft Auto 6 Will Make Billions” Say Protesters, Asking “Human Cost” to be Considered
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Un Nuovo Crash di Bitcoin è Possibile? Perché la Salute della Rete Conta Davvero e Come Potrebbe Intervenire Bitcoin Hyper

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Un Nuovo Crash di Bitcoin è Possibile? Perché la Salute della Rete Conta Davvero e Come Potrebbe Intervenire Bitcoin Hyper
November 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?