• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

US defense vendors invaded by Iranian hackers this week

Updated on May 17, 2014 by Guest Authors

Cyber-espionage is not anymore hypothetical, it is happening already, and the wrath of its claws has been felt no more palpably than by the major defense contractors to the US government. The culprit: a hacking group from Iran.

Security firm FireEye disclosed this week that Ajax Security Team was responsible for the series of cyber-espionage operations perpetrated against US defense vendors. The group reportedly used a software tool that is built to circumvent even the strongest cyber defense infrastructure, as well as employed social engineering to extend the reach of the infection to not just the company’s in Iran but also in the United States.

Ajax Security has been known in the past as a group of political hacktivists, wreaking cyber attacks to organizations that it perceives as enemies as far as political ideologies are concerned. They went on with their habit of defacing government Web sites. Now, the hacker team has evolved.

us-defense-hack

We have seen other hacking groups with the same twist of fate in the past couple of years. All of them have started out as hacktivists, only to end up attacking businesses and individual Internet users alike. And it has become a common practice for hackers and their community continues to expand in Iran, Russia, China and elsewhere.

The rise of Iranian hackers became more blatant following the launch of Stuxnet, a joint software program between the U.S. and Israel to annihilate Iran’s nuclear centrifuges. And the project succeeded in targeting one-fifth of the country’s nuclear facilities.

In return, Iranian hackers have targeted Saudi Aramco in Saudi Arabia in the past, damaging the oil plant’s tens of thousands of workstations using a wiper malware.

Like almost every malware that a regular user may come across over the Web, the hackers would try to lure potential victims into downloading and installing an advanced persistent threat malware, which would then scrape off the victim’s administrative rights over his computer and even possibly steal his credentials, including bank account numbers, email address, credit card data.

Ajax Security Team has been reportedly using email campaigns, social media private messaging systems, fake log-in Web pages and anticensorship software tools that are actually engineered to track a victim’s online activity before executing the attack.

In the case of the US defense contractors, the hackers used a bogus registration page that imitated the IEEE Aerospace website, including its domain name, which made the phony login page look authentic. Visitors to the fake website were led to download a proxy software in order to enter the website and register. In reality, the software was malicious and harmed everyone that fell to the trap.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Comments

  1. Samir says

    May 18, 2014 at 11:04 am

    Seems like a hot topic in hacking news at techwalls and I guess I’m gonna have to share this news over to social media.

    Thanks

Footer

OpenRock S Review – Revolutionizing the World of Earbuds

AiDot OREiN & Linkind Matter Smart Light Bulb Review

ALLPOWERS SP033 200W Portable Solar Panel Review – Eco-Friendly Energy on the Go

Epomaker RT100, TH80 Pro, Shadow-X Mechanical Keyboard Reviewed

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • OpenRock S Review – Revolutionizing the World of Earbuds
  • AiDot OREiN & Linkind Matter Smart Light Bulb Review
  • OKP L1 Robot Vacuum Cleaner Review – Affordable Robot with LiDAR Navigation
  • KEF LS50 Bookshelf Speakers Review: A Sound Decision Over the LS50 Meta

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}