US, UK agencies warn Iran-backed hackers are targeting critical sectors

The state-sponsored APT groups exploited Fortinet and Microsoft Exchange flaws to gain access to systems

US, UK, and Australian cyber authorities have warned that Iran-backed hackers are behind an ongoing ransomware campaign targeting critical infrastructure.

Iranian state-sponsored APT groups exploited four Fortinet and Microsoft Exchange flaws – CVE-2021-34473, 2020-12812, 2019-5591, and 2018-13379 – in order to carry out ransomware attacks, according to the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC), and the Australian Cyber Security Centre (ACSC).

In a joint statement, the agencies said that the FBI and CISA had “observed this Iranian government-sponsored APT group exploit Fortinet vulnerabilities since at least March 2021 and a Microsoft Exchange ProxyShell vulnerability since at least October 2021”.

Meanwhile, the ACSC found that the same APT group had exploited the same Microsoft Exchange vulnerability in Australia.

The flaws were used to gain access to the systems of critical infrastructure organisations, including those in the US transportation and healthcare sectors, in order to then exfiltrate or encrypt data for extortion.

However, the FBI, CISA, ACSC, and NCSC stated that the Iranian-backed threat actors are “focused on exploiting known vulnerabilities rather than targeting specific sectors”.

Related Resource

Multi-factor authentication deployment guide

A complete guide to selecting and deploying your MFA authentication guide

The whitepaper title on a strip of swirling blue and purple diagonal across the pageFree download

The cyber authorities have urged critical infrastructure organisations to patch and update their systems, implement network segmentation and multi-factor authentication, use strong passwords and antivirus software, and stay alert of phishing threats.

The guidance follows a separate report from the Microsoft Threat Intelligence Center (MSTIC) which found that Iranian state-backed hackers stole credentials by sending “interview requests” to target individuals through emails that contained tracking links to confirm whether the user had opened the file. If a victim responded, they then sent a link to a fake Google Meeting, which led to a credential harvesting page.

Microsoft managed to identify six cyber espionage groups in Iran that were found to be behind a spate of ransomware attacks occurring roughly every six weeks since September 2020.

The tech giant’s researchers said that Iranian state-backed hackers collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel, then shifted to scanning for unpatched on-premises Exchange Servers vulnerable to ProxyShell.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download

Recommended

Sophos Intercept X Advanced review: AI-powered protection
endpoint security

Sophos Intercept X Advanced review: AI-powered protection

30 Nov 2021
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
SMBs urged to update software ahead of Black Friday
e commerce

SMBs urged to update software ahead of Black Friday

25 Nov 2021
US adds dozen Chinese tech companies to trade blacklist
Policy & legislation

US adds dozen Chinese tech companies to trade blacklist

25 Nov 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021