Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

One meets his destiny often on the road he takes to avoid it.


interests / soc.culture.china / Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains

SubjectAuthor
* Mysterious Hacker Group Suspected in July Cyberattack on Iranian TrainsDavid P.
+- Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian TrainsByker
`- Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trainsltlee1

1
Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains

<affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>

  copy mid

https://novabbs.com/interests/article-flat.php?id=4470&group=soc.culture.china#4470

  copy link   Newsgroups: soc.culture.china
X-Received: by 2002:a37:a603:: with SMTP id p3mr129461qke.441.1629225365096; Tue, 17 Aug 2021 11:36:05 -0700 (PDT)
X-Received: by 2002:aca:2105:: with SMTP id 5mr3584476oiz.98.1629225364866; Tue, 17 Aug 2021 11:36:04 -0700 (PDT)
Path: i2pn2.org!i2pn.org!paganini.bofh.team!news.dns-netz.com!news.freedyn.net!newsfeed.xs4all.nl!newsfeed9.news.xs4all.nl!tr2.eu1.usenetexpress.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: soc.culture.china
Date: Tue, 17 Aug 2021 11:36:04 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=2606:a000:bfc0:7f:1481:df3e:4141:f9f1; posting-account=zTJuwAkAAADCZHWn_OD4_sCSsA2o1RHv
NNTP-Posting-Host: 2606:a000:bfc0:7f:1481:df3e:4141:f9f1
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>
Subject: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
From: imb...@mindspring.com (David P.)
Injection-Date: Tue, 17 Aug 2021 18:36:05 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 131
 by: David P. - Tue, 17 Aug 2021 18:36 UTC

Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
By Ronen Bergman, 8/14/21, NY Times

TEL AVIV — When a cyberattack on Iran’s railroad system
last month caused widespread chaos with hundreds of trains
delayed or canceled, fingers naturally pointed at Israel,
which has been locked in a long-running shadow war w/Tehran.

But a new investigation by an Israeli-American cybersecurity
co, Check Point Software Technologies, concluded that a
mysterious group opposed to the Iranian govt was most likely
behind the hack. That is in contrast to many previous cyber-
attacks, which were attributed to state entities. The group
is known as Indra, named after the god of war in Hindu myth.

“We've seen many cyberattacks connected with what are
believed to be professional intel or military units,” said
Itay Cohen, a senior researcher at Check Point. “But here,
it seems to be something else entirely.”

The company’s report, which was reviewed by The NY Times,
said the attack was a cautionary tale: An opposition group
without the budget, personnel or abilities of a govt could
still inflict a good deal of damage.

Iran & its nuclear program have been the target of a series
of cyberattacks over recent years, including a campaign
from 2009-10 directed by Israel & the US against a uranium
enrichment facility.

Tehran, in turn, has been accused of hacking other govts,
cybersecurity companies & websites over the past decade.
In one instance, the US accused computer specialists who
regularly worked for Iran’s Islamic Revolutionary Guards
Corps of carrying out cyberattacks on dozens of American
banks & trying to take over the controls of a small dam
in a suburb of New York City.

In cases where Iran has acknowledged it was a victim of
a cyberattack, it usually accused foreign countries. But
after the attack on July 9 on the railway system, Tehran
didn't blame anyone & there was no claim of responsibility.

Check Point said the hack bore striking similarities to
others against companies connected to the Iranian govt
that Indra had claimed in 2019 & 2020.

“It's very possible that Indra is a group of hackers,
made up of opponents of the Iranian regime, acting from
either inside or outside the country, that has managed to
develop its own unique hacking tools & is using them very
effectively,” Cohen said.

Such a group could still be backed by a state, or its
name could be used as a cover for one, but Check Point &
other experts said they had found no indication of that.

Ari Eitan, the VP of research at Intezer, a NY-based co
that specializes in the comparison of codes in different
cyberweapons, also said there was a strong link between
the tools & methods used in the July train hack & past
hacks claimed by Indra.

“They share code genes that were not seen anywhere else
but in these attacks, & the files used last July are an
updated & improved version of those used in 2019 & 2020,”
he said. “Based on the code connections, it’s safe to
assume the same group is behind all attacks.”

Indra first surfaced on social media shortly before its
first hacking claim in 2019 & has since posted in English
& Arabic. It has claimed responsibility for a series of
attacks targeting companies linked to Iran & its proxies,
like Hezbollah, the Lebanese militant group.

The group’s Twitter account says its mission is to “bring
a stop to the horrors of QF & its murderous proxies in
the region,” referring to the Quds Force — the foreign-
facing branch of the Revolutionary Guards — & the proxy
militias it oversees around the Middle East.

On the day of the train attack, an announcement appeared
on electronic timetable boards at R.R. stations across
Iran saying: “Long delays due to cyberattacks.” The msg
itself was the work of the hackers &, in a sardonic twist,
it advised confused travelers to seek more info by calling
64411, the office number of Iran’s supreme leader,
Ayatollah Ali Khamenei.

A day later, the Iranian Transport Ministry’s computer
system was also hacked, severely disrupting operations.
In both attacks, similar notices popped up on computer
screens making clear that it was a hack, though there was
no mention of Indra in the claims.

Check Point said that its investigation found that the
hackers engaged in intel gathering before their attack.
An identical break-in tool was used for both hacks,
disabling the computers by locking them & wiping their
contents. The tool, called Wiper, is an advanced version
of the same one that Indra has been using since 2019,
acc. to Check Point.

“What we're seeing here are patterns that are different
from anything we have seen in the past in attacks executed
by states,” said Cohen, adding that Indra had developed
unique & exclusive attack tools & had demonstrated intel-
gathering ability.

He also said that the group appeared to be in the process
of developing its abilities, but that it was still far
from the level of sophistication of a state-run cyberassault.

Their operations, Cohen said, appeared “more like a team
of ideologically motivated youngsters with capabilities
they have taught themselves in the cyberworld than like
an orderly and organized body.”

In 2019, Indra claimed that it had hacked the servers of
the Fadel Exchange and Int'l Forwarding Co, a Syrian-
based company dealing with int'l money transfers & foreign
currency trading. Indra accused the company of helping to
finance the Quds Force & Hezbollah.

In 2020, Indra claimed that it had hacked the Syrian
privately owned Cham Wings Airlines, which has been under
U.S. Treasury sanctions since 2016 for aiding the Syrian
govt in the country’s civil war.

https://www.nytimes.com/2021/08/14/world/middleeast/iran-trains-cyberattack..html

Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains

<aa-dneczFNBjl4H8nZ2dnUU7-XXNnZ2d@earthlink.com>

  copy mid

https://novabbs.com/interests/article-flat.php?id=4472&group=soc.culture.china#4472

  copy link   Newsgroups: soc.culture.china soc.culture.israel sci.military.naval soc.culture.iran
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!feeder1.feed.usenet.farm!feed.usenet.farm!tr3.eu1.usenetexpress.com!feeder.usenetexpress.com!tr3.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!buffer2.nntp.dca1.giganews.com!nntp.earthlink.com!news.earthlink.com.POSTED!not-for-mail
NNTP-Posting-Date: Tue, 17 Aug 2021 14:16:14 -0500
From: byk...@do~rag.net (Byker)
Newsgroups: soc.culture.china,soc.culture.israel,sci.military.naval,soc.culture.iran
References: <affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>
In-Reply-To: <affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>
Subject: Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
Date: Tue, 17 Aug 2021 14:16:13 -0500
MIME-Version: 1.0
Content-Type: text/plain; format=flowed; charset="utf-8"; reply-type=original
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
Importance: Normal
X-Newsreader: Microsoft Windows Live Mail 16.4.3528.331
X-MimeOLE: Produced By Microsoft MimeOLE V16.4.3528.331
Message-ID: <aa-dneczFNBjl4H8nZ2dnUU7-XXNnZ2d@earthlink.com>
Lines: 13
X-Usenet-Provider: http://www.giganews.com
NNTP-Posting-Host: 172.10.55.158
X-Trace: sv3-2w19yFbE1GxG8nBK7en/t+qaiwIkQS8FLitYv035Hg9UsEn0racaSDFV3Md7YdedwVhy5q0l7JAftOj!0XTKC8k6n2o/VDMXHJ/I0XC/YlahohiC4aXdL+Tc/50FERHfFwgn6LyQ1WHIGiq9jQEk7a1VqRHH!cI+Swe/37gJFjf+Oh3+w0tXRiBT0ZTA2Zg==
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Original-Bytes: 1908
 by: Byker - Tue, 17 Aug 2021 19:16 UTC

"David P." wrote in message
news:affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com...
>
> Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
> By Ronen Bergman, 8/14/21, NY Times
>
> TEL AVIV — When a cyberattack on Iran’s railroad system last month caused
> widespread chaos with hundreds of trains delayed or canceled, fingers
> naturally pointed at Israel, which has been locked in a long-running
> shadow war w/Tehran.

Give the ragheads a taste of their own medicine...

Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains

<8425ee73-c5dd-4bf2-b90d-87572f65d1b3n@googlegroups.com>

  copy mid

https://novabbs.com/interests/article-flat.php?id=4473&group=soc.culture.china#4473

  copy link   Newsgroups: soc.culture.china
X-Received: by 2002:ac8:5ecd:: with SMTP id s13mr4636808qtx.16.1629229638295; Tue, 17 Aug 2021 12:47:18 -0700 (PDT)
X-Received: by 2002:a4a:d498:: with SMTP id o24mr3831587oos.23.1629229637914; Tue, 17 Aug 2021 12:47:17 -0700 (PDT)
Path: i2pn2.org!rocksolid2!news.neodome.net!news.theuse.net!aioe.org!feeder1.feed.usenet.farm!feed.usenet.farm!tr3.eu1.usenetexpress.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!border1.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: soc.culture.china
Date: Tue, 17 Aug 2021 12:47:17 -0700 (PDT)
In-Reply-To: <affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=174.99.33.53; posting-account=sQgtagoAAAB2Cf4qBTW8cwfp7bDiKK3s
NNTP-Posting-Host: 174.99.33.53
References: <affd7263-5cee-4ada-b78b-d855d44e7ff9n@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <8425ee73-c5dd-4bf2-b90d-87572f65d1b3n@googlegroups.com>
Subject: Re: Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
From: ltl...@hotmail.com (ltlee1)
Injection-Date: Tue, 17 Aug 2021 19:47:18 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 142
 by: ltlee1 - Tue, 17 Aug 2021 19:47 UTC

On Tuesday, August 17, 2021 at 2:36:06 PM UTC-4, David P. wrote:
> Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains
> By Ronen Bergman, 8/14/21, NY Times
>
> TEL AVIV — When a cyberattack on Iran’s railroad system
> last month caused widespread chaos with hundreds of trains
> delayed or canceled, fingers naturally pointed at Israel,
> which has been locked in a long-running shadow war w/Tehran.
>
> But a new investigation by an Israeli-American cybersecurity
> co, Check Point Software Technologies, concluded that a
> mysterious group opposed to the Iranian govt was most likely
> behind the hack. That is in contrast to many previous cyber-
> attacks, which were attributed to state entities. The group
> is known as Indra, named after the god of war in Hindu myth.
>
> “We've seen many cyberattacks connected with what are
> believed to be professional intel or military units,” said
> Itay Cohen, a senior researcher at Check Point. “But here,
> it seems to be something else entirely.”
>
> The company’s report, which was reviewed by The NY Times,
> said the attack was a cautionary tale: An opposition group
> without the budget, personnel or abilities of a govt could
> still inflict a good deal of damage.
>
> Iran & its nuclear program have been the target of a series
> of cyberattacks over recent years, including a campaign
> from 2009-10 directed by Israel & the US against a uranium
> enrichment facility.
>
> Tehran, in turn, has been accused of hacking other govts,
> cybersecurity companies & websites over the past decade.
> In one instance, the US accused computer specialists who
> regularly worked for Iran’s Islamic Revolutionary Guards
> Corps of carrying out cyberattacks on dozens of American
> banks & trying to take over the controls of a small dam
> in a suburb of New York City.
>
> In cases where Iran has acknowledged it was a victim of
> a cyberattack, it usually accused foreign countries. But
> after the attack on July 9 on the railway system, Tehran
> didn't blame anyone & there was no claim of responsibility.
>
> Check Point said the hack bore striking similarities to
> others against companies connected to the Iranian govt
> that Indra had claimed in 2019 & 2020.
>
> “It's very possible that Indra is a group of hackers,
> made up of opponents of the Iranian regime, acting from
> either inside or outside the country, that has managed to
> develop its own unique hacking tools & is using them very
> effectively,” Cohen said.
>
> Such a group could still be backed by a state, or its
> name could be used as a cover for one, but Check Point &
> other experts said they had found no indication of that.
>
> Ari Eitan, the VP of research at Intezer, a NY-based co
> that specializes in the comparison of codes in different
> cyberweapons, also said there was a strong link between
> the tools & methods used in the July train hack & past
> hacks claimed by Indra.
>
> “They share code genes that were not seen anywhere else
> but in these attacks, & the files used last July are an
> updated & improved version of those used in 2019 & 2020,”
> he said. “Based on the code connections, it’s safe to
> assume the same group is behind all attacks.”
>
> Indra first surfaced on social media shortly before its
> first hacking claim in 2019 & has since posted in English
> & Arabic. It has claimed responsibility for a series of
> attacks targeting companies linked to Iran & its proxies,
> like Hezbollah, the Lebanese militant group.
>
> The group’s Twitter account says its mission is to “bring
> a stop to the horrors of QF & its murderous proxies in
> the region,” referring to the Quds Force — the foreign-
> facing branch of the Revolutionary Guards — & the proxy
> militias it oversees around the Middle East.
>
> On the day of the train attack, an announcement appeared
> on electronic timetable boards at R.R. stations across
> Iran saying: “Long delays due to cyberattacks.” The msg
> itself was the work of the hackers &, in a sardonic twist,
> it advised confused travelers to seek more info by calling
> 64411, the office number of Iran’s supreme leader,
> Ayatollah Ali Khamenei.
>
> A day later, the Iranian Transport Ministry’s computer
> system was also hacked, severely disrupting operations.
> In both attacks, similar notices popped up on computer
> screens making clear that it was a hack, though there was
> no mention of Indra in the claims.
>
> Check Point said that its investigation found that the
> hackers engaged in intel gathering before their attack.
> An identical break-in tool was used for both hacks,
> disabling the computers by locking them & wiping their
> contents. The tool, called Wiper, is an advanced version
> of the same one that Indra has been using since 2019,
> acc. to Check Point.
>
> “What we're seeing here are patterns that are different
> from anything we have seen in the past in attacks executed
> by states,” said Cohen, adding that Indra had developed
> unique & exclusive attack tools & had demonstrated intel-
> gathering ability.
>
> He also said that the group appeared to be in the process
> of developing its abilities, but that it was still far
> from the level of sophistication of a state-run cyberassault.
>
> Their operations, Cohen said, appeared “more like a team
> of ideologically motivated youngsters with capabilities
> they have taught themselves in the cyberworld than like
> an orderly and organized body.”
>
> In 2019, Indra claimed that it had hacked the servers of
> the Fadel Exchange and Int'l Forwarding Co, a Syrian-
> based company dealing with int'l money transfers & foreign
> currency trading. Indra accused the company of helping to
> finance the Quds Force & Hezbollah.
>
> In 2020, Indra claimed that it had hacked the Syrian
> privately owned Cham Wings Airlines, which has been under
> U.S. Treasury sanctions since 2016 for aiding the Syrian
> govt in the country’s civil war.
>
> https://www.nytimes.com/2021/08/14/world/middleeast/iran-trains-cyberattack.html

What group of hacker from what nation had attacked is not anything the author of
the article, Ronen Bergman, and NYTimes readers can tell, one way or the other.
It is only a matter of one wants to believe in what.


interests / soc.culture.china / Mysterious Hacker Group Suspected in July Cyberattack on Iranian Trains

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor