Recent destructive attacks against organizations that masquerade as a ransomware operation called DarkBit are likely performed by an advanced persistent threat (APT) group that’s affiliated with the Iranian government. During some of these operations the attackers didn’t limit themselves to on-premises systems but jumped into victims’ Azure AD environments where they deleted assets including entire server farms and storage accounts.
Researchers from Microsoft track this cluster of malicious activity under the temporary identifier DEV-1084, but they found strong links between it and resources and techniques used in the past by an Iranian APT group known in the security industry as MERCURY or MuddyWater. Last year, the US Cyber Command officially attributed MuddyWater to a subordinate element within the Iranian Ministry of Intelligence and Security (MOIS).
More Stories
Space Bears ransomware: what you need to know
The Space Bears ransomware gang stands out from the crowd by presenting itself better than many legitimate companies, with corporate...
Fancy Product Designer Plugin Flaws Expose WordPress Sites
Critical Fancy Product Designer plugin flaws risk remote code execution and SQL injection attacks on WordPress sites Read More
Japan Faces Prolonged Cyber-Attacks Linked to China’s MirrorFace
Cyber-attacks by China-linked MirrorFace targeted Japan’s national security information in major campaigns operating since 2019 Read More
PowerSchool Reportedly Pays Ransom to Prevent Student Data Leak
A school district said that PowerSchool paid a ransom to prevent the attackers releasing data it accessed of students and...
EU Commission Liable for Breaching EU’s Own Data Protection Rules
A court has ruled the EU Commission infringed an individual’s right to the protection of their personal data by transferring...