Cybersecurity firm: More Iran hacks as US sanctions loom

Alister Shepherd, the director of a subsidiary of FireEye, during a presentation about the APT33 in Dubai Tuesday. (AP)
Updated 20 September 2018
Follow

Cybersecurity firm: More Iran hacks as US sanctions loom

  • The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.
  • Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”

DUBAI: An Iranian government-aligned group of hackers launched a major campaign targeting Mideast energy firms and others ahead of US sanctions on Iran, a cybersecurity firm said Tuesday, warning further attacks remain possible as America reimposes others on Tehran.

While the firm FireEye says the so-called “spear-phishing” email campaign only involves hackers stealing information from infected computers, it involves a similar type of malware previously used to inject a program that destroyed tens of thousands of terminals in Saudi Arabia.

The firm warns that this raises the danger level ahead of America re-imposing crushing sanctions on Iran’s oil industry in early November.

“Whenever we see Iranian threat groups active in this region, particularly in line with geopolitical events, we have to be concerned they might either be engaged in or pre-positioning for a disruptive attack,” Alister Shepherd, a director for a FireEye subsidiary, told The Associated Press.

Iran’s mission to the UN rejected FireEye’s report, calling it “categorically false.”

“Iran’s cyber capabilities are purely defensive, and these claims made by private firms are a form of false advertising designed to attract clients,” the mission said in a statement. “They should not be taken at face value.”

FireEye, which often works with governments and large corporations, refers to the group of Iranian hackers as APT33, an acronym for “advanced persistent threat.” APT33 used phishing email attacks with fake job opportunities to gain access to the companies affected, faking domain names to make the messages look legitimate. Analysts described the emails as “spear-phishing” as they appear targeted in nature.

FireEye first discussed the group last year around the same time. This year, the company briefed journalists after offering presentations to potential government clients in Dubai at a luxury hotel and yacht club on the man-made, sea-horse-shaped Daria Island.

While acknowledging their sales pitch, FireEye warned of the danger such Iranian government-aligned hacking groups pose. Iran is believed to be behind the spread of Shamoon in 2012, which hit Saudi Arabian Oil Co. and Qatari natural gas producer RasGas. The virus deleted hard drives and then displayed a picture of a burning American flag on computer screens. Saudi Aramco ultimately shut down its network and destroyed over 30,000 computers.

A second version of Shamoon raced through Saudi government computers in late 2016, this time making the destroyed computers display a photograph of the body of 3-year-old Syrian boy Aylan Kurdi, who drowned fleeing his country’s civil war.

But Iran first found itself as a victim of a cyberattack. Iran developed its cyber capabilities in 2011 after the Stuxnet computer virus destroyed thousands of centrifuges involved in Iran’s contested nuclear program. Stuxnet is widely believed to be an American and Israeli creation.

APT33’s emails haven’t been destructive. However, from July 2 through July 29, FireEye saw “a by-factors-of-10 increase” in the number of emails the group sent targeting their clients, Shepherd said.

 


EU warns Israel suspending Gaza NGOs would block ‘life-saving aid’

Updated 31 December 2025
Follow

EU warns Israel suspending Gaza NGOs would block ‘life-saving aid’

BRUSSELS: The EU warned Wednesday that Israel's threat to suspend several aid groups in Gaza from January would block "life-saving" assistance from reaching the population.
"The EU has been clear: the NGO registration law cannot be implemented in its current form," EU humanitarian chief Hadja Lahbib posted on X, after Israel said several groups would be barred for failing to provide details of their Palestinian employees.
"IHL (international humanitarian law) leaves no room for doubt: aid must reach those in need," Lahbib wrote.
NGOs had until December 31 to register under the new framework, which Israel says aims to prevent "hostile actors or supporters of terrorism" operating in the Palestinian territories, rather than impede aid.
Israeli authorities announced Tuesday that organisations which "refused to submit a list of their Palestinian employees in order to rule out any links to terrorism" had received notice that their licences would be revoked as of January 1, with an obligation to cease all activities by March 1.
Israel has not disclosed the number of groups facing a ban, but it has specifically called out Doctors Without Borders (MSF) for failing to meet the rules. It accused the medical charity of employing two individuals with links to Palestinian armed groups.
The Israeli government told AFP earlier this month that 14 NGO requests had been rejected as of November 25.
Several NGOs said the new rules will have a major impact on aid distribution in Gaza, with humanitarian organisations saying the amount of aid entering Gaza remains inadequate.
While an accord for a ceasefire that started on October 10 stipulated the entry of 600 trucks per day, only 100 to 300 are carrying humanitarian aid, according to NGOs and the United Nations.
COGAT, the Israeli defence ministry body responsible for Palestinian civilian affairs, said last week that on average 4,200 aid trucks enter Gaza weekly, which corresponds to around 600 daily.