SlideShare a Scribd company logo
1 of 20
NEWSCASTER – Iranian Cyber Espionage using
Facebook, LinkedIn,Twitter…
An iSIGHT Partners Overview
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com
iSIGHT Partners
200+ experts, 16 Countries, 24 Languages, 1 Mission
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 2
Mission Global Reach
Betheworld’sleading global
cyberthreatintelligence
provider,connecting
securitytechnologyand
operationstothebusiness.
NEWSCASTER
 Cyber-espionage campaign
 Links to Iran
 Targeting high and low ranking personnel in multiple
countries – US, UK, Israel, Saudi Arabia, Iraq
– U.S. military
– Congressional personnel
– Washington D.C. area journalists
– Diplomatic corps
– U.S. Defense contractors
– Israeli Defense contractors
– Members of the U.S./Israeli lobby
 Utilizing social media platforms as targeting platform
– Facebook
– LinkedIn
– YouTube
– Twitter
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 3
NEWSCASTER
 Active since at least 2011
 More than a dozen elaborate principal personas; many
supported by the fictitious news organization NewsOnAir.org
– Included at least two legitimate identities (falsified) from
leading news organizations
 Thomson Reuters
 Fox News
 More than 2,000 targets and legitimate individuals connected
to the network
– High probability of a vastly wider reach
 Brash and complex, reliance on social engineering and spear-
phishing for credential harvesting, use of malware with data
exfiltration capabilities
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 4
NEWSCASTER Personas
Persona Purported Profession Known Platforms
Known
Connections
Sandra Maler Reporter, NewsOnAir LinkedIn, Facebook,
Twitter, Google
226
Adia Mitchell Reporter, NewsOnAir LinkedIn, Facebook,
Twitter, Wordpress
281
Amanda Teyson Reporter, NewsOnAir LinkedIn, Facebook,
Twitter, Google
310
Sara McKibben Reporter, NewsOnAir LinkedIn, Facebook Unknown
Joseph Nilsson Founder, NewsOnAir LinkedIn, Facebook 231
Jane Baker (Ava T. Foster) Reporter, NewsOnAir LinkedIn 30
Mary Cole Recruiter for Defense
Contractor
LinkedIn, Facebook, Google 500+
Berna Achando Web Designer for Defense
Contractor
LinkedIn, Facebook 151
Jeann Maclkin Systems Administrator for US
Navy
LinkedIn, Facebook,
Blogger, YouTube
500+
Alfred Nilsson Talent Acquisition for Defense
Contractor
LinkedIn, Facebook Unknown
Josh Nilsson (Josh Furie) IT Manager for Defense
Contractor
LinkedIn, Facebook 130
Dorotha Baasch IT Analyst for Defense
Contractor
LinkedIn, Facebook Unknown
Kenneth Babcock CPA and Tax Advisor for
Payment Processor
LinkedIn, Facebook, Google Unknown
Donnie Eadense Information Systems Manager
for Defense Contractor
LinkedIn 118
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 5
 Interconnected
 Multi-platform
 Pictures taken from bystanders
and the moderately famous
 Young, pretty women used
 Secondary personas legitimize
principals
 NewsOnAir.org created to
legitimize multiple personas
Elaborate Support for Personas
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 6
NewsOnAir.org
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 7
Kimberly Gulifoyle
NewsOnAir.Org: A Front News Agency
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 8
Fake journalists shareNewsOnAir.org
links onsocialmedia networks.5
Articlereposted toNewsOnAir.org
withoriginal authorship removed2Real Newsarticles from Reuters,AP,
BBC, other resources.1 Links tweetedfrom @NewsOnAir2
4
Article
News
ByAmanda Teyson
Amanda Teyson Persona
Persona’s nameattachedinbyline
3 ByAmanda Teyson
Malicious Activity
 Social networking as
reconnaissance tool and
propagation method
 Credential collection capability
 Low-sophistication malware
– IRC malware
 Other capabilities anticipated
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 9
Malicious Activity
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 10
Linkleads to
fakelogin
portal.
4 Unsuspecting target
directed tocontent.6
User credentials
captured, stolen.5
NEWSCASTER Network (Multiple Fake Personas)
Targeted HVT approached with
connection request.2
Malicious link sent
to target3
HighValue TargetFriends ofHVT
approached first
with request.1
IranianTies
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 11
 Infrastructure
 Tehran registration
 “Parastoo”
 Iranian content
 Targeting
 Tehran working hours and
days
Implications
 Method is not novel
 What this group lacks in technical
sophistication they make up for in
brashness, creativity, and patience
 We infer from the length of this
operation is indicative of at least
marginal success
 Defense requires a human touch
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 12
NEWSCASTER SUMMARY
 3+ year Cyber-espionage campaign with links to Iran
 Targeting high and low ranking personnel in multiple countries– US, UK,
Israel, SaudiArabia, Iraq
– U.S. military
– Congressional personnel
– Washington D.C. area journalists
– Diplomatic corps
– U.S. Defense contractors
– Israeli Defense contractors
– Members of the U.S./Israeli lobby
 Utilizing social media platforms as targeting platform
– Facebook
– LinkedIn
– YouTube
– Etc.
 More than 2,000 targets and legitimate individuals caught in the net
– Credential harvesting
– Access to corporate and personal emails
– Malware with data exfiltration capabilities
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 13
Today’s Cyber Security Challenges
CISOsfindingitdifficulttodefinesecurityROItoexecutives
ShortshelflifeforCISOs
Vastlyexpandingattacksurfacearea
Mobile,cloud,virtualization,globalbusinessoperations
Largeprotectioninvestmentsandnogoodprioritizationfilter
Who,why,when,how
Operationalchaos
Toomanyalarms,notenoughpeople,poorprioritization
“Braindead”securitytoolsthatrelyonpastevents/signatures
Versesextremelyagileadversaries
Severebreachescontinue…
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 14
How CanCyberThreat Intelligence Help?
1. BeProactive
2. Shrink theProblem
3. ImprovePrioritization
4. EnhanceExecutiveCommunications
5. ConnectSecurityWithBusiness
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 15
CISORecommendation:
“Useacommercialthreat
intelligenceservicetodevelop
informedtacticsforcurrent
threats,andplanforthreats
thatmayexistinthemidterm
future.”
RobMcMillan&KellyKavanagh
TechnologyOverviewforSecurityThreatIntelligenceServiceProviders
Published:16October2013
iSIGHT Partners –WhatWe Do
Cyber
Crime
Cyber
Espionage
Distributed
Denial-of-Service
Enterprise
Hacktivism Mobile Vulnerability and
Exploitation
Analyst Access Global Response
ThreatScape® Subscriptions
!
ThreatScapeTechnologies
ThreatScape API
ThreatService™ Engagements
BundledAnalyst Research
! Partner Integrations
Threat Diagnostics
Intelligence Integration
Breach Diagnostics
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 16
Formal Research Process
Yields Rich, ContextualThreat Intelligence
Intelligence
Requirements
Created Based
on Clients,
Sectors and
Adversaries
Requirements
Prioritized
by Analysts,
Matched to
Current
Holdings then
Passed to
Research
Teams
Collection
Planning and
Tasking of
Global Teams
Requirements
Collected by
Unique Global
Teams and
returned to
Fusion Center
Processing and
Exploitation
To Standardize
Multiple
Information
Sources Ready
for Analysis
Analysis of
Information and
Production of
Reporting for
Clients
Fully fused,
Corroborated,
Cross-
referenced
and Edited
Multi-source
Intelligence
Reporting
Disseminated
to
Clients
Client
Feedback,
Refinement of
Intelligence
Product
Intelligence
Requirements
Requested
From Client
? i
Feedback &
Clarification
Analysis DisseminationCollection
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved 17
HowWe Deliver:
Fully Integrated Dissemination Model
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 18
Executive Summary
Standards
Context
…The campaign is related to other Gameover Zeus analyses as it uses
a similar attack infrastructure and campaign identifiers.
Malicious hyperlinks within the message point to pages hosted on
compromised websites that contain no visible content, but do load
one JavaScript file:
hxxp://crazytraintour.com.ar/jie3Qd6E/js.js
Executives
Risk, Intel, Fraud
SOC
Incident
Response
Tech Security
Controls
Standard Formats
Consumers
Technology Partners
ThreatScape® API
MySIGHT Portal
Email
TechnologiesThreatScape
PGPHTML
TXT
XML
JSON
STIX
PDF
CSV
Data
On April 10, 2012, iSIGHT Partners
observed a mass mailing targeting
chief financial officers (CFOs) with a
fraudulent e-mail titled, "CFO
Bulletin Update.”
Size: 305704 bytes
MD5: 5bda9aea96360d9260d7cf38b416af8c
Digital Signature: This file is digitally signed by 'nYZbvA3YL8XjBMx’
Certificate Validity: 04/10/2012to 01/01/2040
Timestamp: 2010:11:01 22:56:53+01:00
Company Name: Microsoft Corporation
File Description: Windows DiskDiagnostic User Resolver
File Version: 6.1.7600.16385 (win7_rtm.090713-1255)
Internal Name: DFDWiz.exe
...
At the Ready to Help
StephenWard:
sward@isightpartners.com
www.isightpartners.com
Request more information:
info@isightpartners.com
Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 19
iSIGHT Partners
200+ experts, 16 Countries, 24 Languages, 1 Mission

More Related Content

What's hot

The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Cyber security meetup from Nepal
Cyber security meetup from NepalCyber security meetup from Nepal
Cyber security meetup from NepalChiranjibi Adhikari
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNowSecure
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatIntellipaat
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdStrike
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdStrike
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 

What's hot (20)

The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cyber security meetup from Nepal
Cyber security meetup from NepalCyber security meetup from Nepal
Cyber security meetup from Nepal
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Hacking3e ppt ch11
Hacking3e ppt ch11Hacking3e ppt ch11
Hacking3e ppt ch11
 
Hacking3e ppt ch09
Hacking3e ppt ch09Hacking3e ppt ch09
Hacking3e ppt ch09
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Hacking3e ppt ch15
Hacking3e ppt ch15Hacking3e ppt ch15
Hacking3e ppt ch15
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
CrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing IntelligenceCrowdCast Monthly: Operationalizing Intelligence
CrowdCast Monthly: Operationalizing Intelligence
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas AttackCrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: When Pandas Attack
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 

Viewers also liked

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiInsideView
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threatspattcom
 
Salander v bond 2600
Salander v bond 2600Salander v bond 2600
Salander v bond 2600antitree
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-EspionageSam
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Critique of Secret Service failures at the White House
Critique of Secret Service failures at the White HouseCritique of Secret Service failures at the White House
Critique of Secret Service failures at the White HouseDavid Sweigert
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 

Viewers also liked (20)

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWiSocial Espionage & CRM: Selling to Customer 2.0 - #SXSWi
Social Espionage & CRM: Selling to Customer 2.0 - #SXSWi
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
Salander v bond 2600
Salander v bond 2600Salander v bond 2600
Salander v bond 2600
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
Corporate Espionage in India
Corporate Espionage in IndiaCorporate Espionage in India
Corporate Espionage in India
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Critique of Secret Service failures at the White House
Critique of Secret Service failures at the White HouseCritique of Secret Service failures at the White House
Critique of Secret Service failures at the White House
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Similar to Iranian Cyber Espionage Using LinkedIn, Facebook, Twitter to target thousands

Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Sparity Inc.
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan Holdings, Inc.
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaPuneet Kukreja
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case studycnnetwork
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case studycnnetwork
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkMichael Davis
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security RisksImperva
 
Security First Safeguarding Your iOS App Against Cyber Threats.pdf
Security First Safeguarding Your iOS App Against Cyber Threats.pdfSecurity First Safeguarding Your iOS App Against Cyber Threats.pdf
Security First Safeguarding Your iOS App Against Cyber Threats.pdfBitCot
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxshericehewat
 

Similar to Iranian Cyber Espionage Using LinkedIn, Facebook, Twitter to target thousands (20)

Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar
 
01 presentation-kenwillen
01 presentation-kenwillen01 presentation-kenwillen
01 presentation-kenwillen
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case study
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks6 Most Surprising SharePoint Security Risks
6 Most Surprising SharePoint Security Risks
 
Security First Safeguarding Your iOS App Against Cyber Threats.pdf
Security First Safeguarding Your iOS App Against Cyber Threats.pdfSecurity First Safeguarding Your iOS App Against Cyber Threats.pdf
Security First Safeguarding Your iOS App Against Cyber Threats.pdf
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Fundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docxFundamentals of Information Systems Security Lesson 3Malic.docx
Fundamentals of Information Systems Security Lesson 3Malic.docx
 

Recently uploaded

✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 

Iranian Cyber Espionage Using LinkedIn, Facebook, Twitter to target thousands

  • 1. NEWSCASTER – Iranian Cyber Espionage using Facebook, LinkedIn,Twitter… An iSIGHT Partners Overview Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com
  • 2. iSIGHT Partners 200+ experts, 16 Countries, 24 Languages, 1 Mission Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 2 Mission Global Reach Betheworld’sleading global cyberthreatintelligence provider,connecting securitytechnologyand operationstothebusiness.
  • 3. NEWSCASTER  Cyber-espionage campaign  Links to Iran  Targeting high and low ranking personnel in multiple countries – US, UK, Israel, Saudi Arabia, Iraq – U.S. military – Congressional personnel – Washington D.C. area journalists – Diplomatic corps – U.S. Defense contractors – Israeli Defense contractors – Members of the U.S./Israeli lobby  Utilizing social media platforms as targeting platform – Facebook – LinkedIn – YouTube – Twitter Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 3
  • 4. NEWSCASTER  Active since at least 2011  More than a dozen elaborate principal personas; many supported by the fictitious news organization NewsOnAir.org – Included at least two legitimate identities (falsified) from leading news organizations  Thomson Reuters  Fox News  More than 2,000 targets and legitimate individuals connected to the network – High probability of a vastly wider reach  Brash and complex, reliance on social engineering and spear- phishing for credential harvesting, use of malware with data exfiltration capabilities Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 4
  • 5. NEWSCASTER Personas Persona Purported Profession Known Platforms Known Connections Sandra Maler Reporter, NewsOnAir LinkedIn, Facebook, Twitter, Google 226 Adia Mitchell Reporter, NewsOnAir LinkedIn, Facebook, Twitter, Wordpress 281 Amanda Teyson Reporter, NewsOnAir LinkedIn, Facebook, Twitter, Google 310 Sara McKibben Reporter, NewsOnAir LinkedIn, Facebook Unknown Joseph Nilsson Founder, NewsOnAir LinkedIn, Facebook 231 Jane Baker (Ava T. Foster) Reporter, NewsOnAir LinkedIn 30 Mary Cole Recruiter for Defense Contractor LinkedIn, Facebook, Google 500+ Berna Achando Web Designer for Defense Contractor LinkedIn, Facebook 151 Jeann Maclkin Systems Administrator for US Navy LinkedIn, Facebook, Blogger, YouTube 500+ Alfred Nilsson Talent Acquisition for Defense Contractor LinkedIn, Facebook Unknown Josh Nilsson (Josh Furie) IT Manager for Defense Contractor LinkedIn, Facebook 130 Dorotha Baasch IT Analyst for Defense Contractor LinkedIn, Facebook Unknown Kenneth Babcock CPA and Tax Advisor for Payment Processor LinkedIn, Facebook, Google Unknown Donnie Eadense Information Systems Manager for Defense Contractor LinkedIn 118 Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 5  Interconnected  Multi-platform  Pictures taken from bystanders and the moderately famous  Young, pretty women used  Secondary personas legitimize principals  NewsOnAir.org created to legitimize multiple personas
  • 6. Elaborate Support for Personas Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 6
  • 7. NewsOnAir.org Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 7 Kimberly Gulifoyle
  • 8. NewsOnAir.Org: A Front News Agency Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 8 Fake journalists shareNewsOnAir.org links onsocialmedia networks.5 Articlereposted toNewsOnAir.org withoriginal authorship removed2Real Newsarticles from Reuters,AP, BBC, other resources.1 Links tweetedfrom @NewsOnAir2 4 Article News ByAmanda Teyson Amanda Teyson Persona Persona’s nameattachedinbyline 3 ByAmanda Teyson
  • 9. Malicious Activity  Social networking as reconnaissance tool and propagation method  Credential collection capability  Low-sophistication malware – IRC malware  Other capabilities anticipated Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 9
  • 10. Malicious Activity Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 10 Linkleads to fakelogin portal. 4 Unsuspecting target directed tocontent.6 User credentials captured, stolen.5 NEWSCASTER Network (Multiple Fake Personas) Targeted HVT approached with connection request.2 Malicious link sent to target3 HighValue TargetFriends ofHVT approached first with request.1
  • 11. IranianTies Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 11  Infrastructure  Tehran registration  “Parastoo”  Iranian content  Targeting  Tehran working hours and days
  • 12. Implications  Method is not novel  What this group lacks in technical sophistication they make up for in brashness, creativity, and patience  We infer from the length of this operation is indicative of at least marginal success  Defense requires a human touch Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 12
  • 13. NEWSCASTER SUMMARY  3+ year Cyber-espionage campaign with links to Iran  Targeting high and low ranking personnel in multiple countries– US, UK, Israel, SaudiArabia, Iraq – U.S. military – Congressional personnel – Washington D.C. area journalists – Diplomatic corps – U.S. Defense contractors – Israeli Defense contractors – Members of the U.S./Israeli lobby  Utilizing social media platforms as targeting platform – Facebook – LinkedIn – YouTube – Etc.  More than 2,000 targets and legitimate individuals caught in the net – Credential harvesting – Access to corporate and personal emails – Malware with data exfiltration capabilities Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 13
  • 14. Today’s Cyber Security Challenges CISOsfindingitdifficulttodefinesecurityROItoexecutives ShortshelflifeforCISOs Vastlyexpandingattacksurfacearea Mobile,cloud,virtualization,globalbusinessoperations Largeprotectioninvestmentsandnogoodprioritizationfilter Who,why,when,how Operationalchaos Toomanyalarms,notenoughpeople,poorprioritization “Braindead”securitytoolsthatrelyonpastevents/signatures Versesextremelyagileadversaries Severebreachescontinue… Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 14
  • 15. How CanCyberThreat Intelligence Help? 1. BeProactive 2. Shrink theProblem 3. ImprovePrioritization 4. EnhanceExecutiveCommunications 5. ConnectSecurityWithBusiness Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 15 CISORecommendation: “Useacommercialthreat intelligenceservicetodevelop informedtacticsforcurrent threats,andplanforthreats thatmayexistinthemidterm future.” RobMcMillan&KellyKavanagh TechnologyOverviewforSecurityThreatIntelligenceServiceProviders Published:16October2013
  • 16. iSIGHT Partners –WhatWe Do Cyber Crime Cyber Espionage Distributed Denial-of-Service Enterprise Hacktivism Mobile Vulnerability and Exploitation Analyst Access Global Response ThreatScape® Subscriptions ! ThreatScapeTechnologies ThreatScape API ThreatService™ Engagements BundledAnalyst Research ! Partner Integrations Threat Diagnostics Intelligence Integration Breach Diagnostics Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 16
  • 17. Formal Research Process Yields Rich, ContextualThreat Intelligence Intelligence Requirements Created Based on Clients, Sectors and Adversaries Requirements Prioritized by Analysts, Matched to Current Holdings then Passed to Research Teams Collection Planning and Tasking of Global Teams Requirements Collected by Unique Global Teams and returned to Fusion Center Processing and Exploitation To Standardize Multiple Information Sources Ready for Analysis Analysis of Information and Production of Reporting for Clients Fully fused, Corroborated, Cross- referenced and Edited Multi-source Intelligence Reporting Disseminated to Clients Client Feedback, Refinement of Intelligence Product Intelligence Requirements Requested From Client ? i Feedback & Clarification Analysis DisseminationCollection Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved 17
  • 18. HowWe Deliver: Fully Integrated Dissemination Model Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 18 Executive Summary Standards Context …The campaign is related to other Gameover Zeus analyses as it uses a similar attack infrastructure and campaign identifiers. Malicious hyperlinks within the message point to pages hosted on compromised websites that contain no visible content, but do load one JavaScript file: hxxp://crazytraintour.com.ar/jie3Qd6E/js.js Executives Risk, Intel, Fraud SOC Incident Response Tech Security Controls Standard Formats Consumers Technology Partners ThreatScape® API MySIGHT Portal Email TechnologiesThreatScape PGPHTML TXT XML JSON STIX PDF CSV Data On April 10, 2012, iSIGHT Partners observed a mass mailing targeting chief financial officers (CFOs) with a fraudulent e-mail titled, "CFO Bulletin Update.” Size: 305704 bytes MD5: 5bda9aea96360d9260d7cf38b416af8c Digital Signature: This file is digitally signed by 'nYZbvA3YL8XjBMx’ Certificate Validity: 04/10/2012to 01/01/2040 Timestamp: 2010:11:01 22:56:53+01:00 Company Name: Microsoft Corporation File Description: Windows DiskDiagnostic User Resolver File Version: 6.1.7600.16385 (win7_rtm.090713-1255) Internal Name: DFDWiz.exe ...
  • 19. At the Ready to Help StephenWard: sward@isightpartners.com www.isightpartners.com Request more information: info@isightpartners.com Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 19
  • 20. iSIGHT Partners 200+ experts, 16 Countries, 24 Languages, 1 Mission