MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
hackers
Search

A mystery agent is doxing Iran’s hackers and dumping their code

Sunday April 21, 2019. 12:15 PM , from Ars Technica
Enlarge (credit: Lino Mirgeler/picture alliance via Getty Images)
Nearly three years after the mysterious group called the Shadow Brokers began disemboweling the NSA's hackers and leaking their hacking tools onto the open Web, Iran's hackers are getting their own taste of that unnerving experience. For the last month, a mystery person or group has been targeting a top Iranian hacker team, dumping its secret data, tools, and even identities onto a public Telegram channel—and the leak shows no signs of stopping.
Since March 25, a Telegram channel called Read My Lips or Lab Dookhtegan—which translates from Farsi as 'sewn lips'—has been systematically spilling the secrets of a hacker group known as APT34 or OilRig, which researchers have long believed to be working in service of the Iranian government. So far, the leaker or leakers have published a collection of the hackers' tools, evidence of their intrusion points for 66 victim organizations across the world, the IP addresses of servers used by Iranian intelligence, and even the identities and photographs of alleged hackers working with the OilRig group.
'We are exposing here the cyber tools (APT34 / OILRIG) that the ruthless Iranian Ministry of Intelligence has been using against Iran's neighboring countries, including names of the cruel managers, and information about the activities and the goals of these cyber-attacks,' read the original message posted to Telegram by the hackers in late March. 'We hope that other Iranian citizens will act for exposing this regime's real ugly face!'
Read 10 remaining paragraphs | Comments
https://arstechnica.com/?p=1494015
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Fri 19 - 11:06 CEST