AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Peach Sandstorm: the persistent threat of iranian state actors

The sophisticated cyber-espionage techniques used by Peach Sandstorm threaten global security

Microsoft has warned of a global cyber-espionage campaign led by an Iranian state actor called Peach Sandstorm. Using password attacks and exploiting vulnerabilities, they have targeted industries such as defense and pharmaceuticals. Microsoft recommends strengthening your defenses and implementing multi-factor authentication (MFA) to prevent such attacks. Iranian actors are a persistent threat to cyber security. Prevention is essential.

This pill is also available in Italian language

Microsoft recently issued a warning regarding a global cyber-espionage campaign led by an Iranian state actor known as Peach Sandstorm, or Holmium. The campaign has been successful in targeting sectors such as defense, pharmaceuticals and the space industry. According to Microsoft's Threat Intelligence team, this cyber offensive has been active since February and is based on a series of password spray attacks, through which attempts are made to authenticate in thousands of environments in order to exfiltrate data to support state interests Iranian.

Attack methods and APT activities

The password spray attack is a form of brute-force attack used by cybercriminals to gain unauthorized access to user accounts and systems. The Peach Sandstorm APT used a combination of publicly available and customized tools to conduct various tasks, including reconnaissance, persistence and lateral movement. The campaign demonstrated more sophisticated tactics, techniques and procedures (TTPs) than Peach Sandstorm has used in the past, with attacks conducted from Tor IP addresses and the use of a “go-http-client” user agent. The threat actor leveraged tools like AzureHound and Roadtools for reconnaissance, leveraging Azure resources to ensure persistence.

Additional attack methods and recommended countermeasures

In addition to password spray attacks, Peach Sandstorm attempted to exploit known remote code execution (RCE) vulnerabilities in applications such as Zoho ManageEngine and Atlas Confluence to gain initial access to systems. After compromising a target, the threat actor used various tactics, including using AnyDesk for remote monitoring and management, Golden SAML attacks to bypass authentication, and custom tools such as EagleRelay for traffic routing. Microsoft advised organizations to strengthen their defenses, reset passwords, revoke session cookies and implement multi-factor authentication (MFA). Additionally, it is critical to maintain strong credential hygiene and monitor identity risks.

Persistent threats from iranian actors

According to the U.S. Department of the Treasury, Iranian threat actors are combining offensive network operations with message manipulation to influence the perception and behavior of targets. Recently, the US Cyber Command revealed that Iranian state-sponsored actors had exploited a vulnerability in ManageEngine to attack a US aviation organization. This is just one of many cases that demonstrate that Iranian threat actors are a worryingly persistent threat to cybersecurity. It is essential that organizations take appropriate security measures to defend against such attacks, including using passwordless authentication methods and protecting endpoints with multi-factor authentication.

Follow us on Facebook for more pills like this

09/16/2023 13:15

Editorial AI

Last pills

Cyber attack in Indonesia: the new Brain Cipher ransomware brings services to their kneesNew ransomware hits Indonesia: learn how Brain Cipher crippled essential services and the techniques used by hackers

Patelco Credit Union: security incident halts customer services in CaliforniaService disruption and customer frustration: Patelco Credit Union works to resolve security incident

Cyber attack on TeamViewer: immediate response and investigations underwayStrengthened security measures and international collaborations to counter the cyber threat

Polyfill JS supply chain attack: what happenedA detailed analysis of the cyber attack that compromised a library essential for JavaScript compatibility in browsers