Skip to main content

A Mystery Agent Is Doxing Iran's Hackers and Dumping Their Code

http://bit.ly/2UJ3tIG NEARLY THREE YEARS after the mysterious group called the Shadow Brokers began disemboweling the NSA's hackers and leaking their hacking tools onto the open web, Iran's hackers are getting their own taste of that unnerving experience. For the last month, a mystery person or group has been targeting a top Iranian hacker team, dumping their secret data, tools, and even identities onto a public Telegram channel—and the leak shows no signs of stopping. Since March 25, a Telegram channel called Read My Lips or Lab Dookhtegan—which translates from Farsi as "sewn lips"—has been systematically spilling the secrets of a hacker group known as APT34 or OilRig, which researchers have long believed to be working in service of the Iranian government. So far, the leaker or leakers have published a collection of the hackers' tools, evidence of their intrusion points for 66 victim organizations across the world, the IP addresses of servers used by Iranian intelligence, and even the identities and photographs of alleged hackers working with the OilRig group. "We are exposing here the cyber tools (APT34 / OILRIG) that the ruthless Iranian Ministry of Intelligence has been using against Iran’s neighboring countries, including names of the cruel managers, and information about the activities and the goals of these cyber-attacks," read the original message posted to Telegram by the hackers in late March. "We hope that other Iranian citizens will act for exposing this regime’s real ugly face!" The exact nature of the leaking operation and the person or people behind it are anything but clear. But the leak seems intended to embarrass the Iranian hackers, expose their tools—forcing them to build new ones to avoid detection—and even compromise the security and safety of APT34/OilRig's individual members. "It looks like either a disgruntled insider is leaking tools from APT34 operators, or it’s a Shadow Brokers–esque sort of entity interested in disrupting operations for this particular group," says Brandon Levene, head of applied intelligence at the security firm Chronicle, which has been analyzing the leak. "They do seem to have something out for these guys. They’re naming and shaming, not just dropping tools." As of Thursday morning, the Read My Lips leakers continued to post names, photos, and even contact details of alleged OilRig members to Telegram, though WIRED couldn't confirm that any of the identified men were actually connected to the Iranian hacker group. "From now on, we will expose every few days the personal information of one of the cursed staff and secret information from the vicious Ministry of Intelligence so to destroy this betraying ministry," a message posted by the leakers on Thursday read. Chronicle's analysts confirm that at least the hacking tools released are in fact OilRig's hacking tools, as the leakers claimed. They include, for instance, programs called Hypershell and TwoFace, designed to give the hackers a foothold on hacked web servers. Another pair of tools called PoisonFrog and Glimpse appear to be different versions of a remote-access Trojan called BondUpdater, which researchers at Palo Alto Networks have observed OilRig using since last August. Beyond leaking those tools, the Read My Lips leaker also claims to have wiped the contents of Iranian intelligence servers, and posted screenshots of the message it says it left behind, like the one shown below.

Comments

Popular posts from this blog

Friends in all the wrong places

https://ift.tt/2BVSIXZ Striding past the glistening rows of duty-free liquor, watches and perfume, the two international travellers moved like men who could fight. Richard ''Gelly'' Gelemanovic had broad shoulders and a confident gait, while his companion, convicted heroin trafficker Amad ''Jay'' Malkoun, had a physique honed during his 16-year stint in prison. It was July 3, 2003, and Malkoun was recently out of jail, having gained public notoriety after being charged in 1988 as a key player in the state's biggest drug syndicate, which had been busted with $5.5 million of heroin. Amad 'Jay' Malkoun was described by police as 'a powerful standover man'. The federal police who were secretly watching Malkoun at Melbourne's international airport described him in a report as ''a powerful stand-over man … actively involved in the Melbourne drug trade''. The profession of his travelling companion, the man Jay called '

Kim Constable – Irish leader of NXIVM – jokes about working out in prison; shows results of badass workouts

http://bit.ly/2WTRg0f Kim Constable, 39 – one of Sara Bronfman’s ‘girls’ – is the leader of NXIVM in Ireland. She lives in Belfast and is also the leader of Rainbow Cultural Garden there. According to a source, she recruited at least one underage teen girl who was almost shipped to the USA with Allison Mack for the branding iron of DOS. Fortunately, the teen girl – with her mother’s help – escaped at the last minute. But not before there was a little violence and the threat of something truly sinister – which frightened the girl. I will tell more of that story later. For now, let us say hello to Kim. In addition to her NXIVM work, she is a vegan body-builder and sells courses on how to look like her. Her husband is a famous ex-athlete, Ulster rugby player Ryan Constable (46) who owns a sports management company. They have four children: Corey (12), Kai (11), Miya (8) and Jack (6). At one time, they all slept in the same 18-foot bed together. I am not clear where the Rainbow nannies sle