Breaking News

KIOXIA announced new version for their SSD Utility v6.0.0.22 TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Microsoft Disrupts Cyberattacks Associated with Iran

Microsoft Disrupts Cyberattacks Associated with Iran

Enterprise & IT Mar 27,2019 0

Court documents were unsealed detailing work Microsoft’s Digital Crimes Unit has executed to disrupt cyberattacks from a threat group the company calls Phosphorus – also known as APT 35, Charming Kitten, and Ajax Security Team – which is widely associated with Iranian hackers.

Microsoft's court case against Phosphorus, filed in the U.S. District Court for Washington D.C., resulted in a court order enabling Microsoft last week to take control of 99 websites the group uses to conduct its hacking operations so the sites can no longer be used to execute attacks.

Microsoft’s Digital Crimes Unit (DCU) and the Microsoft Threat Intelligence Center (MSTIC) have been tracking Phosphorus since 2013. Its activity is usually designed to gain access to the computer systems of businesses and government agencies and steal sensitive information. Its targets also include activists and journalists – especially those involved in advocacy and reporting on issues related to the Middle East.

Phosphorus typically attempts to compromise the personal accounts of individuals through a technique known as spear-phishing, using social engineering to entice someone to click on a link, sometimes sent through fake social media accounts that appear to belong to friendly contacts. The link contains malicious software that enables Phosphorus to access computer systems.

Microsoft says that Phosphorus also uses a technique whereby it sends people an email that makes it seem as if there’s a security risk to their accounts, prompting them to enter their credentials into a web form that enables the group to capture their passwords and gain access to their systems.

Both attack methods employ the use of websites that incorporate the names of well-known brands, like Microsoft, to appear authentic. Websites registered and used by Phosphorus include, for example, outlook-verify.net, yahoo-verify.net, verification-live.com, and myaccount-services.net.

The action Microsoft executed last week enabled the company to take control of 99 websites and redirect traffic from infected devices to its Digital Crime Unit’s sinkhole. The intelligence Microsoft collects from this sinkhole will be added to MSTIC’s existing knowledge of Phosphorus and shared with Microsoft security products and services to improve detections and protections for our customers.

Throughout the course of tracking Phosphorus, Microsoft worked with a number of other technology companies, including Yahoo, to share threat information and jointly stop attacks.

Tags: cybercrimeHackingMicrosoft
Previous Post
Office Depot to Pay $35 Million to Settle FTC Allegations That it Deceived PC Users
Next Post
Samsung Touts High Durability of the Galaxy Fold’s Display

Related Posts

  • NVIDIA Studio Lineup Adds RTX-Powered Microsoft Surface Laptop Studio 2

  • Samsung and Microsoft Unveil First On-Device Attestation Solution for Enterprise

  • Introducing Xbox Game Pass Core, Coming This September

  • Announcing the next wave of AI innovation with Microsoft Bing and Edge

  • MSI has been hacked, be warned about where you download files

  • Microsoft Announces Security Copilot AI

  • Microsoft breaks new ground in healthcare with the next evolution of AI

  • ChatGPT is now available in Azure OpenAI Service

Latest News

KIOXIA announced new version for their SSD Utility v6.0.0.22
Enterprise & IT

KIOXIA announced new version for their SSD Utility v6.0.0.22

TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES
Enterprise & IT

TERRAMASTER RELEASES NEW CENTRALIZED BACKUP, A BACKUP SOLUTION FOR WINDOWS DESKTOPS AND SERVERS, FILE SERVERS AND VIRTUAL MACHINES

LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops
Enterprise & IT

LG Display Expands IT Industry Presence with Mass-Production of 17-inch Foldable OLED Panel for Laptops

BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards
PC components

BIOSTAR Unveils Next-Gen H610MS and H610MHD D5 Motherboards

Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI
Enterprise & IT

Amazon and Anthropic Announce Strategic Collaboration to Advance Generative AI

Popular Reviews

Pioneer BDR-S13U-X Blu-Ray Recorder

Pioneer BDR-S13U-X Blu-Ray Recorder

Pioneer BDR-X13U-S

Pioneer BDR-X13U-S

Pioneer BDR-XD08UMB-S External Blu-Ray Recorder

Pioneer BDR-XD08UMB-S External Blu-Ray Recorder

Arctic Liquid Freezer II 360 Α-RGB

Arctic Liquid Freezer II 360 Α-RGB

Surefire KINGPIN M2 Keyboard

Surefire KINGPIN M2 Keyboard

Verbatim External 4K Slimline Blu-Ray Recorder

Verbatim External 4K Slimline Blu-Ray Recorder

Samsung 970 EVO Plus 2TB NVME SSD

Samsung 970 EVO Plus 2TB NVME SSD

Crucial X8 4TB PortableSSD

Crucial X8 4TB PortableSSD

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed