haman10
ELITE MEMBER
- Joined
- Apr 29, 2013
- Messages
- 9,706
- Reaction score
- -2
- Country
- Location
I've previously made threads about iranian cyber army their operations and their power .
but now is the time for nationalist private hacking groups to rise up :
AJAX security team is one of them with its latest OP : Saffron rose .
the operation succeeded in exploiting 2000 IDs of VIP american politicians , military companies , banks .
the hacking group is believed to be consisted of 5-10 hackers with "HUrr!c4nE!" and "Cair3x" as their leader .
FireEye published a report titled “Operation Saffron Rose” to document the activities of the Iranian hacking group named Ajax Security Team
According to a recent report titled “Operation Saffron Rose” published bycybersecurity company FireEye, a group called the Ajax Security Team is the principal Iranian hacking group, it is responsible for different espionage campaigns on custom-built malicious software.
“This group, which has its roots in popular Iranian hacker forums such as Ashiyane and Shabgard, has engaged in website defacements since 2010. However, by 2014, this group had transitioned to malware-based espionage, using a methodology consistent with other advanced persistent threats in this region.
It is unclear if the Ajax Security Team operates in isolation or if they are a part of a larger coordinated effort. We have observed this group leverage varied social engineering tactics as a means to lure their targets into infecting themselves with malware. ” states the FireEye Blog post.
The Iranian hacking groups are considered by US a very aggressive threat, they conducted numerous cyber attacks, sabotage and cyber espionage are their principal activities according experts at FireEye.
In one of the recent attacks, the hackers of the Ajax Security Team infected computers of U.S. with spear phishing attacks, the malicious links to an infected bogus website (aeroconf2014.org) were sent by the attackers via email orsocial media messages.
According to FireEye the Ajax Security Team has deployed a malware, dubbed“Stealer”, which has the classic features of spyware software, it is able to syphon data, record keystrokes and grab screen shots.
Once collected, the information is encrypted and temporarily stored it on the victim’s machine, later it is sent by Stealer to the C&C server.
The firm has discovered that, ever since Stuxnet, Iran-based hacking groups are growing in sophistication and evolving into full-blown advanced persistent threat (APT) actors.
The Ajax Security Team is at issue here, a group that began life performing hacktivist-style website defacements before 2010. But as of 2014, it has transitioned to stealthy, malware-based espionage activity. Evidence in FireEye's report suggests that Ajax’s methodologies became more consistent with other APT actors in the Iranian region following cyber events against Iran in the late 2000s.
“There is an evolution underway within Iranian-based hacker groups that coincides with Iran’s efforts at controlling political dissent and expanding its offensive cyber capabilities,” said Nart Villeneuve, senior threat intelligence researcher at FireEye, in a statement. “We have witnessed not just growing activity on the part of Iranian-based threat actors but also a transition to cyber-espionage tactics. We no longer see these actors conducting attacks to simply spread their message, instead choosing to conduct detailed reconnaissance and control targets’ machines for longer-term initiatives.”
The targets of Operation Saffron Rose include Iranian dissidents and US defense organizations. And, FireEye Research Labs said that it has recently observed the Ajax Security Team conducting multiple cyber-espionage operations against companies in the defense industrial base (DIB) within the US, as well as targeting local Iranian users of Proxifier or Psiphon, which are anti-censorship technologies that bypass Iran’s Internet filtering system. The firm uncovered that Ajax has become the first Iranian hacking group known to use custom-built malicious software to launch espionage campaigns.
========================================
previously a 22yr old iranian hacker , hacked the bejesus outta a very famous US cyber security com"COMODO"
i'm sure many of u have it's "firewall" installed on your computer
Free Antivirus | Internet Security and SSL Certificate from Comodo
Comodo confirms it was attacked by an iranian national :
the teenage iranian then explained how he hacked their servers and why :
this is the constant response from iranians to the stuxnet ,and according to the security firms , not only they have not slowed down but also increased significantly in sophistication and scale .
thats what u get i suppose