۱۳۹۷ شهریور ۱۸, یکشنبه

Iran: soupçon d'opération de cybersurveillance sur smartphones · Par Le Figaro.fr avec AFP




Iran: soupçon d'opération de cybersurveillance sur smartphones
·         Par  Le Figaro.fr avec AFP 

·         Mis à jour le 07/09/2018 à 20:56 

·         Publié le 07/09/2018 à 20:50
Le spécialiste israélien de la cybersécurité Check Point a révélé aujourd'hui une opération de cybersurveillance menée sur quelques centaines de citoyens iraniens, via des logiciels malveillants implantés dans leurs smartphones, soupçonnant l'Irand'être à l'origine de l'opération. "C'est la première fois à notre connaissance qu'une analyse technique permet de mettre en exergue le fait qu'un gouvernement a mené une campagne de cyberespionnage sur des smartphones avec une population ciblée", déclare Thierry Karsenti, vice-président Europe (pour la partie technique), à l'AFP.
L'entreprise n'est pas sûre que l'Iran soit à l'origine de cette cybersurveillance, mais elle se base sur la nature des personnes ciblées, le type d'applications et "l'infrastructure de l'attaque". Dans le numérique, "vous ne pouvez jamais relier à l'origine à 100%", note Thierry Karsenti. Check Point a établi que depuis 2016, en Iran, des personnes soutenant le groupe Etat islamique, ainsi que des personnes d'origine kurdes et turques, ont été la cible d'une cyberattaque permettant de collecter toutes les données liées à l'utilisation de leur smartphone: leurs conversations orales ou écrites, quelle que soit la messagerie utilisée, leurs déplacements, leurs photos et vidéos, etc.
Leurs téléphones sont infiltrés au moyen d'applications à télécharger, en apparence inoffensives, telle qu'une fausse version d'une messagerie ou de l'agence kurde d'information, ou encore une application offrant des fonds d'écran représentant le groupe Etat islamique. "Les smartphones sont les mouchards idéaux pour faire de la cybersurveillance", explique Thierry Karsenti. "Contrairement aux ordinateurs, ils vous suivent partout, ils sont quasiment tout le temps allumés, ils ont beaucoup de capteurs, un appareil photo et vidéo de chaque côté, un micro, un GPS embarqué... et c'est un outil communiquant."



https://www.bleepingcomputer.com/news/security/domestic-kitten-apt-operates-in-silence-since-2016/



Domestic Kitten APT Operates in Silence Since 2016
By 

·         September 7, 2018

·         10:46 AM

·         0
An extensive surveillance operation targets specific groups of individuals with malicious mobile apps that collect sensitive information on the device along with surrounding voice recordings.
Researchers with CheckPoint discovered the attack and named it Domestic Kitten. The targets are Kurdish and Turkish natives, and ISIS supporters, all Iranian citizens.
The data collected by Domestic Kitten from compromised phones includes a wealth of information, as detailed below:
  • contact lists
  • call records
  • text and multimedia messages
  • browser history and bookmarks
  • geographical location
  • photos
  • recordings of nearby conversations
  • list of installed apps
  • clipboard content
  • data on external storage
Malicious code steals clipboard content
The operation may be active since 2016
The threat actor uses three mobile applications that are of interest to the potential victims: a wallpaper changer, an app purporting to offer news updates from ANF (a legitimate Kurdish news website), and a fake version of the Vidogram messaging app.
The wallpaper changer is designed to lure victims by offering them ISIS-related pictures to set as the screen background.
Wallpaper changer app
The certificate used for signing all three apps, a requirement installing them on an Android device, was issued in 2016. This suggests that the campaign escaped detection for two years.
To exfiltrate data from a compromised device the apps use HTTP POST requests to the command and control (C2) server available at newly registered domains.
One of the apps also contacts a website (firmwaresystemupdate[.]com) that resolved to an Iranian IP address initially but changed to a Russian address.
All data delivered to the C2 is encrypted with the AES algorithm and can be decrypted with a device ID the attacker creates for each victim.
Domestic Kitten Makes Thousands of Collateral Victims
CheckPoint's analysis shows that 240 users have fallen victim to operation Domestic Kitten. More than 97% of them are Iranians, the rest being victims in Afghanistan, Iraq and Great Britain.
However, due to the comprehensive nature of the surveillance of the campaign, private information of thousands of individuals has been compromised.
They are not necessarily the object of the surveillance, but collateral victims whose details were leaked from contact lists or conversations with the targets.
Clues point to state-backed Iranian APT
In a report shared with BleepingComputer, the researchers say that the operator of Domestic Kitten remains unconfirmed, but based on the political conditions in the region they believe Iranian government entities are behind it.
"Indeed, these surveillance programs are used against individuals and groups that could pose a threat to the stability of the Iranian regime. These could include internal dissidents and opposition forces, as well as ISIS advocates and the Kurdish minority settled mainly in Western Iran," CheckPoint explains.
They say that the nature of the targets, the apps and the attack infrastructure are clues that support the theory of an Iranian origin.

·          

·          

·          
Ionut Ilascu is freelancing as a technology writer with a focus on all things cybersecurity. The topics he writes about include malware, vulnerabilities, exploits and security defenses, as well as research and innovation in information security. His work has been published by Bitdefender, Netgear, The Security Ledger and Softpedia.


مطالب   مارا در وبلاک خط سرخ  مقاومت ودر توئیتربنام @bahareazady   دنبال کنید

پیش بسوی قیام  سراسری ، ما بر اندازیم#   شهرهای ایران   اعتصاب # تظاهرات# 


 سرنگونی #  اتحادوهمبستگی     مرگ_بر_دیکتاتور   #IranRegimeChange