U.S. Cost Guard issues a Safety Alert with recommended cyber security best practices. It’s seem the ICT extension of the Iranian aggressive campaign in the Hormuz Strait.
The cyber security experts: Targets are government and critical infrastructures, as oil and gas. But this happened before CYBERCOM strike. There are risks of back-and-forth cyber warfare.
Trend Micro cyber security experts: The Iranian state-sponsored APT is using new tools and payloads, which indicates that it’s continuously developing the schemes.
The cyber security expert, Marco Ramilli, analyzed it to match the clues e find if Iranian state-sponsored hackers are behind the operation. Something says Yes, something diverge.
Last chapter of the story of the two groups, which share roots and purpose of recreating the Caliphate. Bin Laden’s network (mastermind) and Daesh (armed wing) point to Khorasan-Kashmir.
Chapter 7 of a study on the history of the two groups, to understand why they share same roots and purposes, aimed at recreating the Caliphate. Shiites and Sunnis, Iran and Daesh’s operational strategy.
Sixth chapter of a study on the history of the two groups, to understand why they share the same roots and purposes, aimed at recreating the Caliphate. Saudi Arabia, Qatar and the moderate alternative to jihad.
Published on 3 Telegram channels many leaks on Tehran’s APTs. Clearky cyber security experts: They are authentic and will minimize the potential attacks risks in the next few months.
Fifth chapter of a study on the history of the two groups, to understand why they share the same roots and purposes aimed at recreating the Caliphate. Al-Baghdadi, Syria and the Islamic State.
The cyber security experts: There are many similarities on TTPs, targets and purposes. The credential harvesting could be complementary to the WebMask project on DNS Hijack.