F-Secure cyber security experts: The target is the banking/finance sector. The motivations are three: data theft, data integrity and sabotage, and direct financial theft.
The cyber security experts: Targets are government and critical infrastructures, as oil and gas. But this happened before CYBERCOM strike. There are risks of back-and-forth cyber warfare.
Trend Micro cyber security experts: The Iranian state-sponsored APT is using new tools and payloads, which indicates that it’s continuously developing the schemes.
The cyber security expert, Marco Ramilli, analyzed it to match the clues e find if Iranian state-sponsored hackers are behind the operation. Something says Yes, something diverge.
Palo Alto cyber security experts: The APT exploited a recently patched remote code execution vulnerability to upload a variety of tools. From Mimikatz to HyperBro.
Yoroi-Cybaze's Security Annual Report 2018 with threats and attacks that bypassed targets security measures. Data have been collected directly from the customer side.
The cyber security experts: The APT’s malicious code implements a custom protocol that allows traffic to be funneled between a source and a destination IP address.
Published on 3 Telegram channels many leaks on Tehran’s APTs. Clearky cyber security experts: They are authentic and will minimize the potential attacks risks in the next few months.