Threat analysis by The RabitaNoor (RBTN) Cyber Research Center

Iran Targets Critical Infrastructure Colludes W Ransomware Grid Vulnerable Crowdstrike News 20250303

The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.

The document is a product of the RBTN - CYOI Pulpit


Main Image

Photo by Yeshi Kangrang


Document Summary

The CyberHub Podcast, hosted by CEO James, reports on August 29, 2024, about critical infrastructure threats from Iranian cyber activities. Iran, led by a terror organization, deploys a custom backdoor attack targeting the US, UAE, and Israel, attributed to the group Peach Sandstorm with malware named Tickler. The attack targets satellite communications, government, and oil sectors. Microsoft and Google Cloud highlight password spraying and ransomware activities aimed at defense, education, and government sectors in the US and Australia. The Iranian Revolutionary Guard is implicated, linked to geopolitical strategies, supporting proxies, and stealing intellectual property. FBI, DHS, and CISA monitor Iran's use of decentralized ransomware gangs. Vulnerabilities in Beckhoff Automation's TwinCAT and PSD systems, and Hitachi Energy's MicroSCADA XCI product, require immediate patching. A zero-day vulnerability in CCTV cameras is exploited for a crypto miner botnet. A malfunction at the Dutch Defense Ministry's data center disrupts civilian flights and emergency services. Daniel Ryan, a former core infrastructure engineer, is arrested for cyberattack and blackmail. CrowdStrike reports a $60 million impact on its sales pipeline due to an update issue but maintains strong financial results.

Analysis

Overview

Timestamp: 2024-08-29

Title: Iran Targets Critical Infrastructure Colludes W Ransomware Grid Vulnerable Crowdstrike News 20250303

Severity: High

The cyber incident involves the Iranian state-sponsored group Peach Sandstorm, deploying custom backdoor malware named Tickler, targeting critical infrastructure in the US, UAE, and Israel. The Iranian Revolutionary Guard is implicated, using decentralized ransomware gangs to obscure activities. The attack focuses on satellite communications, government, and oil sectors, with motivations linked to geopolitical strategies and intellectual property theft. The incident highlights vulnerabilities in Beckhoff Automation's TwinCAT and PSD systems, and a zero-day in CCTV cameras exploited for a crypto miner botnet.

Adversary

Adversary: Iranian state-sponsored group Peach Sandstorm

Motivation: Geopolitical strategies, intellectual property theft

Sophistication: High

TTPs:

Capability

Capability: Deployment of custom backdoor malware and ransomware

Tools: Tickler malware

Evasion: Use of decentralized ransomware gangs

Infrastructure

Description: Targeting satellite communications, government, and oil sectors

Botnets: Crypto miner botnet

Victim Profile

Targets: Organizations in the US, UAE, and Israel

Industry: Satellite communications, government, oil

Assets: Critical infrastructure systems

Data at Risk: Intellectual property

Impact: High

References