Threat analysis by The RabitaNoor (RBTN) Cyber Research Center
The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.
The document is a product of the RBTN - CYOI Pulpit
Photo by Yeshi Kangrang
The CyberHub Podcast, hosted by CEO James, reports on August 29, 2024, about critical infrastructure threats from Iranian cyber activities. Iran, led by a terror organization, deploys a custom backdoor attack targeting the US, UAE, and Israel, attributed to the group Peach Sandstorm with malware named Tickler. The attack targets satellite communications, government, and oil sectors. Microsoft and Google Cloud highlight password spraying and ransomware activities aimed at defense, education, and government sectors in the US and Australia. The Iranian Revolutionary Guard is implicated, linked to geopolitical strategies, supporting proxies, and stealing intellectual property. FBI, DHS, and CISA monitor Iran's use of decentralized ransomware gangs. Vulnerabilities in Beckhoff Automation's TwinCAT and PSD systems, and Hitachi Energy's MicroSCADA XCI product, require immediate patching. A zero-day vulnerability in CCTV cameras is exploited for a crypto miner botnet. A malfunction at the Dutch Defense Ministry's data center disrupts civilian flights and emergency services. Daniel Ryan, a former core infrastructure engineer, is arrested for cyberattack and blackmail. CrowdStrike reports a $60 million impact on its sales pipeline due to an update issue but maintains strong financial results.
Timestamp: 2024-08-29
Title: Iran Targets Critical Infrastructure Colludes W Ransomware Grid Vulnerable Crowdstrike News 20250303
Severity: High
The cyber incident involves the Iranian state-sponsored group Peach Sandstorm, deploying custom backdoor malware named Tickler, targeting critical infrastructure in the US, UAE, and Israel. The Iranian Revolutionary Guard is implicated, using decentralized ransomware gangs to obscure activities. The attack focuses on satellite communications, government, and oil sectors, with motivations linked to geopolitical strategies and intellectual property theft. The incident highlights vulnerabilities in Beckhoff Automation's TwinCAT and PSD systems, and a zero-day in CCTV cameras exploited for a crypto miner botnet.
Adversary: Iranian state-sponsored group Peach Sandstorm
Motivation: Geopolitical strategies, intellectual property theft
Sophistication: High
TTPs:
Capability: Deployment of custom backdoor malware and ransomware
Tools: Tickler malware
Evasion: Use of decentralized ransomware gangs
Description: Targeting satellite communications, government, and oil sectors
Botnets: Crypto miner botnet
Targets: Organizations in the US, UAE, and Israel
Industry: Satellite communications, government, oil
Assets: Critical infrastructure systems
Data at Risk: Intellectual property
Impact: High