Security

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals


Government-backed Iranian actors allegedly set up dozens of fake recruiting websites and social media accounts to hunt down double agents and dissidents suspected of collaborating with the nation’s enemies, including Israel.

The campaign targeted Farsi speakers living in and outside of Iran, began as early as 2017 and lasted until at least March this year.

The threat intel team at Google-owned Mandiant uncovered the activity and detailed it in a report published Wednesday.

In that document, Mandiant’s Ofir Rozmann, Asli Koksal, and Sarah Bock offered a " high confidence" assessment that the operation was conducted on behalf of Iran's regime, and noted a "weak overlap" between this cyber-snooping job and APT42 - a cyber unit affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC) accused of hacking Donald Trump's presidential campaign.

Whoever ran the campaign used several social media accounts on X and Virasty, an Iranian version of X, to promote more than 35 fake job recruiting websites containing content written in Farsi. The posts included job offers and Israel-related images and lures such as the Israeli flag and major landmarks, content used to lure Farsi speakers into thinking they were closer to their dream gig.

One Xeet, translated from Farsi, said:

In the past year, we were able to attract hundreds of information and cyber professionals and achieve unique successes at the global level.

If you have information and cyber work experience, join us.

Clicking the link in the Xeet sent users to website for a phony human resources firm looking to "recruit employees and officers of Iran's intelligence and security organizations."

The sites encouraged job seekers with "documented experience and resume[s]" in infosec and cybersecurity to apply. "Excellent salary" and privacy protection were advertised as part of the package.

One of the sites Mandiant's threat hunters spotted - beparas[.]com – was tailored to both desktop and mobile devices. The site contained many elements designed to make it look like a legitimate Israel-based operation.

The fake recruiting websites encouraged users to complete a form recording their name, birth date, email, home address, education, and professional experience. The attackers scooped that info, potentially meaning Iran scored dissidents’ personal information.

That’s an obvious data privacy problem. The scam could also create real-world safety issues as the IRGC has made behind assassination attempts and other physical threats against its enemies.

As the Mandiant crew noted: "The collected data, such as addresses, contact details, as well as professional and academic experience, might be leveraged in future operations against the targeted individuals."

Iran ramps up malicious activity

This latest report comes as Iran has ramped up its cyberattacks against US and foreign targets.

Yesterday, Microsoft revealed a series of attacks targeting the satellite, communications equipment, oil and gas, and federal and state government sectors in the US and the United Arab Emirates.

According to Redmond, a different Iran government-linked group also affiliated with the IRGC was responsible for these intrusions, during which the Peach Sandstrom crew deployed a new, custom backdoor dubbed Tickler.

Additionally, US government agencies said yet another Iranian cyberspy crew, Pioneer Kitten, has this month attacked US and foreign networks to steal sensitive data and deploy ransomware.

Ransomware appears to be a side hustle for the crew, which has worked with ransomware-as-a-service gangs NoEscape, Ransomhouse, and ALPHV/BlackCat, according to the FBI, CISA, and US Department of Defense.

The data-theft part, however, which usually involves stealing sensitive technical information from defense orgs in the US, Israel and Azerbaijan, is likely conducted on behalf of Tehran, we're told. ®

Send us news
2 Comments

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud