banner



Microsoft Exchange targeted by threat actors connected to Iranian government

A articulation security informational claims that an advanced persistent threat (APT) group associated with the Iranian government is threatening multiple victims from U.Southward. critical infrastructure sectors. The grouping is said to take exploited a Microsoft Exchange vulnerability since at least October 2022 and a Fortinet vulnerability since at least March 2022. These attacks aim to gain access that can be leveraged for data exfiltration or encryption, ransomware, and extortion.

The informational is the result of a joint attempt by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United kingdom'southward National Cyber Security Eye (NCSC). All of these bodies assess that the APT grouping in question is associated with the Iranian government. The ACSC has also adamant that the APT group has taken advantage of the same Microsoft Exchange vulnerability in Australia.

The full report breaks down the tactics and techniques used by the APT actors. It likewise runs through a timeline of attacks, when attacks were detected, and suggested mitigation steps to reduce the risk of compromise by the threat.

"The FBI, CISA, ACSC, and NCSC urge critical infrastructure organizations to apply the recommendations listed in the Mitigations section of this advisory to mitigate hazard of compromise from Iranian government-sponsored cyber actors," reads the advisory. It also directs to an overview of Iranian cyber threats.

Source: https://www.windowscentral.com/microsoft-exchange-targeted-threat-actors-connected-iranian-government

Posted by: montgomerytheactiones.blogspot.com

0 Response to "Microsoft Exchange targeted by threat actors connected to Iranian government"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel