LONDON: Facebook has blocked a cyberespionage campaign by Iranian hackers who sought to implant surveillance software into the devices of US, British and European military personnel.
The social network said a group of Iranian hackers known as Tortoiseshell created fake personas such as defense employees and recruiters in order to trick genuine members of the military and defense industries into following malicious links.
If those links were followed, surveillance software would have been planted into their device, potentially revealing confidential information about the military.
The campaign, which has been running since 2020, targeted around 200 people in the military, defense and aerospace industries, Facebook said, adding that it was âprimarily in the US, and to a lesser extent in the UK and Europe.â
The social media giant said part of the malware deployed by the hackers was developed by Mahak Rayan Afraz, an IT company in Tehran âwith ties to the Islamic Revolutionary Guard Corps.â
Mike Dvilyanski, Facebookâs head of cyberespionage investigations, told the Financial Times: âJust the level of investment into the reconnaissance and social engineering phases has all the hallmarks of well-resourced and persistent behaviour that weâve come to expect from more sophisticated advanced persistent threat actors that we track.â
Earlier this week, it was revealed that Iranian operatives were impersonating academics from Londonâs School of Oriental and African Studies in an attempt to reach Middle East experts and Iranian dissidents.Â
Amin Sabeti, executive director of the Digital Impact Lab, told Arab News that these kinds of campaigns are familiar territory for hackers working on behalf of Tehran. âItâs the same pattern that Iranian state-backed hackers have been following for years,â he said.Â
Iranâs social engineering techniques â which involve manipulation in order to obtain sensitive information, rather than direct hacking of accounts â take time to build the trust of their targets, but require considerably fewer resources than other cyberespionage methods, he added.
âItâs easy, cheap, thereâs plausible deniability and it works, itâs effective,â he said, adding that it is difficult to establish a direct link between hacking networks and Tehran, but if they operate from Iran âthey have the consent of the regime.â
Sabeti said: âIf youâre a cybercriminal youâre after money, not intelligence. If youâre after intelligence, documents and those kinds of things, then youâre part of the intelligence agency. This is one of the ways you can establish whether theyâre a state-backed hacker or not.â
Many of the fake profiles used on Facebook had their personas cultivated across various social media platforms.Â
LinkedIn said it had ârestricted the accounts responsibleâ on its platform and was monitoring the situation, while Twitter said it was âactively investigatingâ the matter.Â
Microsoft and Google also responded, with the latter saying it had now added the malicious domains used by Iranâs agents to its âblocklist.â