News

Researchers Catch Cyber-Espionage Groups After Hackers Infect Their Own Systems

A cyber-espionage group who is believed to be tied to the Iranian Government, and has targeted over 1,600 defense officials, diplomats, researchers, journalists and more, may have just landed themselves in their own hacking trap. The group known as “Rocket Kitten” has been going since 2014, and for quite some time, their attacks have been analyzed by security teams trying to not only track them down, but to also prevent further security breaches. However, a team of researchers at Check Point Software Technologies caught a lucky break when they obtained access to the attacker’s command-and-control server.

It’s reported that Rocket Kitten is not very sophisticated, but rather persistent with their attacks. Using social engineering and phishing attacks to infect targets with malware. Researchers say the team left a major weakness in their infrastructure, allowing them to extract messages between members of the hacking group, as well as a list of over 1,600 intended victims in Saudi Arabia, the U.S., Iran, the Netherlands and Israel, that were targeted between August 2014 and 2015.

“It seems that the attackers did not take into consideration the possible compromise of their own command-and-control server and have infected their own computers with their custom keylogger-type malware, most likely for testing purposes.” reported CIO

By infecting their own computers with the malware they’ve been using to attack others, researchers believe they have been able to identify an Iranian software engineer who developed the tools for Rocket Kitten.

“In this case, as in other previously reported cases, it can be assumed that an official body recruited local hackers and diverted them from defacing web sites to targeted espionage at the service of their country,” the Check Point researchers said. “Such inexperienced personnel with limited training often lack operational security awareness.” they added.

Well there you go. If you’re going to breaking computer security, learn how to apply it in the first place.

Image source

 

Peter Donnell

As a child still in my 30's (but not for long), I spend my day combining my love of music and movies with a life-long passion for gaming, from arcade classics and retro consoles to the latest high-end PC and console games. So it's no wonder I write about tech and test the latest hardware while I enjoy my hobbies!

Disqus Comments Loading...

Recent Posts

Jensen Huang to Kick Off Computex 2024 With NVIDIA Keynote

As Computex 2024 approaches, the tech industry buzzes with anticipation for a series of high-profile…

13 hours ago

MSI Prioritizes NVIDIA Over AMD as RX 7000 GPU Supplies Vanish

MSI, a key player in the graphics card market, appears to be shifting its focus…

13 hours ago

TeamGroup Clinches Four Red Dot Awards for Innovative Design

TeamGroup has once again proven its prowess in the field of memory product innovation by…

13 hours ago

eFootball Hits Major Milestone with 750 Million Downloads

Konami's eFootball has reached a staggering 750 million downloads worldwide. This milestone comes as the…

13 hours ago

Manor Lords Is Out Now On Steam, Epic and Gamespass!

Just a few hours after its release on Steam alone Manor Lords has already managed…

1 day ago

WWE 2K24 PS5 Standard Edition

FORTY YEARS OF WRESTLEMANIA WrestleMania is the biggest event in sports entertainment, where Superstars become…

1 day ago