You see a page from the old site of Iran International that is no longer updated. Visit iranintl.com to view the new site.

IRGC hackers accidentally leaked videos of themselves hacking

Researchers at IBM’s X-Force security team revealed today that they have obtained around five hours of video footage that appears to have been recorded directly from the screens of hackers working for an Iranian group IBM calls ITG18, and which other security firms refer to as Charming Kitten.

It is one of the most active state-sponsored espionage teams linked to the government of Iran. The leaked videos were found among 40 gigabytes of data that the hackers had apparently stolen from victim accounts, including US and Greek military personnel. Other clues in the data suggest that the hackers targeted US State Department staff and an unnamed Iranian-American philanthropist.

The IBM researchers say they found the videos exposed due to a misconfiguration of security settings on a virtual private cloud server they'd observed in previous APT35 activity. The files were all uploaded to the exposed server over a few days in May, just as IBM was monitoring the machine. The videos appear to be training demonstrations the Iran-backed hackers made to show junior team members how to handle hacked accounts. They show the hackers accessing compromised Gmail and Yahoo Mail accounts to download their contents, as well as exfiltrating other Google-hosted data from victims.

This sort of data exfiltration and management of hacked accounts is hardly sophisticated hacking. It's more the kind of labor-intensive but relatively simple work that's necessary in a large-scale phishing operation. But the videos nonetheless represent a rare artifact, showing a first-hand view of state-sponsored cyberspying that's almost never seen outside of an intelligence agency.

Allison Wikoff, a senior analyst at IBM X-Force whose team discovered the videos says: "We don't get this kind of insight into how threat actors operate really ever." She added: "When we talk about observing hands-on activity, it’s usually from incident-response engagements or endpoint monitoring tools. Very rarely do we actually see the adversary on their own desktop. It's a whole other level of 'hands-on-keyboard' observation."

Iran in Brief
City officials in Iran's capital Tehran are planning to put locks on large waste containers in the streets to prevent garbage pickers from accessing waste.More
The Biden Administration has confirmed to the US Congress that sanction imposed by its predecessor on Iran have drastically reduced Iran's trade with the world.More
The UK government said on Sept 20 that Britain would "not rest" until all its dual nationals being held in Iran were returned home.More
President Ebrahim Raisi’s vice president in women’s affairs has refused to support an age limit in child marriage, a controversial issue in Iran.More
In first news about detained Iranian dissident rap singer Toomaj, Iran International has learned that was arrested by the intelligence ministry.More