News

Researchers Catch Cyber-Espionage Groups After Hackers Infect Their Own Systems

A cyber-espionage group who is believed to be tied to the Iranian Government, and has targeted over 1,600 defense officials, diplomats, researchers, journalists and more, may have just landed themselves in their own hacking trap. The group known as “Rocket Kitten” has been going since 2014, and for quite some time, their attacks have been analyzed by security teams trying to not only track them down, but to also prevent further security breaches. However, a team of researchers at Check Point Software Technologies caught a lucky break when they obtained access to the attacker’s command-and-control server.

It’s reported that Rocket Kitten is not very sophisticated, but rather persistent with their attacks. Using social engineering and phishing attacks to infect targets with malware. Researchers say the team left a major weakness in their infrastructure, allowing them to extract messages between members of the hacking group, as well as a list of over 1,600 intended victims in Saudi Arabia, the U.S., Iran, the Netherlands and Israel, that were targeted between August 2014 and 2015.

“It seems that the attackers did not take into consideration the possible compromise of their own command-and-control server and have infected their own computers with their custom keylogger-type malware, most likely for testing purposes.” reported CIO

By infecting their own computers with the malware they’ve been using to attack others, researchers believe they have been able to identify an Iranian software engineer who developed the tools for Rocket Kitten.

“In this case, as in other previously reported cases, it can be assumed that an official body recruited local hackers and diverted them from defacing web sites to targeted espionage at the service of their country,” the Check Point researchers said. “Such inexperienced personnel with limited training often lack operational security awareness.” they added.

Well there you go. If you’re going to breaking computer security, learn how to apply it in the first place.

Image source

 

Peter Donnell

As a child still in my 30's (but not for long), I spend my day combining my love of music and movies with a life-long passion for gaming, from arcade classics and retro consoles to the latest high-end PC and console games. So it's no wonder I write about tech and test the latest hardware while I enjoy my hobbies!

Disqus Comments Loading...

Recent Posts

Nominees for The Game Awards 2024 Revealed

The day that many have been waiting for is finally here! While The Game Awards…

5 hours ago

Final Fantasy VII Remake Part 3 Enters Full Production

Back in February of this year, we saw the release of Final Fantasy VII Rebirth.…

5 hours ago

MSI Claw 8 AI+ Appears at CES 2025, Possible Presentation in January

During 2024, MSI showcased its next console with an Intel Lunar Lake processor at COMPUTEX…

6 hours ago

AMD Dominates List of Best-Selling Processors on Amazon

Recent market research shows that AMD has been steadily gaining a larger share of the…

7 hours ago

Intel Battlemage Rumored to Launch in December

All major GPU manufacturers are rumored to be delaying their next-generation GPUs until 2025 —…

8 hours ago

ASRock Unveils Cutting-Edge ATX 3.1 & PCIe 5.1 Power Supply Units

ASRock, a leading manufacturer of motherboards and graphics cards, has announced a new line of…

12 hours ago