003: The Iranian Threat

Spies, Lies & Cybercrime by Eric O'Neill

The Iranian Threat

Inside Iran's Cyber Espionage Web: From Targeting Individuals to U.S. Critical Infrastructure

Imagine you're Jane, a senior analyst at a think tank specializing in Middle Eastern affairs. One day, you receive an email that looks completely legitimate. It’s an invitation to an exclusive embassy event from a diplomat you’ve met before. This is no generic phishing attempt – it’s personal, tailored, and compelling. Without hesitation, you click on the link, which leads to a seemingly harmless login page. You enter your email credentials and receive a brief login error. Annoying, right? But what you don’t know is that this was no mistake. Behind the scenes, cyber spies impersonating the diplomat have gained access to your account.

Suddenly, your confidential emails with high-level government contacts are in the hands of a malicious actor. They’ve set up forwarding rules, silently intercepting your communications. While you go about your day, they’re gathering sensitive intel, crafting their next move, and even using your account to target your colleagues. By the time you realize your account was compromised, the damage is done – and your professional reputation may never be the same.

The Iranian Threat: A Cyber Shadow Over Key Players

Jane’s story isn’t far from reality. The FBI, U.S. Cyber Command, The Cybersecurity & Infrastructure Security Agency and the UK’s National Cyber Security Centre have all issued warnings about cyber actors working on behalf of Iran’s Islamic Revolutionary Guard Corps (IRGC). These state-sponsored actors are incredibly skilled at social engineering, making their phishing attacks dangerously convincing. Their targets? Individuals deeply involved in Iranian and Middle Eastern affairs, including government officials, journalists, and activists.

But it doesn’t stop at personal email cyberattacks. The reach of these Iranian actors extends into political campaigns, aiming to influence and disrupt the democratic process. In the 2020 and 2024 U.S. elections, Iranian hackers conducted “hack-and-leak” operations. For example, in the lead-up to the 2024 election, Iranian hackers made a brazen attempt to interfere by offering President Biden's campaign information stolen from the rival Trump campaign. In late June and early July, unsolicited emails were sent to individuals connected to Biden, containing excerpts from non-public Trump campaign material. While there’s no evidence that anyone from Biden's camp engaged with the emails, the effort was part of a broader Iranian disinformation campaign designed to weaken Trump's candidacy. Fortunately, the stolen information never surfaced publicly. In another instance, during the 2020 elections, Iranian spies posed as members of the far-right group “Proud Boys,” sending threatening emails to voters and distributing disinformation about the integrity of the voting system. [More at Justice.gov]

Back in September and October 2020, members of the Iranian conspiracy were busy conducting reconnaissance on about 11 state voter websites, including voter registration systems and voter information portals. Their goal? To find weaknesses, and they succeeded in exploiting a misconfigured system in one state, gaining unauthorized access to personal data on over 100,000 voters. This wasn’t just a casual data grab—it was part of a larger effort to undermine confidence in the election process, one cyber intrusion at a time. [More at Justice.gov].

This isn’t just about meddling with political campaigns; it's about undermining trust in the entire democratic process.

The Evolution of Iran's Cyber Espionage Capabilities

Iran’s cyber espionage abilities have grown significantly over the past decade. Groups like APT42 and Phosphorus, both linked to the IRGC, have refined their social engineering and spear-phishing techniques, targeting key individuals in government, academia, and media. Their operations are not just about stealing data; they’re about leveraging that data to influence political outcomes and sway public opinion through “hack-and-leak” campaigns.

Iranian cyber actors have also begun collaborating with ransomware groups to expand their operations. By monetizing their access to critical systems, they have created a dangerous blend of espionage and financial motivation. As a result, the scope of their attacks has grown beyond traditional political targets, now including private corporations and critical infrastructure​.

A Direct Assault on U.S. Critical Infrastructure

The most alarming aspect of Iran’s cyber capabilities is their focus on critical infrastructure. Since 2017, Iranian cyber actors have launched a series of attacks aimed at disrupting U.S. infrastructure, including municipal governments, healthcare institutions, and financial organizations. Groups like Pioneer Kitten have been implicated in spear-phishing campaigns and ransomware attacks that target these vital sectors. One such group even partnered with the notorious ransomware affiliate BlackCat to carry out encryption operations on U.S. systems. [More at CISA, CISA]

Iranian state actors have also targeted U.S. power grids, water supplies, and oil and gas sectors, using increasingly sophisticated cyber tactics to disrupt operations and gather intelligence. These actions aren’t random; they’re calculated moves aimed at destabilizing U.S. infrastructure while providing Iran with geopolitical leverage. [CISA]

A Wake-Up Call for the West

Iran’s cyber activity is no longer just a threat limited to a few targeted individuals or political campaigns. It’s a growing and evolving danger to Western critical infrastructure. From impersonation schemes like the one Jane experienced to large-scale attacks on municipal systems and healthcare providers, Iranian cyber actors are advancing in both scope and sophistication.

This wake-up call for governments, corporations, and individuals alike stresses the need for heightened vigilance, stronger cybersecurity protocols, and a more coordinated international response. While Jane’s hypothetical story may seem distant, the reality is that these types of attacks are becoming all too common. The question isn’t if another attack will happen—it’s when. Will we be prepared when it does?

News Roundup

Trump assassin #2’s intentions revealed

Federal prosecutors revealed in court that Ryan Wesley Routh, who was found near Donald Trump's golf course with a rifle, had written a letter claiming responsibility for an attempted assassination. The letter, addressed to "The World," expressed regret over his failure and even offered $150,000 to anyone who could finish the job. Routh is now facing charges of attempting to assassinate the former president and will remain detained. This alarming incident underscores the ever-present threat of political violence and the need for heightened security measures. [More HERE]

Buddy up to your AI

OpenAI rolled out a new ChatGPT feature, Advanced Voice Mode, for all Plus subscribers. This update will allow for more interactive, real-time conversations, bringing a more human-like AI experience. Advanced Voice Mode includes options for voice input, with various voice choices, offering a seamless transition between text and voice within the app as well as “natural, real-time conversations with the ability to sense emotions.” How much of a conversation do you want to have with your AI? Have you used the new mode? Let me know in the comments. [Wired’s review]

The AI Ev(Rev)olution

Bill Gates recently called AI the "biggest technical advancement in my lifetime," and he's not exaggerating. Speaking with Oprah, he highlighted how AI could revolutionize healthcare, acting as a "third person" in medical appointments, and education, offering every student a personal tutor. But what really stood out was Gates’ take on the blistering pace of AI development, even faster than experts expected. While the potential is huge, he also warned of the risks, stressing the need for companies and governments to work together on regulations to avoid economic and societal disruptions. [CNET]

The Russia-Ukraine war: back to espionage

I found this article by Mihir Bagwe in the Cyber Express very interesting. Bagwe opines that in 2024 Moscow shifted its cyber strategy against Ukraine, prioritizing espionage over destruction. Rather than the large-scale infrastructure attacks of past years, Russian cyber attackers are now focused on covert, long-term infiltration of military and critical infrastructure targets to gather intelligence. While cyber incidents have increased overall, high-severity attacks have dropped, signaling a shift in the Kremlin’s approach from broad destruction to targeted espionage in its ongoing conflict with Ukraine. [Cyber Express]

FBI sextortion takedown

Terrell Ashby, also known as "Jason Brandon," was sentenced to 36 months in prison and three years of supervised release for running a widespread sextortion scheme targeting over 100 young women across the U.S. Ashby extorted victims by tricking them into sending explicit photos and then threatening to release the images unless they paid him. Despite receiving payments, he continued to harass victims, creating social media accounts to shame them. One victim was so distraught she overdosed and had to be hospitalized. U.S. Attorney Romero emphasized that while Ashby’s prison sentence brings some justice, the harm caused to these women will never be fully erased. [Justice.gov]

Check out my latest podcast appearance

Check out my appearance on the FoXnoMad Podcast where I discuss the Hanssen investigation, my FBI background, cybercrime, and the evolution of AI in cybersecurity. Give it a listen and share your thoughts!

Are you protected?

Recently nearly 3 billion records containing all our sensitive data was exposed on the dark web for criminals, fraudsters and scammers to data mine for identity fraud. Was your social security number and birthdate exposed? Identity threat monitoring is now a must to protect yourself? Use this link to get up to 60% off of Aura’s threat monitoring service.

Have any questions about cybersecurity or a topic you’d like me to cover? Reply to this email or comment on the web version, and I’ll include your question in next month’s issue!

Thank you for subscribing to Spies, Lies and Cybercrime. Please comment and share the newsletter. I look forward to helping you stay safe in the digital world.

Best,
Eric

Let's make sure my emails land straight in your inbox.

Gmail users: Move this email to your primary inbox

On your phone? Hit the 3 dots at top right corner, click "Move to" then "Primary."

On desktop? Close this email then drag and drop this email into the "Primary" tab near the top left of your screen

Apple mail users: Tap on our email address at the top of this email (next to "From:" on mobile) and click “Add to VIPs”

For everyone else: follow these instructions

Reply

or to participate.