banner Expire 1 October 2024
Ad Ends 13 October 2024
banner Expire 15 January 2025
Ad Ends 13 October 2024
banner Expire 18 October 2024
banner Expire 16 November 2024
ad expire at 08 november 2024
What's new
banner Expire 16 November 2024
Ad Ends 20 January 2025
banner Expire 11 November 2024
Adv exp on 11 NOv 2024
ad End 18 October 2024
Ad expire at 5 August 2024
banner Expire 20 October 2024
Western union transfer
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

APT35 Iranian hackers accidentally reveal their hacking secrets

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,240
Reaction score
914
Points
212
Awards
2
  • trusted user
  • Rich User
In some videos, the operator managed the created accounts.





Security researchers from the IBM X-Force Incident Response Intelligence Services (IRIS) team during monitoring of the virtual cloud server of the Iranian cybercriminal group ITG18 (also known as APT35, Phosphorus, Charming Kitten and Ajax Security Team) found 40 GB of data, among which was stolen information hacked accounts and videos. Researchers were able to access the data due to the fact that hackers did not take care of the proper protection of their server by incorrectly configuring its settings.

According to experts, some of the videos found are a training tool that the Iranian group used to train new recruits. The video was recorded using a screen recording application called BandiCam. Some videos showed how the operator managed the created accounts, while in others, he checked access and stole data from previously hacked accounts. Unsuccessful phishing attempts have also been recorded against the Iranian-American philanthropist and US Department of State officials.

Specialists were able to identify and later notify some of the victims depicted in the video, including a US Navy soldier and a Greek Navy officer.
In five video files with the names “AOL.avi”, “Aol Contact.avi”, “Gmail.avi”, “Yahoo.avi”, “Hotmail.avi” the operator uses the “Notepad” file containing one set of credentials for each platforms, and in each video, selects them for the respective websites. The video also demonstrates filtering various datasets associated with these platforms, including contacts, photos, and cloud storage.

The operator also showed a change in the settings in the security section of each account and added them to Zimbra, a legitimate email collaboration platform that can combine multiple email accounts into one interface. With Zimbra, an operator could simultaneously monitor and manage various compromised email accounts.
 
Ad End 1 October 2024
Top