LAPSUS$ Convictions and Iranian Actor's Backdoor Threat

Alert! LAPSUS$ Convictions and Iranian Actor’s Backdoor Threat

3 Mins Read

PUREVPNNewsAlert! LAPSUS$ Convictions and Iranian Actor’s Backdoor Threat

Two individuals associated with the LAPSUS$ cybercrime and extortion group, both British teenagers, recently faced legal consequences for their involvement in high-profile cyber attacks targeting various companies. 

Arion Kurtaj, an 18-year-old from Oxford, received an indefinite hospital order due to his perceived intention to resume cybercrime activities promptly. His case is complicated by his autism, which led to the determination that he was unfit to stand trial. 

Another LAPSUS$ member, an unnamed 17-year-old, was sentenced to an 18-month Youth Rehabilitation Order, including intensive supervision, for charges including fraud, Computer Misuse Act offenses, and blackmail.

Modus Operandi and Targets

The LAPSUS$ group executed a spree of attacks against entities such as BT, EE, Globant, LG, Microsoft, NVIDIA, Okta, Revolut, Rockstar Games, Samsung, Ubisoft, Uber, and Vodafone. 

The attacks involved using SIM-swapping techniques to gain control over victim accounts and infiltrate target networks. The group leveraged a Telegram channel to publicize their operations and extort victims.

Broader Threat Landscape

The U.S. Department of Homeland Security’s Cyber Safety Review Board highlighted the group’s tactics, revealing a pattern of engaging in SIM swapping, corporate intrusions, crypto theft, real-life violence, and swatting. 

The emergence of a related group named Scattered Spider and their association with a larger entity called the Comm suggests a complex and interconnected cyber threat landscape.

Law Enforcement Challenges and Digital Literacy

The case brings attention to the challenges law enforcement faces in dealing with cybercriminals, especially when individuals involved are underage. 

Amanda Horsburgh, detective chief superintendent of the City of London Police, emphasized the broader implications, noting how young people’s curiosity about technology can lead them down perilous paths online.

Iranian Actor Targets Defense Industrial Base with Backdoor

Organizations within the Defense Industrial Base (DIB) sector find themselves threatened by an Iranian actor, marked by a sophisticated campaign introducing a previously unseen backdoor named FalseFont. 

Microsoft, tracking this activity under the alias Peach Sandstorm, sheds light on the details of the ongoing cyber assault.

Nature of the Threat

The custom backdoor, FalseFont, exhibits a broad range of functionalities enabling remote access to infected systems, execution of additional files, and transmission of information to command-and-control servers. 

Microsoft’s Threat Intelligence team disclosed the first documented use of this backdoor in early November 2023, signaling a concerning escalation in the capabilities of Peach Sandstorm.

Evolution of Tactics

This recent revelation aligns with Peach Sandstorm’s past activities, showcasing a continuous evolution in the threat actor’s tactics. 

Microsoft had previously linked this group to password spray attacks conducted globally between February and July 2023, specifically focusing on organizations in the satellite, defense, and pharmaceutical sectors.

Long-standing Threat Actor

Peach Sandstorm, also known as APT33, Elfin, and Refined Kitten, has been a persistent player in the cyber threat landscape since at least 2013. 

The ultimate objective of their campaigns remains the facilitation of intelligence collection to serve Iranian state interests.

Industry-Specific Interest

Past assessments by Google-owned Mandiant highlighted the adversary’s keen interest in organizations associated with the aviation sector, encompassing both military and commercial domains. 

Additionally, the energy sector, particularly those linked to petrochemical production, has been a focal point for Peach Sandstorm.

Tactics in Flux

The LAPSUS$ and Peach Sandstorm demand a collaborative and global response. The traditional boundaries of law enforcement and cybersecurity must be transcended to combat the challenges effectively. 

The ongoing evolution in tactics leads to a proactive approach, emphasizing not just reactive defense but also a comprehensive understanding of the motivations and methodologies that drive these digital adversaries.

author

Marrium Akhtar

date

January 9, 2024

time

4 months ago

Marrium is a dedicated digital Marketer and an SEO enthusiast who is skilled in cracking SEO codes. Other than work, she loves to stream, eat, and repeat.

Have Your Say!!

Join 3 million+ users to embrace internet freedom

Signup for PureVPN to get complete online security and privacy with a hidden IP address and encrypted internet traffic.