- Elton John blasts Russia’s anti-gay laws during Moscow concert
- U.N.: Afghanistan slow to enforce law protecting women
- Heart cancels SeaWorld concert after ‘Blackfish’ documentary
- South Carolina sheriff refuses to lower American flag for Nelson Mandela
- South Africans hold day of prayer for Nelson Mandela
- Mandela not on life support in final hours, friend says
- Ukraine protesters topple, decapitate Lenin statue in Kiev
- Kim Jong-un’s uncle removed from North Korean state documentary
- Thailand crisis deepens as opposition quits Parliament
- Campbell Soup apologizes for SpaghettiOs’ Pearl Harbor tweet
Hackers shopping malware network
Suspected of backing Iran
A hacker group calling itself the Iranian Cyber Army is assembling a network of infected computers, and selling it to cybercriminals to spread spam and malicious software, according to security researchers.
Aviv Raff, of the computer security firm Seculert, told The Washington Times that the group was exploiting a vulnerability in WordPress, a popular blogging software program, to gain control of unsuspecting Internet users’ computers and add them to its network — known as a botnet, or robot network — of infected machines. He said the botnet, one of hundreds controlled by hacker gangs and cybercrime syndicates all over the world, could be used to launch cyber-attacks against Tehran’s enemies.
Most researchers regard the Iranian Cyber Army (ICA) as “hacktivists” — politically motivated pro-Iranian hackers — and there is no evidence they are linked to the Tehran government. Almost a year ago, a group using that name attacked U.S.-based social networking platform Twitter, and then Chinese search engine Baidu, briefly diverting visitors to those Web pages to a different page decorated with an Iranian flag, nationalist slogans and anti-U.S. and anti-Israel images.
He said his firm was trying to identify the geographical origin of the attacks, but such tracing is notoriously difficult in cyberspace, where hackers can launch attacks from computers they control half a world away from their own location.
“They could be Iranians,” he told The Times. “It could just as easily be a 13-year-old in New Jersey.”
Politically motivated cybervandalism like the ICA defacement of the Twitter and Baidu sites is relatively common, and usually no more than a nuisance. For example, Islamic hacker groups, many of them apparently based in Turkey, defaced Danish websites after a newspaper there published cartoons of the Prophet Muhammad in September 2005.
But ICA’s most recent hack appears to be much more aggressive, said Mr. Raff. He said European newsblog site TechCrunch, and “hundreds” of other smaller sites that use WordPress had been compromised over the past two months. Visitors were surreptitiously redirected to a hacker-controlled website, where they were infected with a so-called Trojan downloader — a kind of malicious software that allows hackers to take control of the user’s computer.
The Trojan was placed on the visitors’ computers by exploiting well-known vulnerabilities in several widely used software packages, including Adobe PDF, Java and Internet Explorer.
Seculert linked the ICA to the WordPress-based attacks through an e-mail address that was also referenced in the Twitter defacement attack. The firm’s researchers found the Web page ICA was using to control its botnet, and noted that their Trojan software appeared to be infecting thousands of computers an hour.
Given that the vulnerabilities ICA is using are known and that anyone whose computer software was properly patched and up to date would be immune, Mr. Raff said it was “scary to see that people are still getting infected” at such a rate.
He estimated that millions of computers could be in the ICA botnet, but other analysts downplayed those figures.
“You can’t really assume a constant rate of infection,” said Steven Adair of the Shadowserver Foundation, a volunteer group of security professionals that tracks illicit activity on the Internet. He added that the estimate also might involve multiple counting of computers that had been infected more than once.
“I would say that estimate is likely on the high side,” he said.
Botnets can be used to send spam e-mail or spread more malware, but they can also be used to conduct so-called denial-of-service attacks against websites. At the moment, Mr. Raff said, the ICA appeared to be selling access to the computers it had infected to other cybercrime gangs, who were loading their own malware onto them, effectively recruiting them to multiple other botnets, or equipping them to steal banking passwords or other personal data from their owners.
Russian nationalist hacktivists were blamed for providing the foot soldiers for the cyberwar attacks on Estonia in April and May 2007. Those hackers used botnets to cripple Estonian government and banking websites.
Over the summer, security researchers assessed that a computer worm called Stuxnet, which attacked special industrial-control systems, had been aimed at sabotaging an Iranian nuclear plant. Given the timing of the ICA attack, Mr. Raff said, “on the heels of the recent Stuxnet worm — it appears reasonable to assume that the Iranian Cyber Army group has decided to move from simple defacement warnings to actual cybercrime activities.”
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
By Brahma Chellaney
- Obama: Hole U.S. 'digging out of' requires billions more in unemployment benefits
- Bill OReilly reminds: Nelson Mandela was a communist
- Sen. Rand Paul pushes 'economic freedom zones' for Detroit
- Redskins' season hits bottom with Chiefs blowout
- Spike in battlefield deaths linked to restrictive rules of engagement
- FENNO: Mike Shanahan's empty words no salve to free-falling Redskins
- U.S. debt jumps a record $328 billion tops $17 trillion for first time
- Sen. Rand Paul: 'I am seriously thinking about' running for president in 2016
- Legalizing illegal immigrants is the solution to Obamacare: Democrat
- Obamas call to close Vatican embassy is 'slap in the face' to Roman Catholics
Independent voices from the The Washington Times Communities
Al Maurer provides a common sense, conservatarian, Constitutional conservative perspective from the battleground state of Colorado
Film Reviews and Articles by Kevin Williams
"Critical thinking is thinking about your thinking while you're thinking in order to make your thinking better." - Dr. Richard Paul
Go beyond tourism's "top 10" bus tour destinations with Susan McKee as she explores the varied history, culture, food, and gardens, of the world.
Let it snow
White House pets gone wild!