Source: National Cyber Security – Produced By Gregory Evans
Group targets individuals, private businesses, academic institutes, and state departments in equal measure Trend Micro and ClearSky security firms have put out a joint, detailed paper in which theyDOCUMENT the actions of an APT (Advanced Persistent Threat) group they believe is linked to the Iranian government. Their research paints the picture of an APT group that started hacking strategic targets in foreign governments, academic institutions, and above all, targets located in Israel. From April 2014 to this last June, Trend Micro and ClearSky experts analyzed information collected by other cyber-security agencies (iSIGHT and FireEye) and their own data and reached the conclusion that the APT group they’ve dubbed Rocket Kitten has ties to the Iranian government in some form or another. Their conclusion stems from a series of incidents from mid-2015, when Dr. Thamar E. Gindin and a ClearSky researcher became the targets of this group. Dr. Ginding, an expert in Iranian linguistics and pre-Islamic Iran, lecturer, and research fellow at the Ezri Center for Iran and Persian Gulf Research at the University of Haifa, aided ClearSky researchers with their Thamar Reservoir security research paper, which studied the Rocket Kitten group’s hacking activities in countries of the Middle East. Rocket […]
For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com
The post Rocket Kitten Hacking Group Linked to Iranian Government by Security Researchers appeared first on National Cyber Security.
View full post on National Cyber Security