City
Epaper

Iran-linked hackers exploiting Microsoft Outlook bug: US

By IANS | Updated: July 3, 2019 11:15 IST

Within two weeks it covertly launched a cyber attack against Iranian intelligence group's computer systems that control rocket and missile launches, the US Cyber Command on Wednesday issued an unprecedented warning, saying it has discovered the "active malicious use" of a Microsoft Outlook vulnerability linked to Iran.

Open in App

The vulnerability is a security bug that Microsoft patched in Outlook in 2017 but several unpatched computers are still at risk.

In a tweet, US Cyber Command said: "USCYBERCOM has discovered active malicious use of "CVE-2017-11774" and recommends immediate #patching."

According to a ZDNet report, the bug "CVE-2017-11774" discovered first by SensePost researchers had been "weaponized by an Iranian state-sponsored hacking group known as APT33 (or Elfin), primarily known for developing the Shamoon disk-wiping malware" another hacking tool developed by the APT33 group.

The Outlook bug allows a threat actor to escape from the Outlook sandbox and run malicious code on the underlying operating system.

"In December 2018, ATP33 hackers were using the vulnerability to deploy backdoors on web servers, which they were later using to push the CVE-2017-11774 exploit to users' inboxes, so they can infect their systems with malware," said the report.

Cyber security firm FireEye has also reported extensively on Iran-linked APT33.

"Over the past few years, we have been tracking a separate, less widely known suspected Iranian group with potential destructive capabilities, whom we call APT33," FireEye said recently.

The analysis reveals that APT33 is a capable group that has carried out cyber espionage operations since at least 2013 "at the behest of the Iranian government".

APT33 has targeted organisations spanning multiple industries headquartered in the US, Saudi Arabia and South Korea.

The possible Iran-linked attack comes in the wake of the US cyberattack last month that targeted computer systems used to control missile and rocket launches for potential disruption.

The strikes, approved by the US President Donald Trump, were carried out by US Cyber Command in coordination with US Central Command.

The attack came during the peak of tensions this week between the US and Iran over a series of incidents across the Middle East, including Tehran's shooting down of an American reconnaissance drone.

It also came as US fears have grown that Iran may seek to lash out with cyberattacks of its own, as multiple cybersecurity firms said they had already seen signs Tehran is targeting relevant computer networks for intrusion and appeared particularly focused on the US government and the American energy sector, including oil and gas providers.

( With inputs from IANS )

Tags: iranUs Cyber CommandUs Central CommandFireeyetehran
Open in App

Related Stories

International'No Mercy to Zionists': Iran Supreme Leader Ayatollah Khamenei Hits Back at Donald Trump

InternationalOil Tankers Collide and Catch Fire Near Hormuz as Electronic Jamming Rises Due To Iran-Israel Conflict

International'Playing for Peace': Cristiano Ronaldo Sends Jersey With Message to Donald Trump Amid Israel-Iran Conflict

InternationalIsrael-Iran Conflict: US President Donald Trump Urges Iranians to Evacuate Tehran

InternationalIsraeli Strike Hits Iranian State Media Headquarters in Tehran During Live Broadcast; Video Surfaces

टेकमेनिया Realted Stories

TechnologyIndian defence entities projected to see revenue expansion of 15-17 pc in FY26: Report

TechnologyIndia’s residential sales surge by nearly 77 pc since FY 2019: Report

TechnologyAxiom Mission 4 launch to ISS rescheduled for June 22

TechnologyPiyush Goyal embarks on UK visit to reinforce momentum on bilateral trade pact

TechnologyTop 100 S. Korean firms contribute over $1.16 trillion to economy in 2024