Hacker groups support protesters in Iran 

Checkpoint News

Share post

Check Point Research (CPR) is monitoring several cybercriminals who are using news programs such as Telegram, Signal and the Dark Web to help anti-government protesters in Iran circumvent authorities' restrictions.

Check Point Research, the research division of Check Point Software Technologies Ltd. is currently observing various groups that are using various channels to help protesters and government critics in Iran circumvent virtual borders and restrictions. Key activities include leaking and selling data, including officials' phone numbers and emails, and maps of sensitive locations.

Hackers who just help like that?

CPR tracks the sharing of open VPN servers to bypass censorship and the reports on the internet status in Iran, as well as hacking conversations and guides. Telegram, Signal and the Dark Web itself serve as channels, for example. Monitoring of the activities began a day after anti-government protests began, prompted by the death of Mahsa Amini, who died after being arrested for allegedly violating laws requiring women to wear headscarves.

The hacker groups allow protesters in Iran to communicate and exchange news about what is happening in different places, which the government tries to avoid in order to contain the protests.

Selling information partly as a source of income

As in any other case, there are some gangs trying to profit from the situation and sell information from Iran and the government. Liad Mizrachi, security researcher at Check Point Software, explains: "What we are seeing are groups from Telegram, Signal, the dark web, and mainstream internet helping protesters to circumvent the restrictions and censorship that Iranian authorities are currently applying, to deal with the protests. These groups emerged about a day after the protests began. We will monitor the situation.”

Check Point lists all groups and what goals they are pursuing on its blog.

More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more