TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Iran state hackers caught in intercepted videos

87 pointsby redmalmost 5 years ago

6 comments

wyxuanalmost 5 years ago
Umm, maybe a more appropriate title could be “IBM discovers database containing Iranian hacking videos“
评论 #23871533 未加载
评论 #23871325 未加载
m000almost 5 years ago
Disappointing. I was expecting a webcam hack or something, that literally caught them with their pants down.
评论 #23872688 未加载
afrcncalmost 5 years ago
Source, with a lot more details: <a href="https:&#x2F;&#x2F;securityintelligence.com&#x2F;posts&#x2F;new-research-exposes-iranian-threat-group-operations&#x2F;" rel="nofollow">https:&#x2F;&#x2F;securityintelligence.com&#x2F;posts&#x2F;new-research-exposes-...</a>
SahAssaralmost 5 years ago
The methods described seem to be pretty basic. I&#x27;m surprised that copy pasting passwords and manually connecting a email account to zimbra would be part of a training video (and not completely automated using more sophisticated tools than zimbra).<p>&gt; X-Force IRIS security team obtained the 40GB cache of data as it was being uploaded to a server<p>Wut? That makes it sound like it was uploaded over an unencrypted channel.<p>Is this really the level that state sponsored hackers are on? Unencrypted uploads, manual copy-paste of passwords and free versions of bandicam?<p>Given the above I wouldn&#x27;t be surprised if it was intentionally leaked to make them seem like less of a threat.
评论 #23872059 未加载
评论 #23873718 未加载
stuntalmost 5 years ago
So assuming these was all on private space, it’s interesting that IBM has read customers data! Or, maybe these particular servers were only monitored because they are associated to hacking groups?
jessmayalmost 5 years ago
Thoughts on what advantage you get from know which tools your adversaries are using as good targets to inject with backdoors assuming state actor resources?