<p>Stuart Davis, a director at one of FireEye's subsidiaries, blocks part of a projection as he  speaks to journalists about the techniques of Iranian hacking, Wednesday, Sept. 20, 2017, in Dubai, United Arab Emirates. A new report by FireEye, a cybersecurity firm, warned that a suspected group of hackers in Iran are targeting the aviation and petrochemical industries in Saudi Arabia, the U.S. and South Korea. (AP Photo/Kamran Jebreili)</p>
<p>Stuart Davis, a director at one of FireEye's subsidiaries, blocks part of a projection as he speaks to journalists about the techniques of Iranian hacking, Wednesday, Sept. 20, Show more

Suspected Iranian hackers target Saudi, US and Korean industries



A gang of hackers suspected of working in Iran for the Tehran government is likely behind attacks on American, Saudi Arabian and South Korean aviation and energy firms, a cyber security firm warned on Wednesday.

The report by FireEye also said the suspects left behind a new type of malware that could have been used to destroy the computers it infected.

It appears to echo two other Iran-attributed attacks that targetted Saudi Arabia in 2012 and 2016 that destroyed computer systems.

“The gang, dubbed APT33, is believed to have links to the Iranian regime,” said Stuart Davis, director of Global Services & Intelligence at FireEye, the cybersecurity company, which uncovered the hackers, said during a press conference in Dubai.

“Since the middle of 2016 until early 2017, APT33 members managed to hack into several organisations and companies in the three countries.

Representatives from the US, intelligence-led security company revealed details about a hacking group that infiltrated an aerospace firm in the US, a trade group with shares in the Saudi aviation sector and a petrochemical company based in South Korea.

He said the targets indicated that APT33 - an acronym for 'advanced persistent threat' - may be looking to gain insights into Saudi Arabia’s military aviation capabilities.

Specific companies are hacked in attempts to gain information which could serve their interests and inform decisions related to petrochemical production.

“They used malicious files to lure their victims and make them believe that they have vacancies and then solicit highly confidential information,” said Mr Davis.

FireEye said APT33 used phishing email attacks with fake job opportunities to gain access to the companies affected, faking domain names to make it look like the messages came from Boeing or defence contractors.

The hackers then remained inside of the systems of those affected for "four to six months" at a time, able to steal data and leaving behind the malware that FireEye refers to as Shapeshifter. The coding contains Farsi-language references, the official language of Iran, FireEye said.

Timestamps in the code also correspond to hackers working from Saturday to Wednesday, the Iranian workweek, Davis said. The programs used in the campaign are popular with Iranian coders, servers were registered via Iranian companies and one of the spies appears to have accidentally left his online handle, "xman_1365_x," in part of the code.

An Iranian contractor was identified by FireEye as linked to APT33. Called “xman_1365_x”, the hacker has been linked to Nasr Institute - purported to be equivalent to Iran’s “cyber army” and controlled by the Iranian government.

In March 2016, the US Department of Justice unsealed an indictment that named two individuals allegedly hired by the Iranian government to build attack infrastructure and conduct distributed denial of service attacks in support of Operation Ababil.

Associated Press reported that Iran developed its cyber capabilities in 2011 after the Stuxnet computer virus destroyed thousands of centrifuges involved in Iran's contested nuclear program. Stuxnet is widely believed to be an American and Israeli creation.

Iran is believed to be behind the spread of Shamoon in 2012, which hit Saudi Arabian Oil Co. and Qatari natural gas producer RasGas. The virus deleted hard drives and then displayed a picture of a burning American flag on computer screens. Saudi Aramco ultimately shut down its network and destroyed over 30,000 computers.

* with inputs from Associated Press

COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3ECompany%3A%3C%2Fstrong%3E%20Eco%20Way%3Cbr%3E%3Cstrong%3EStarted%3A%3C%2Fstrong%3E%20December%202023%3Cbr%3E%3Cstrong%3EFounder%3A%3C%2Fstrong%3E%20Ivan%20Kroshnyi%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20Dubai%2C%20UAE%3Cbr%3E%3Cstrong%3EIndustry%3A%3C%2Fstrong%3E%20Electric%20vehicles%3Cbr%3E%3Cstrong%3EInvestors%3A%3C%2Fstrong%3E%20Bootstrapped%20with%20undisclosed%20funding.%20Looking%20to%20raise%20funds%20from%20outside%3Cbr%3E%3C%2Fp%3E%0A
THE&nbsp;SPECS

Engine: 3.5-litre supercharged V6

Power: 416hp at 7,000rpm

Torque: 410Nm at 3,500rpm

Transmission: 6-speed manual

Fuel consumption: 10.2 l/100km

Price: Dh375,000 

On sale: now 

Fifa Club World Cup:

When: December 6-16
Where: Games to take place at Zayed Sports City in Abu Dhabi and Hazza bin Zayed Stadium in Al Ain
Defending champions: Real Madrid

Company%20Profile
%3Cp%3E%3Cstrong%3ECompany%20name%3A%20%3C%2Fstrong%3ENamara%0D%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3EJune%202022%0D%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3EMohammed%20Alnamara%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%20%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3EMicrofinance%0D%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%20%3C%2Fstrong%3E16%0D%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3ESeries%20A%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EFamily%20offices%0D%3Cbr%3E%3C%2Fp%3E%0A
Joker: Folie a Deux

Starring: Joaquin Phoenix, Lady Gaga, Brendan Gleeson

Director: Todd Phillips 

Rating: 2/5

MANDOOB
%3Cp%3EDirector%3A%20Ali%20Kalthami%3C%2Fp%3E%0A%3Cp%3EStarring%3A%20Mohammed%20Dokhei%2C%20Sarah%20Taibah%2C%20Hajar%20Alshammari%3C%2Fp%3E%0A%3Cp%3ERating%3A%204%2F5%3C%2Fp%3E%0A%3Cp%3E%3C%2Fp%3E%0A
COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3EName%3A%20%3C%2Fstrong%3ESmartCrowd%0D%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3E2018%0D%3Cbr%3E%3Cstrong%3EFounder%3A%20%3C%2Fstrong%3ESiddiq%20Farid%20and%20Musfique%20Ahmed%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EDubai%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3EFinTech%20%2F%20PropTech%0D%3Cbr%3E%3Cstrong%3EInitial%20investment%3A%20%3C%2Fstrong%3E%24650%2C000%0D%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%3C%2Fstrong%3E%2035%0D%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%20%3C%2Fstrong%3ESeries%20A%0D%3Cbr%3E%3Cstrong%3EInvestors%3A%20%3C%2Fstrong%3EVarious%20institutional%20investors%20and%20notable%20angel%20investors%20(500%20MENA%2C%20Shurooq%2C%20Mada%2C%20Seedstar%2C%20Tricap)%3C%2Fp%3E%0A

The UAE Today

The latest news and analysis from the Emirates

      By signing up, I agree to The National's privacy policy
      The UAE Today