The Transform Technology Summits start October 13th with Low-Code/No Code: Enabling Enterprise Agility. Register now!
(Reuters) — A hacking group that appears to be linked to the Iranian government has carried out a campaign against a U.S. presidential campaign, Microsoft said on Friday.
Microsoft saw “significant” cyber activity by the group that also targeted current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran, the company said in a blog post.
In a 30-day period between August and September, the group, called “Phosphorous” by the company, made more than 2,700 attempts to identify consumer email accounts belonging to specific customers and then attacked 241 of those accounts.
Hacking to interfere in elections has become a concern for governments especially since United States intelligence agencies concluded that Russia ran a hacking and propaganda operation to disrupt the American democratic process in 2016 to help then-Republican candidate Donald Trump become president. Moscow has denied any interference.
In addition, tensions between the United States and Iran have risen since May 2018 when Trump withdrew from a 2015 international nuclear accord with Tehran that put limits on its nuclear program in exchange for easing of sanctions. Trump has since re-instated U.S. sanctions, putting increased pressure on the Iranian economy, including its oil trade.
The Iranian government did not issue any immediate comment through state-run media on Microsoft’s statement of any link to Phosphorous.
Microsoft said Phosphorous used information gathered from researching their targets or other means to game password reset or account recovery features and attempt to take over some targeted accounts.
The attacks disclosed by the company on Friday were not technically sophisticated, the blog said. Hackers tried to use a significant amount of personal information to attack targets, it said.
“This effort suggests Phosphorous is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering,” the software company said in a blog post.
Microsoft has been tracking Phosphorus since 2013 and said in March that it had received a court order to take control of 99 websites the group used to execute attacks.
The company said it had notified the customers related to the investigations and threats and has worked with those whose accounts were compromised to secure them.
Phosphorus is also known as APT 35, Charming Kitten, and Ajax Security Team, according to Microsoft.
VentureBeatVentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact. Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:
- up-to-date information on the subjects of interest to you
- our newsletters
- gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
- networking features, and more