KIX 92.1Oldies 98.397.9 The BeatQ-102Delta Country 105.7Star 101KIX 92.7WNIXWNLA AM 1380

Iranian nationals charged in alleged ransomware conspiracy

(NEWARK, N.J.) — Three Iranian nationals attempted to hack into hundreds of computers in the U.S. and around the world, demanding, and sometimes getting, a ransom, according to an indictment unsealed Wednesday.

The four-count grand jury indictment returned in Newark federal court charged the trio with hacking conspiracy, two counts of computer hacking and a count of computer extortion over an alleged ransomware conspiracy that targeted a range of organizations and critical infrastructure sectors such as healthcare centers, power companies and transportation services inside the U.S. and abroad.

Mansour Ahmadi, Ahmad Aghda, and Amir Ravari hacked into hundreds of computers inside the U.S. and around the world by often exploiting known vulnerabilities in network devices or software programs, the indictment said.

Once they gained access to an organization or company’s software, they would use a program known as BitLocker to encrypt data on their victims’ systems and demand a ransom either by threatening to release stolen data or keeping the data encrypted unless they were paid — at times making demands for hundreds of thousands of dollars, according to the court filing.

The three men would often send their demands to office printers. Prosecutors detailed some of the correspondence they had with their victims. Some of those targeted include a domestic violence center, which Khatibi is alleged to have extorted $13,000 from, a housing authority, which he demanded $500,000 ransom from, and the computer systems of a U.S. township and county, the indictment said.

The indictment did not allege involvement by the government of Iran. Instead, the three demanded the money be paid to themselves, it said, although a U.S. official told reporters the Iranian government’s lax laws could share the blame for failing go after actors who engage in this type of alleged conspiracy. The official said all three men are still believed to be within Iran and have not been arrested, and acknowledged it’s unlikely any will see the inside of a U.S. courtroom.

Accompanying the announcement of the indictment, the FBI will release a new joint cybersecurity bulletin with international partners that will identify the tactics, techniques and procedures of advanced cyber threat actors believed to be affiliated with the Iranian government’s Iranian Revolutionary Guard Corps, or IRGC.

The hackers are believed to be “actively targeting” a broad range of entities across multiple critical infrastructure sectors inside the U.S., Australia, Canada and the U.K., the bulletin will say, and have even targeted victims within Iran. Specifically in the U.S, the IRGC-affiliated actors carried out ransomware attacks against a police department, a regional transportation system, a municipal government and a U.S. aerospace company.

On the heels of this indictment, U.S. law enforcement agencies and international partners are warning of “continued malicious cyber activity” by accounts associated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC).

“The IRGC-affiliated actors are actively targeting a broad range of entities, including entities across multiple U.S. critical infrastructure sectors as well as Australian, Canadian, and United Kingdom organizations,” the advisory said, noting the specific alleged hacking group, Najee Technology Hooshmand Fater LLC. The authoring agencies assess the actors are exploiting known vulnerabilities on unprotected networks rather than targeting specific targeted entities or sectors. “The IRGC-affiliated actors have used their access for ransom operations, including disk encryption and extortion efforts. After gaining access to a network, the IRGC-affiliated actors likely determine a course of action based on their perceived value of the data. Depending on the perceived value, the actors may encrypt data for ransom and/or exfiltrate data.”

Copyright © 2022, ABC Audio. All rights reserved.