Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Microsoft pinpoints an Iranian ransomware group

Microsoft pinpoints an Iranian ransomware group

Microsoft's threat intelligence team announced that detected a new group from Iran that launches ransomware attacks.


Erdem Yasar Erdem Yasar
September 8, 2022
3 min read
Microsoft pinpoints an Iranian ransomware group
  • Microsoft warns organizations about a new emerging threat from Iran, DEV-0270, also known as Nemesis Kitten, is a sub-group of PHOSPHORUS.
  • According to Microsoft’s claims, the group is conducting widespread vulnerability scanning, on behalf of the government of Iran.
  • The group is known for the early adoption of newly disclosed vulnerabilities, to gain access to devices.

Microsoft announced that its threat intelligence team has been tracking multiple ransomware campaigns and found out that these campaigns are related to DEV-0270. The group, also known as Nemesis Kitten, is a sub-division of PHOSPHORUS. According to Microsoft’s report, the group is conducting widespread vulnerability scanning, on behalf of the Iranian government. 

Nemesis Kitten

The group is using exploits for known vulnerabilities to gain access to devices, mostly benefiting from newly disclosed vulnerabilities. The group is also using living-off-the-land binaries during the attack chain for discovery and credential access. In some cases, the time to ransom between initial access and the ransom note was approximately two days.

The group demands $8,000 for decryption keys. If the victim denies paying the ransom, the group posts the stolen data for sale as an SQL database dump. Microsoft states that the group is operated by a company that functions under two public aliases: Secnerd and Lifeweb. There are multiple infrastructure overlaps between the group and Secnerd/Lifeweb. The organizations are also linked to Najee Technology Hooshmantd, located in Karaj, Iran.

In most of the instances, the group gained access by exploiting a vulnerability, tracked as CVE-2018-13379, found in Exchange or Fortinet. The Iranian group also tried to exploit Log4j 2 vulnerabilities but didn’t use it against customers to deploy ransomware. Microsoft also stated that the techniques used by DEV-0270 can be mitigated through the following actions:

  • Apply the corresponding security updates for Exchange Server, including applicable fixes for CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and CVE-2021-27065. While it is important to prioritize patching of internet-facing Exchange servers to mitigate risk in an ordered manner, unpatched internal Exchange Server instances should also be addressed as soon as possible.
  • Use Microsoft Defender Firewall, intrusion prevention devices, and your network firewall to prevent RPC and SMB communication among devices whenever possible. This limits lateral movement and other attack activities.
  • Check your perimeter firewall and proxy to restrict or prevent network appliances like Fortinet SSL VPN devices from making arbitrary connections to the internet to browse or download files.
  • Enforce strong local administrator passwords. Use tools like LAPS.
  • Ensure that Microsoft Defender Antivirus is up to date and that real-time behavior monitoring is enabled.
  • Keep backups so you can recover data affected by destructive attacks. Use controlled folder access to prevent unauthorized applications from modifying protected files.

Microsoft’s threat intelligence team said,

« DEV-0270 has been seen using setup.bat commands to enable BitLocker encryption, which leads to the hosts becoming inoperable. For workstations, the group uses DiskCryptor, an open-source full disk encryption system for Windows that allows for the encryption of a device’s entire hard drive. The group drops DiskCryptor from an RDP session and when it is launched, begins the encryption. This method does require a reboot to install and another reboot to lock out access to the workstation.

Microsoft will continue to monitor DEV-0270 and PHOSPHORUS activity and implement protections for our customers. The current detections, advanced detections, and IOCs in place across our security products. »

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Microsoft
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
KDE Plasma 5.25.5 brings various bug fixes

KDE Plasma 5.25.5 brings various bug fixes

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming
  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.