Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    You can now preorder the wireless GameCube controller for Switch 2

    May 13, 2025

    TikTok will let you use an AI prompt to turn a photo into a video

    May 13, 2025

    YouTube will stream an opening week NFL game for free

    May 13, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor
    Security

    Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor

    News RoomBy News RoomAugust 31, 20244 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    The Iranian government-backed hacking group known as APT 33 has been active for more than 10 years, conducting aggressive espionage operations against a diverse array of public and private sector victims around the world, including critical infrastructure targets. And while the group is particularly known for strategic but technically simple attacks like “password spraying,” it has also dabbled in developing more sophisticated hacking tools, including potentially destructive malware tailored to disrupt industrial control systems. Now, findings from Microsoft released on Wednesday indicate that the group is continuing to evolve its techniques with a new multistage backdoor.

    Microsoft Threat Intelligence says that the group, which it calls Peach Sandstorm, has developed custom malware that attackers can use to establish remote access into victim networks. The backdoor, which Microsoft named “Tickler” for some reason, infects a target after the hacking group gains initial access via password spraying or social engineering. Beginning in April and as recently as July, the researchers observed Peach Sandstorm deploying the backdoor against victims in sectors including satellite, communications equipment, and oil and gas. Microsoft also says that the group has used the malware to target federal and state government entities in the United States and the United Arab Emirates.

    “The Tickler malware isn’t necessarily a big step up in tactics, techniques, and procedures for this threat actor, but it does represent a clear and active development focus on taking action on objectives,” Sherrod DeGrippo, Microsoft’s director of threat intelligence, told WIRED in a statement.

    The researchers observed Peach Sandstorm deploying Tickler and then manipulating victim Azure cloud infrastructure using the hackers’ Azure subscriptions to gain full control of target systems. Microsoft says that it has notified customers who were impacted by the targeting.

    The gang has also continued its low-tech password spraying attacks, according to Microsoft, in which hackers attempt to access many target accounts by guessing leaked or common passwords until one lets them in. Peach Sandstorm has been using this technique to gain access to target systems both to infect them with the Tickler backdoor and for other types of espionage operations. Since February 2023, the researchers say they have observed the hackers “carrying out password spray activity against thousands of organizations.” And in April and May 2024, Microsoft observed Peach Sandstorm using password spraying to target United States and Australian organizations that are in the space, defense, government, and education, sectors.

    “Peach Sandstorm also continued conducting password spray attacks against the educational sector for infrastructure procurement and against the satellite, government, and defense sectors as primary targets for intelligence collection,” Microsoft wrote.

    The researchers say that, in addition to this activity, the gang has been continuing its social engineering operations on the Microsoft-owned professional social network LinkedIn, which they say date back to at least November 2021 and have continued into mid-2024. Microsoft observed the group setting up LinkedIn profiles that purport to be students, software developers, and talent acquisition managers who are supposedly based in the US and Western Europe.

    “Peach Sandstorm primarily used [these accounts] to conduct intelligence gathering and possible social engineering against the higher education, satellite sectors, and related industries,” Microsoft wrote. “The identified LinkedIn accounts were subsequently taken down.”

    Microsoft’s DeGrippo points out that while the new campaigns are noteworthy, Peach Sandstorm has targeted the space industry before.

    “This is not the first time Peach Sandstorm has shown interest in satellite-related targeting. This threat actor had [previously] pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe,” DeGrippo says. “This backdoor is custom malware with multiple iterations. It shows a focus and commitment to leveraging malware for specific objectives.”

    Iranian hackers have been prolific and aggressive on the international stage for years and have shown no signs of slowing down. Earlier this month, reports surfaced that a different Iranian group has been targeting the 2024 US election cycle, including attacks against both the Trump and Harris campaigns.

    Updated at 5:35 pm ET, August 28, 2024: Added comments from Microsoft’s director of threat intelligence.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleFDA Approves New Covid Vaccines Amid Summer Surge
    Next Article How Star Wars walked away from the world’s first self-retracting lightsaber toy

    Related Posts

    ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador

    May 13, 2025

    US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car

    May 13, 2025

    The Trump Administration Sure Is Having Trouble Keeping Its Comms Private

    May 12, 2025

    Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage

    May 10, 2025

    The Signal Clone Mike Waltz Was Caught Using Has Direct Access to User Chats

    May 8, 2025

    Tulsi Gabbard Reused the Same Weak Password on Multiple Accounts for Years

    May 7, 2025
    Our Picks

    TikTok will let you use an AI prompt to turn a photo into a video

    May 13, 2025

    YouTube will stream an opening week NFL game for free

    May 13, 2025

    Trump Appointees Blocked From Entering US Copyright Office

    May 13, 2025

    Samsung’s Music Frame speaker is more of a bargain at 69 percent off

    May 13, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    PayPal launches iPhone NFC payments in Germany after EU forced Apple to open up

    By News RoomMay 13, 2025

    PayPal’s contactless wallet works with terminals that support Mastercard payments and is iPhone-only for now,…

    ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador

    May 13, 2025

    Here’s where you can preorder Samsung’s ultra-thin S25 Edge

    May 13, 2025

    The Best Heart Rate Monitors to Check Your Cardiac Health

    May 13, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.