September 27, 2023

A threat actor behind a set of disruptive cyberattacks against Albanian government services is now linked with Iran

The attack took place on mid july 2022, forced the government to temporarily close access to online public services and other government websites because of a synchronized and sophisticated cybercriminal attack from outside Albania.

Advertisements

This disruptive operation, lead to the deployment of a new ransomware family called ROADSWEEP.

An Albanian user submitted a sample for what’s called ZeroCleare on July 19, coinciding with the attacks.

ZeroCleare, targeting the industrial and energy sectors in the Middle East, is designed to wipe the MBR and disk partitions on Windows-based machines. It’s believed to be a collaborative effort between different Iranian nation-state actors, including OilRig.

An unknown backdoor dubbed CHIMNEYSWEEP also deployed that’s capable of taking screenshots, listing and collecting files, spawning a reverse shell, and supporting keylogging functionality.

The earliest iterations of CHIMNEYSWEEP date back to 2012 and indications are that the malware may have been utilized in attacks aimed at Farsi and Arabic speakers.

The connections to Iran stem from the fact that the attacks took place less than a week prior to the World Summit of Free Iran conference on July 23-24 near the port city of Durres by entities opposing the Iranian government, particularly the members of the MEK.

Advertisements

This research was conducted and documented by researchers from Mandiant

Indicators of Compromise

  • df9ab47726001883b5fcf58b56b34b41
  • 19068e8228b6b8f5528489fa70779b2b
  • 8c8bbe3a4a23cd4cc96c12af5fb1199b
  • f3c977830bf616b9061d7aee5ce0b2f2
  • 7f6db4493c6a76eb44534306291ea85f
  • 3a1033cb1eb06c2cd5e91c539cf8a519
  • 23643b7bd48a200889a4613a0e0a86e4
  • 49d72f9212d5653f5be9f764d8c9df24
  • 77a369e5e49e7e62d8eef2c00cd02950
  • 92c61e3047297136701c25deb658b35a

1 thought on “Mandiant says Iran is behind Albania Cyber Attack

Leave a Reply

%d bloggers like this: