Iranian hacker group targeted US defense companies


Iran's hackers are stepping up their game, according to a new report from security researchers at FireEye. Earlier this year, an Iranian hacking group called Ajax Security Team targeted US defense contractors at an IEEE aerospace convention, using spear phishing emails to plant keylogging malware on unwitting victims' computers. If the contractors took the bait, installing the phony "proxy" program that was actually Ajax malware, the program would log keystrokes, take periodic screenshots, and automatically extract logins and passwords from browsers and chat programs. Ajax also targeted Iranians trying to bypass the country's oppressive web controls, distributing similar malware bundled with VPN and proxy software like Psiphon and Ultrasurf.

Automatically extracting logins and passwords

In both cases, the Ajax group was going after enemies of the state, but since the group also engages in run-of-the-mill theft, it's unclear where their ultimate loyalties lie. Like the group that hacked the US Navy network earlier this year, they may be more akin to privateers, taking on the government as only one of many clients. As FireEye puts it, "there is a considerable grey area between the cyber espionage capabilities of Iran’s hacker groups and any direct Iranian government or military involvement."

The group first formed in 2010, organizing Anonymous-style web defacement that targeted "anti-revolution and political websites against the Islamic Republic." But as the latest report shows, the group has grown more ambitious in recent months, taking on more ambitious targets with more sophisticated tools. At least one of the malware tools seems to have been custom-built for Ajax, indicating an unusual level of technical skill.

More from The Verge

Back to top ^
Log In Sign Up

Log In Sign Up

Please choose a new Verge username and password

As part of the new Verge launch, prior users will need to choose a permanent username, along with a new password.

Your username will be used to login to Verge going forward.

I already have a Vox Media account!

Verify Vox Media account

Please login to your Vox Media account. This account will be linked to your previously existing Eater account.

Please choose a new Verge username and password

As part of the new Verge launch, prior MT authors will need to choose a new username and password.

Your username will be used to login to Verge going forward.

Forgot password?

We'll email you a reset link.

If you signed up using a 3rd party account like Facebook or Twitter, please login with it instead.

Forgot password?

Try another email?

Almost done,

By becoming a registered user, you are also agreeing to our Terms and confirming that you have read our Privacy Policy.



Choose an available username to complete sign up.

In order to provide our users with a better overall experience, we ask for more information from Facebook when using it to login so that we can learn more about our audience and provide you with the best possible experience. We do not store specific user data and the sharing of it is not required to login with Facebook.