Ongoing cyber attacks target Iran's fuel distribution system

CybersecurityHQ News

Welcome reader to your CybersecurityHQ report.

Headlines

A significant cyber attack rocked Iran’s fuel distribution system this week. Oil Minister Javad Owji pointed to government-linked threat actors in Israel and the United States as likely culprits. The attack led to 60% of the country’s petrol stations to reject payment cards that are used as part of Iran’s monthly subsidy to citizens — allowing them to buy 60 liters per month at a low rate. President Ebrahim Raisi has called for an immediate investigation, and government authorities have already established a crisis committee to address the situation.

This isn’t the first attack of its kind that Iran has suffered. A similar week-long issue happened in October 2021, also likely caused by external cyber attackers. Iran started the fuel card system in 2007 in order to simplify petrol subsidies and reduce smuggling. The program has become an important part of Iran's fuel economy, which now faces added challenges due to sanctions following the U.S.’s withdrawal from the nuclear agreement in 2018. 

Two British teenagers are getting coal in their stocking this year, both involved with the LAPSUS$ cybercrime group and have been officially sentenced for high-profile attacks against major companies. Arion Kurtaj, 18, from Oxford, received an indefinite hospital order due to his autism and a stated intention to continue cybercrimes, and he has since been deemed unfit to stand trial. The other is a 17-year-old who has now been sentenced to an 18-month Youth Rehabilitation Order. Their crimes include fraud, computer misuse, and blackmail. This isn’t their first run-in with the law, being arrested in January 2022, released, then re-arrested in March. Kurtaj continued his attacks even after bail, leading to another arrest in September.

From August 2020 to September 2022, the two were involved in several high-profile attacks. Their targets include such names as Microsoft, NVIDIA, and Uber. LAPSUS$ is notorious for SIM-swapping attacks and publicizing operations via Telegram. A DHS report highlighted their methods. Detective Chief Superintendent Amanda Horsburgh of the City of London Police highlighted the case as a warning about the dangers and allure of the digital world for young people.

Cybersecurity researchers have identified an updated version of the Chameleon Android banking malware, now targeting users in the U.K. and Italy. This advanced variant, documented by Dutch mobile security firm ThreatFabric, uses the Android accessibility service to take over devices (DTO) and expand its geographic targets. Chameleon exploits permissions to steal sensitive data and perform overlay attacks, previously impersonating organizations like the Australian Taxation Office and CoinSpot to seem credible.

The new iteration of Chameleon is distributed via Zombinder, a dropper-as-a-service (DaaS), which binds malicious payloads to legitimate apps. Despite its suspected shutdown earlier this year, Zombinder resurfaced with capabilities to bypass Android's 'Restricted Settings' and install malware. The Chameleon malware, disguised as Google Chrome, prompts users on Android 13 or later to enable accessibility services. It also uses Android APIs to disrupt biometric operations, covertly changing the lock screen authentication to a PIN, allowing unauthorized access.

Interesting Read

Aksgay Joshi, writing for the World Economic Forum, outlines the six stories that defined cybersecurity in 2023 in this blog post. Major events punctuated an already busy year — like the largest-ever DDoS attack. That highlights the escalating sophistication of cyber threats. Key developments also include the U.S.'s new National Cybersecurity Strategy under President Biden, aiming to fortify cyberspace and champion digital safety. The notable "Operation Cookie Monster" crackdown dismantled Genesis Market, a massive online illicit marketplace, marking a significant triumph against global cybercrime. 

The article also explores the contentious "right to be forgotten" debate, balancing privacy with potential censorship concerns. Joshi also touches on the cybersecurity skills gap — with an estimated need for 3.4 million experts, especially in critical infrastructure sectors. These stories collectively underscore the urgent need for enhanced cyber resilience and global cooperation in 2024 and beyond.

Cybersecurity Career Opportunities

For the latest openings in cybersecurity careers, check CybersecurityHQ.

Stay Safe, Stay Secure.

The CybersecurityHQ Team