ReportWire

Tag: Cybercrime

  • NW3C and NCJTC Partner to Host National Internet of Things (IoT) and Emerging Technologies Investigative Conference in Las Vegas

    NW3C and NCJTC Partner to Host National Internet of Things (IoT) and Emerging Technologies Investigative Conference in Las Vegas

    Press Release


    Oct 7, 2024

    This premier event promises to once again bring together law enforcement professionals, industry experts, and subject matter experts to explore the transformative role and impact of IoT technology on criminal investigations and community safety.

    The National White Collar Crime Center (NW3C) and the National Criminal Justice Training Center of Fox Valley Technical College (NCJTC) are excited to announce their collaborative partnership for the National Internet of Things (IoT) and Emerging Technologies Investigative Conference, taking place from January 14-16, 2025, in Las Vegas, Nevada. This premier event promises to bring together law enforcement professionals, industry experts, and subject matter experts to explore the transformative role and impact of IoT technology on criminal investigations and community safety.

    As the landscape of IoT devices continues to expand, their significance in modern investigations is becoming increasingly vital. This conference aims to equip law enforcement and investigative professionals with the essential tools and knowledge to effectively leverage IoT technology in their work. Attendees participating in the 2025 event can anticipate expanded sessions, hands-on workshops, and networking opportunities designed to empower attendees to stay at the forefront of IoT advancements in criminal justice.

    Event highlights include:

    • Explore Emerging Technologies: Discover the latest advancements in IoT and related technologies that can enhance investigative efforts.
    • Investigative Techniques for Technology-Driven Cases: Learn innovative methods for analyzing data from connected devices to strengthen case-building strategies.
    • Navigating the IoT Landscape: Gain insights into the legal and technical challenges of working with IoT data and discover practical solutions for overcoming them.

    “IoT technology is transforming the way law enforcement approaches investigations,” said Glen Gainer, President and CEO of NW3C. “This conference is a critical opportunity for professionals to learn, collaborate, and stay ahead of the curve as IoT devices continue to reshape the investigative landscape.”

    “Our partnership leverages NW3C’s 40-year history of supporting law enforcement investigators’ technology-based investigations and our ongoing collaboration to provide cutting-edge training in emerging areas of need,” said Brad Russ the Executive Director for NCJTC. NW3C and NCJTC are excited to welcome hundreds of law enforcement professionals, industry experts, and technology enthusiasts to this groundbreaking conference, where they can explore the opportunities and challenges presented by the ever-expanding IoT landscape.

    Join us in January 2025 to advance your understanding of IoT’s impact on law enforcement and to network with fellow professionals dedicated to enhancing community safety through technology.

    For more information, view the current agenda, and registration details, please visit www.ncjtc.org/IoT.

    Source: NW3C

    Source link

  • Alleged plots against US campaign are only the latest examples of Iran targeting adversaries

    Alleged plots against US campaign are only the latest examples of Iran targeting adversaries

    DUBAI, United Arab Emirates — Iran has emerged as a twofold concern for the United States as it nears the end of the presidential campaign.

    Prosecutors allege Tehran tried to hack figures associated with the election, stealing information from former President Donald Trump’s campaign. And U.S. officials have accused it of plotting to kill Trump and other ex-officials.

    For Iran, assassination plots and hacking aren’t new strategies.

    Iran saw the value and the danger of hacking in the early 2000s, when the Stuxnet virus, believed to have been deployed by Israel and the U.S., tried to damage Iran’s nuclear program. Since then, hackers attributed to state-linked operations have targeted the Trump campaign, Iranian expatriates and government officials at home.

    Its history of assassinations goes back further. After the 1979 Islamic Revolution, Iran killed or abducted perceived enemies living abroad.

    A look at Iran’s history of targeting opponents:

    For many, Iran’s behavior can be traced to the emergence of the Stuxnet computer virus. Released in the 2000s, Stuxnet wormed its way into control units for uranium-enriching centrifuges at Iran’s Natanz nuclear facility, causing them to speed up, ultimately destroying themselves.

    Iranian scientists initially believed mechanical errors caused the damage. Ultimately though, Iran removed the affected equipment and sought its own way of striking enemies online.

    “Iran had an excellent teacher in the emerging art of cyberwarfare,” wryly noted a 2020 report from the King Faisal Center for Research and Islamic Studies in Saudi Arabia.

    That was acknowledged by the National Security Agency in a document leaked by former NSA contractor Edward Snowden in 2015 to The Intercept, which examined a cyberattack that destroyed hard drives at Saudi Arabia’s state oil company. Iran has been suspected of carrying out that attack, called Shamoon, in 2012 and again in 2017.

    “Iran, having been a victim of a similar cyberattack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others,” the document said.

    There also were domestic considerations. In 2009, the disputed reelection of hard-line President Mahmoud Ahmadinejad sparked the Green Movement protests. Twitter, one source of news from the demonstrations, found its website defaced by the self-described “Iranian Cyber Army.” There’s been suspicion that the Revolutionary Guard, a major power base within Iran’s theocracy, oversaw the “Cyber Army” and other hackers.

    Meanwhile, Iran itself has been hacked repeatedly in embarrassing incidents. They include the mass shutdown of gas stations across Iran, as well as surveillance cameras at Tehran’s notorious Evin Prison and even state television broadcasts.

    Iranian hacking attacks, given their low cost and high reward, likely will continue as Iran faces a tense international environment surrounding Israel’s conflicts with Hamas and Hezbollah, Iran’s enrichment of uranium to near weapons-grade levels and the prospect of Trump becoming president again.

    The growth of 3G and 4G mobile internet services in Iran also made it easier for the public — and potential hackers — to access the internet. Iran has over 50 major universities with computer science or information technology programs. At least three of Iran’s top schools are thought to be affiliated with Iran’s Defense Ministry and the Guard, providing potential hackers for security forces.

    Iranian hacking attempts on U.S. targets have included banks and even a small dam near New York City — attacks American prosecutors linked to the Guard.

    While Russia is seen as the biggest foreign threat to U.S. elections, officials have been concerned about Iran. Its hacking attempts in the presidential campaign have relied on phishing — sending many misleading emails in hopes that some recipients will inadvertently provide access to sensitive information.

    Amin Sabeti, a digital security expert who focuses on Iran, said the tactic works.

    “It’s scalable, it’s cheap and you don’t need a skill set because you just put, I don’t know, five crazy people who are hard line in an office in Tehran, then send tens of thousands of emails. If they get 10 of them, it’s enough,” he said.

    For Iran, hacks targeting the U.S. offer the prospect of causing chaos, undermining Trump’s campaign and obtaining secret information.

    “I’ve lost count of how many attempts have been made on my emails and social media since it’s been going on for over a decade,” said Holly Dagres, a nonresident senior fellow at the Atlantic Council who once had her email briefly hacked by Iran. “The Iranians aren’t targeting me because I have useful information swimming in my inbox or direct messages. Rather, they hope to use my name and think tank affiliation to target others and eventually make it up the chain to high-ranking U.S. government officials who would have useful information and intelligence related to Iran.”

    Iran has vowed to exact revenge against Trump and others in his former administration over the 2020 drone strike that killed the prominent Revolutionary Guard Gen. Qassem Soleimani in Baghdad.

    In July, authorities said they learned of an Iranian threat against Trump and boosted security. Iran has not been linked to the assassination attempts against Trump in Florida and Pennsylvania. A Pakistani man who spent time in Iran was recently charged by federal prosecutors for allegedly plotting to carry out assassinations in the U.S., including potentially of Trump.

    Officials take Iran’s threat seriously given its history of targeting adversaries.

    After the 1979 Islamic Revolution, its leader Ayatollah Ruhollah Khomeini signaled how Iran would target perceived enemies by saying, “Islam grew with blood.”

    “The great prophet of Islam, he had the Quran in one hand, and a sword in the other hand — a sword to suppress traitors,” Khomeini said.

    Even before creating a network of allied militias in the Mideast, Iran is suspected of targeting opponents abroad, beginning with members of Shah Mohammad Reza Pahlavi’s former government. The attention shifted to perceived opponents of the theocracy, both in the country with the mass executions of 1988 and abroad.

    Outside of Iran, the so-called “chain murders” targeted activists, journalists and other critics. One prominent incident linked to Iran was a shooting at a restaurant in Germany that killed three Iranian-Kurdish figures and a translator. In 1997, a German court implicated Iran’s top leaders in the shooting, sparking most European Union nations to withdraw their ambassadors.

    Iran’s targeted killings slowed after that, but didn’t stop. U.S. prosecutors link Iran’s Revolutionary Guard to a 2011 plot to kill the Saudi ambassador to Washington. Meanwhile, a suspected Israeli campaign of assassinations targeted scientists in Iran’s nuclear program.

    In 2015, Iran signed a nuclear deal that saw it greatly reduce its enrichment in exchange for the lifting of sanctions. Two years later, Trump was elected pledging to unilaterally withdraw America from the accord. As businesses backed away from Iran, Tehran renewed a campaign of targeting opponents abroad, but this time capturing them and bringing them to Iran for trial.

    Belgium arrested an Iranian diplomat, Assadollah Assadi, in 2018 and ultimately convicted him of masterminding a thwarted bomb attack against an exiled Iranian opposition group. Iran also increasingly has turned to criminal gangs for some attempts, such as what U.S. prosecutors have described as plots to kill or kidnap opposition activist Masih Alinejad.

    Among those targeted after Soleimani’s death was former U.S. national security adviser John Bolton. The U.S. has offered a reward of up to $20 million for information leading to the capture or conviction of a Revolutionary Guard member it said arranged to kill Bolton for $300,000.

    An FBI agent quoted Guard Gen. Esmail Ghaani as saying in 2022 in a court filing, “Wherever is necessary we take revenge against Americans by the help of people on their side and within their own homes without our presence.”

    Source link

  • Colorado judge who sentenced election denier Tina Peters to prison receives threats

    Colorado judge who sentenced election denier Tina Peters to prison receives threats

    A rural Colorado county courthouse beefed up security Friday after threats were made against staff and a judge who sentenced former county clerk Tina Peters to nearly nine years behind bars and admonished her for her role in a data breach scheme catalyzed by the lie that the 2020 election was stolen from former President Donald Trump.

    Courthouse staff in Grand Junction, Colorado, received multiple threats that were being vetted by law enforcement while extra security was provided, said spokesperson Wendy Likes with the Mesa County Sheriff’s Office.

    She did not say how many threats were made or how they were received. She also declined to describe the extra security.

    The court received compliments as well as threats for Judge Matthew Barrett’s sentencing of Peters, Will Sightler, the court executive of the 21st Judicial District, said in a statement Friday. He didn’t elaborate on what the compliments said.

    Peters, a Republican, was sentenced Thursday for allowing access to the county’s election system to a man affiliated with My Pillow chief executive Mike Lindell — a prominent promoter of false claims that voting machines were manipulated to steal the election.

    The one-time hero to election deniers, who was convicted in August, was unapologetic about what happened during the sentencing hearing Thursday — leading Judge Barrett to chastise her during a 15-minute speech that was shared widely online.

    He told Peters she sought power and fame in pursuing false election fraud claims, causing immeasurable damage to election integrity in Mesa County. He said she had no respect for the checks and balances of government, for the court, law enforcement or her colleagues and that she betrayed her oath of office, making her a danger to the community.

    “It’s the position she held that has provided her with the pulpit from which she can preach these lies,” Barrett said. “Every effort to undermine the integrity of our elections and public’s trust in our institutions has been made by you.”

    Peters, 68, isn’t the only person who has faced legal troubles for pursuing Trump’s claims of a stolen election.

    Three people were charged after five vote tabulators were illegally taken from three Michigan counties and brought to a hotel room, according to court documents. Investigators found the tabulators were broken into and “tests” were performed on the equipment.

    Former New York Mayor Rudy Giuliani has been disbarred in New York and Washington for pursuing Trump’s claims about the 2020 election. Other Trump lawyers have been disciplined, relinquished their licenses, indicted or have pleaded guilty in relation to efforts to overturn the election. Hundreds of people have been convicted for their roles in storming the U.S. Capitol on Jan. 6, 2021, as Congress was certifying the Electoral College vote.

    Before Peters was sentenced, she told Judge Barrett she still believed there had been fraud, even though no evidence exists.

    “Just because you don’t acknowledge and you’re blind to the truth, it doesn’t mean that the truth is not there,” she said. She also alleged Mesa County’s voting machines had been replaced to eliminate evidence of fraud.

    Cases like Peters’ raised concerns that that rogue election workers, including those sympathetic to lies about the 2020 presidential election, might use their access to election equipment and the knowledge gained through the breaches to launch an attack from within. That could be intended to gain an advantage for their desired candidate or party, or to introduce system problems that would sow further distrust in the election results.

    Gillian Feiner, senior counsel with States United Democracy Center — a nonpartisan organization that promotes free and fair elections — said Friday she hopes Peters’ sentence serves as a “meaningful deterrent to others who are still engaged in this type of misconduct.”

    “And there are others. She was not in this alone,” Feiner said. “There was a network of bad actors supporting her. And not all of them have been brought to justice. And they were paying attention to this.”

    Judge Barrett rejected Peters’ request for a probationary sentence, saying her crimes are serious enough to require prison time.

    Barrett did tell Peters that she likely won’t serve her entire term — which is just over 8 years in prison followed by six months in the county jail — because she could be granted time off based on her behavior in prison. Her sentence will be followed by three years on parole.

    Source link

  • The US and Microsoft disrupt a Russian hacking group targeting American officials and nonprofits

    The US and Microsoft disrupt a Russian hacking group targeting American officials and nonprofits

    WASHINGTON — A hacking group tied to Russian intelligence tried to worm its way into the systems of dozens of Western think tanks, journalists and former military and intelligence officials, Microsoft and U.S. authorities said Thursday.

    The group, known as Star Blizzard to cyberespionage experts, targeted its victims with emails that appeared to come from a trusted source — a tactic known as spear phishing. In fact, the emails sought access to the victims’ internal systems, as a way to steal information and disrupt their activities.

    Star Blizzard’s actions were persistent and sophisticated, according to Microsoft, and the group often did detailed research on its targets before launching an attack. Star Blizzard also went after civil society groups, U.S. companies, American military contractors and the Department of Energy, which oversees many nuclear programs, the company said.

    On Thursday, a U.S. court unsealed documents authorizing Microsoft and the Department of Justice to seize more than 100 website domain names associated with Star Blizzard. That action came after a lawsuit was filed against the network by Microsoft and the NGO-Information Sharing and Analysis Center, a nonprofit tech organization that investigated Star Blizzard.

    Authorities haven’t gone into details about Star Blizzard’s effectiveness but said they expect Russia to keep deploying hacking and cyberattacks against the U.S. and its allies.

    “The Russian government ran this scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials,” Deputy Attorney General Lisa Monaco said in announcing the U.S. actions against Star Blizzard. “With the continued support of our private sector partners, we will be relentless in exposing Russian actors and cybercriminals and depriving them of the tools of their illicit trade.”

    Star Blizzard has been linked to Russia’s Federal Security Service, or FSB. Last year, British authorities accused the group of mounting a yearslong cyberespionage campaign against U.K. lawmakers. Microsoft said it has been tracking the group’s activities since 2017.

    Microsoft said it observed Star Blizzard attempt dozens of hacking efforts targeting 30 different groups since January 2023. The tech giant’s cybersecurity experts say Star Blizzard has proven to be especially elusive.

    “Star Blizzard’s ability to adapt and obfuscate its identity presents a continuing challenge for cybersecurity professionals,” the company wrote in a report on its findings.

    U.S. authorities charged two Russian men last year in connection with Star Blizzard’s past actions. Both are believed to be in Russia.

    Along with American targets, Star Blizzard went after people and groups throughout Europe and in other NATO countries. Many had supported Ukraine following Russia’s invasion.

    A message left with the Russian Embassy in Washington was not immediately returned Thursday.

    Source link

  • Dutch government blames a ‘state actor’ for hacking a police network

    Dutch government blames a ‘state actor’ for hacking a police network

    THE HAGUE, Netherlands — A cyberattack that broke into a police account and accessed work-related contact details of all Dutch police officers was almost certainly carried out by hackers working for a foreign government, the justice minister told lawmakers.

    Dutch intelligence agencies “consider it highly likely that a state actor is responsible,” Justice and Security Minister David van Weel wrote in a letter to lawmakers on Wednesday night about the breach, which was first revealed last Friday.

    He added that “police, together with national security partners, are doing everything they can to protect police employees and prevent further damage.”

    Van Weel did not give further details, citing an ongoing investigation into the data breach. The Dutch police force is the country’s biggest employer with nearly 63,000 staff.

    Nine Kooiman, chair of the Netherlands Police Union, called the hack “a nightmare. It is now important to protect data, protect colleagues” and track down the perpetrators.

    The government said last week that the hack did not reveal personal details of police officers beyond their names or details about ongoing investigations.

    Dutch police chief Janny Knol said she had spoken to staff about their concerns following news of the data breach, noting they were “concerns that I share, because in order to ensure safety outside, you have to feel safe inside.”

    The Dutch General Intelligence and Security Service warned last year in its annual report that countries including China and Russia were actively engaged in cyberattacks and espionage targeting national interests in the Netherlands.

    Source link

  • Iran was behind thousands of text messages calling for revenge over Quran burnings, Sweden says

    Iran was behind thousands of text messages calling for revenge over Quran burnings, Sweden says

    COPENHAGEN, Denmark (AP) — Swedish authorities accused Iran on Tuesday of being responsible for thousands of text messages sent to people in Sweden calling for revenge over the burnings of Islam’s holy book in 2023. Iran denied the accusation.

    According to officials in Stockholm, the cyberattack was carried out by Iran’s paramilitary Revolutionary Guard, which hacked an SMS service and sent “some 15,000 text messages in Swedish” over the string of public burnings of the Quran that took place over several months in Sweden during the summer of 2023.

    Senior prosecutor Mats Ljungqvist said a preliminary investigation by Sweden’s SAPO domestic security agency showed “it was the Iranian state via the Iranian Islamic Revolutionary Guard Corps, IRGC, that carried out a data breach at a Swedish company that runs a major SMS service.”

    The Swedish company was not named.

    The Iranian Embassy in Sweden in a statement rejected the accusation as “baseless” and said it was intended to “poison” relations between Tehran and Stockholm, the official IRNA news agency reported. The embassy expects the Swedish government to prevent the spread of such statements, the report said.

    In August 2023, Swedish media reported that a large number of people in Sweden had received text messages in Swedish calling for revenge against people who were burning the Quran, Ljungqvist said, adding that the sender of the messages was “a group calling itself the Anzu team.”

    Swedish broadcaster SVT published a photo of a text message, saying that “those who desecrated the Quran must have their work covered in ashes” and calling Swedes “demons.”

    The protests were held under the freedom of speech act, which is protected under the Swedish constitution. The rallies were approved by police. However, the incidents left Sweden torn between its commitment to free speech and its respect for religious minorities.

    The clash of fundamental principles had complicated Sweden’s desire to join NATO, an expansion that gained urgency after Russia’s full-scale invasion of Ukraine but needed the approval of all alliance members.

    Turkey and its President Recep Tayyip Erdogan had temporarily blocked Sweden’s accession, citing reasons including anti-Turkish and anti-Islamic protests in Stockholm but Sweden finally became a NATO member in March.

    At the time, the Swedish government said it “strongly rejects the Islamophobic act committed by individuals in Sweden,” adding that the desecrations did not reflect the country’s stand.

    In July last year, Iran’s supreme leader Ayatollah Ali Khamenei issued a statement saying that “the insult to the Holy Quran in Sweden is a bitter, conspiratorial, dangerous event” and that the desecrations have “created feelings of hatred and enmity” in Muslim nations toward the people burning the Quran and their governments.

    In a separate statement, SAPO’s operational manager Fredrik Hallström said Tuesday that the intent of the text messages was to “paint the image of Sweden as an Islamophobic country and create division in society.”

    He accused “foreign powers” of seeking to “exploit vulnerabilities” and said they were “now acting more and more aggressively, and this is a development that is likely to escalate.” He did not name any specific country.

    Meanwhile, Sweden’s justice minister, Gunnar Strömmer, told Swedish news agency TT “that a state actor, in this case Iran, according to (SAPO’s) assessment is behind an action that aims to destabilize Sweden or increase polarization in our country is of course very serious.”

    There is no law in Sweden specifically prohibiting the burning or desecration of the Quran or other religious texts. Like many Western countries, Sweden doesn’t have any blasphemy laws.

    “Since the actors are acting for a foreign power, in this case Iran, we make the assessment that the conditions for prosecution abroad or extradition to Sweden are lacking for the persons suspected of being behind the breach,“ Ljungqvist said.

    Ljungqvist, who is with the Sweden’s top prosecution authority, said that although the preliminary investigation has been closed, it “does not mean that the suspected hackers have been completely written off” and that the probe could be reopened.

    Sweden’s domestic security agency in May accused Iran of using established criminal networks in Sweden as a proxy to target Israeli or Jewish interests in the Scandinavian country.

    Iran’s Embassy in Sweden could not be reached for a comment on Tuesday.

    ___

    Associated Press writer Jari Tanner in Helsinki contributed to this report.

    Source link

  • Sweden says Iran was behind thousands of text messages calling for revenge over Quran burnings

    Sweden says Iran was behind thousands of text messages calling for revenge over Quran burnings

    COPENHAGEN, Denmark — Swedish authorities accused Iran on Tuesday of being responsible for thousands of text messages that were sent to people in the Scandinavian country calling for revenge over the burnings of Islam’s holy book in 2023.

    Officials in Stockholm claimed that Iran’s paramilitary Revolutionary Guard carried out “a data breach” and managed to send “some 15,000 text messages in Swedish” over the string of public burnings of the Quran.

    Senior prosecutor Mats Ljungqvist said that a preliminary investigation, carried out by Sweden’s SAPO domestic security agency, showed that “it was the Iranian state via the Iranian Islamic Revolutionary Guard Corps, IRGC, that carried out a data breach at a Swedish company that runs a major SMS service.”

    The Swedish company was not named. There was no immediate comment from Iranian authorities on the accusations from Sweden.

    In August 2023, Swedish media reported that a large number of people in Sweden had received text messages in Swedish calling for revenge against people who were burning the Quran, Ljungqvist said, adding that the sender of the messages was “a group calling itself the Anzu team.”

    Swedish broadcaster SVT published a photo of a text message, saying that “those who desecrated the Quran must have their work covered in ashes” and calling Swedes “demons.”

    The protests were held under the freedom of speech act, which is protected under the Swedish constitution. The rallies were approved by police. However, the incidents left Sweden torn between its commitment to free speech and its respect for religious minorities.

    The clash of fundamental principles had complicated Sweden’s desire to join NATO, an expansion that gained urgency after Russia’s full-scale invasion of Ukraine but needed the approval of all alliance members.

    Turkey and its President Recep Tayyip Erdogan had temporarily blocked Sweden’s accession, citing reasons including anti-Turkish and anti-Islamic protests in Stockholm but Sweden finally became a NATO member in March.

    At the time, the Swedish government said it “strongly rejects the Islamophobic act committed by individuals in Sweden,” adding that the desecrations did not reflect the country’s stand.

    In July last year, Iran’s supreme leader Ayatollah Ali Khamenei issued a statement saying that “the insult to the Holy Quran in Sweden is a bitter, conspiratorial, dangerous event” and that the desecrations have “created feelings of hatred and enmity” in Muslim nations toward the people burning the Quran and their governments.

    In a separate statement, SAPO’s operational manager Fredrik Hallström said Tuesday the text messages ‘ intent was to also “paint the image of Sweden as an Islamophobic country and create division in society.”

    He accused “foreign powers” of seeking to “exploit vulnerabilities” and said they were “now acting more and more aggressively, and this is a development that is likely to escalate.” He did not name any specific country.

    Meanwhile, Sweden’ justice minister, Gunnar Strömmer, told Swedish news agency TT “that a state actor, in this case Iran, according to (SAPO’s) assessment is behind an action that aims to destabilize Sweden or increase polarization in our country is of course very serious.”

    There is no law in Sweden specifically prohibiting the burning or desecration of the Quran or other religious texts. Like many Western countries, Sweden doesn’t have any blasphemy laws.

    “Since the actors are acting for a foreign power, in this case Iran, we make the assessment that the conditions for prosecution abroad or extradition to Sweden are lacking for the persons suspected of being behind the breach, “Ljungqvist said.

    Ljungqvist who is with the Sweden’s top prosecution authority said although the preliminary investigation has been closed, it “does not mean that the suspected hackers have been completely written off” and that the probe could be reopened.

    Sweden’s domestic security agency in May accused Iran of using established criminal networks in Sweden as a proxy to target Israeli or Jewish interests in the Scandinavian country.

    Iran’s Embassy in Sweden could not be reached for a comment on Tuesday.

    ___

    Associated Press writer Jari Tanner in Helsinki contributed to this report.

    Source link

  • Meta bans RT and other Russian state media outlets due to

    Meta bans RT and other Russian state media outlets due to

    San Francisco — Meta late Monday said it’s banning Russian state media outlets from its apps around the world due to “foreign interference activity.”

    The ban comes after the United States accused RT and employees of the state-run outlet of funneling $10 million through shell entities to covertly fund influence campaigns on social media channels including TikTok, Instagram, X and YouTube, according to an unsealed indictment.

    “After careful consideration, we expanded our ongoing enforcement against Russian state media outlets,” Meta said in response to an AFP inquiry.

    “Rossiya Segodnya, RT and other related entities are now banned from our apps globally for foreign interference activity,” said Meta, whose apps include Facebook, Instagram, WhatsApp and Threads.

    The Kremlin slammed Meta’s decision Tuesday. Kremlin spokesman Dmitry Peskov told reporters that, “With this action, Meta discredits itself. Such actions against Russian media are unacceptable.”

    RT was forced to cease formal operations in Britain, Canada, the European Union and the United States due to sanctions after Russia invaded Ukraine in February 2022, according to the indictment unsealed in New York,

    U.S. prosecutors quoted an RT editor in chief as saying it created an “entire empire of covert projects” designed to shape public opinion in “Western audiences.”

    One of the covert projects involved funding and direction of an online content creation company in Tennessee, according to the indictment.

    Since launching in late 2023, the U.S. content creation operation supported by Russia has posted nearly 2,000 videos that have logged more than 16 million views on YouTube alone, according to the indictment.

    Prosecutors cited a content producer as grousing about being pressed by the company to post a video early this year of a “well known US political commentator visiting a grocery store in Russia,” complaining it felt like “overt shilling” but agreeing to put the video out.

    The company never disclosed to viewers it was funded by RT, U.S. prosecutors said.

    “RT has pursued malign influence campaigns in countries opposed to its policies, including the United States, in an effort to sow domestic divisions and thereby weaken opposition to Government of Russia objectives,” prosecutors argued in the indictment.

    Russia is the biggest source of covert influence operations disrupted by Meta at its platform since 2017, and such efforts at deceptive online influence ramped up after Russia’s invasion of Ukraine, according to threat reports released routinely by the social media giant.

    Meta had previously banned the Federal News Agency in Russia to thwart foreign interference activities by the Russian Internet Research Agency.

    RT capabilities were expanded early last year, when the Russian government enhanced it with “cyber operational capabilities and ties to Russian intelligence,” the U.S. State Department said in a recent release.

    Cyber capabilities were focused primarily on influence and intelligence operations around the world, according to the department.

    Information gathered by covert RT operations flows to Russia’s intelligence services, Russian media outlets, Russian mercenary groups and other “proxy arms” of the Russian government, the United States maintained.

    The State Department said it was engaged in diplomatic efforts to inform governments around the world about Russia’s use of RT to conduct covert activities and encourage them to take action to limit “Russia’s ability to interfere in foreign elections and procure weapons for its war against Ukraine.”

    Source link

  • Indonesia deports an ex-Philippine town mayor accused in Manila of cybercrimes

    Indonesia deports an ex-Philippine town mayor accused in Manila of cybercrimes

    JAKARTA, Indonesia (AP) — Indonesia on Thursday deported a dismissed Philippine town mayor accused in Manila of helping establish an illegal online gaming and scam center and evading an investigation by the Philippine Senate.

    Alice Guo, 34, will continue her legal process in Manila, according to a written statement from Indonesia’s Law and Human Rights Ministry’s Directorate General of Immigration.

    Indonesian police arrested Guo Tuesday in the outskirts of Jakarta. In exchange, Indonesian authorities hope that the Philippines will repatriate Australian Gregor Johann Haas, one of Indonesia’s most-wanted drug suspects, who was arrested in central Philippines in May.

    Guo was scheduled to undergo a medical checkup at the police headquarters before being handed to the Philippine Senate.

    Philippine President Ferdinand Marcos Jr. thanked Indonesia Wednesday for the arrest of Guo, who was accused in the Philippines of helping establish an illegal online gaming and scam center catering mostly to clients in China.

    Guo was also accused of being a Chinese spy and of faking her Filipino citizenship, which allowed her to be elected in 2022 as mayor of the rural town of Bamban in Tarlac province north of Manila.

    Guo, who denied wrongdoing, was dismissed from her post for grave misconduct by the Ombudsman, a Philippine agency that investigates and prosecutes government officials accused of crimes including graft and corruption.

    After Guo fled the Philippines in July, she was tracked in Malaysia and Singapore before turning up in Indonesia. Two companions, who reportedly slipped out of the Philippines with her, were recently arrested in Indonesia and immediately deported to the Philippines.

    In July, Marcos ordered a ban on widespread and mostly Chinese-run online gaming operations, accusing them of involvement in human trafficking, torture, kidnappings and murder.

    Khrisna Murti, chief of the international division of the national police, said Wednesday in Jakarta that “exchange efforts are still being negotiated” over the return of Haas.

    Interior Secretary Benhur Abalos and Philippine National Police chief Gen. Rommel Francisco Marbil flew to Jakarta Thursday to hold talks with their Indonesian counterparts.

    Asked about the reported detainee swap, Indonesian Ambassador to Manila Agus Widjojo told the state-run People’s Television Network that “the talks have only just started” Thursday.

    Haas, reportedly the father of a rugby star in Australia, has been described by the Bureau of Immigration in Manila as a “a high-profile fugitive for being an alleged member of the Sinaloa cartel, a large international organized crime syndicate based in Culiacan, Sinaloa, Mexico that specializes in drug trafficking and money laundering activities.”

    Indonesian authorities alleged that in December Haas tried to smuggle into Indonesia a shipment of floor ceramics filled with more than five kilograms (11 pounds) of methamphetamine, a highly addictive stimulant which is prohibited in Indonesia and the Philippines.

    Australia, which had abolished the death penalty, is concerned that Haas may potentially face capital punishment if he’s repatriated to Indonesia, a Philippine official told the AP on condition of anonymity because they were not authorized to discuss the issue publicly.

    Under Indonesia’s strict drug law, Haas could face the death penalty by firing squad.

    Australia’s extradition law doesn’t allow anyone to be extradited to a country that would execute that person regardless of nationality.

    __

    Associated Press writer Jim Gomez in Manila, Philippines, and Rod McGuirk in Canberra, Australia are contributed to this report.

    Source link

  • US accuses Russia of using state media to spread disinformation before the November election

    US accuses Russia of using state media to spread disinformation before the November election

    WASHINGTON — The Biden administration announced wide-ranging actions Wednesday meant to call out Russian influence in the upcoming U.S. presidential election, unsealing criminal charges against two employees of a Russian state-run media company and seizing internet domains used by the Kremlin to spread disinformation.

    The measures represented a U.S. government effort at disrupting a persistent threat from Russia that American officials have long warned has the potential to sow discord and create confusion among voters. Washington has said that Russia remains the primary threat to elections even as the FBI investigates a hack by Iran of Donald Trump’s campaign and an attempt breach of the Joe Biden-Kamala Harris campaign.

    One criminal case accuses two employees of RT, a Russian-state-funded media organization that was forced by the Justice Department to register as a foreign agent, of covertly funding a Tennessee-based content creation company to publish nearly 2,000 videos containing Russian propaganda. The defendants, who remain at large, used fake identities and the company was unaware it was being used by Russia.

    In the other action, officials announced the seizure of 32 internet domains that were used by the Kremlin to spread Russian propaganda and weaken global support for Ukraine.

    Attorney General Merrick Garland said the actions relate to Russia’s use of state media to enlist unwitting American influencers to spread propaganda and disinformation.

    Intelligence agencies have previously charged that Russia was using disinformation to try to interfere in the election. The new steps show the depth of U.S. concerns and signal legal actions against those suspected of being involved.

    “Today’s announcement highlights the lengths some foreign governments go to undermine American democratic institutions,” the State Department said. “But these foreign governments should also know that we will not tolerate foreign malign actors intentionally interfering and undermining free and fair elections.”

    In a speech last month, Deputy Attorney General Lisa Monaco said Russia remained the biggest threat to election integrity, accusing Russian President Vladimir Putin and “his proxies are using increasingly sophisticated techniques in their interference operations. They’re targeting specific voter demographics and swing-state voters to in an effort to manipulate presidential and congressional election outcomes. They’re intent on co-opting unwitting Americans on social media to push narratives advancing Russian interests.”

    Much of the concern around Russia centers on cyberattacks and disinformation campaigns designed to influence the November vote. The tactics include using state media like RT to advance anti-U.S. messages and content, as well as networks of fake websites and social media accounts that amplify the claims and inject them into American’s online conversations. Typically, these networks seize on polarizing political topics such as immigration, crime or the war in Gaza.

    In many cases, Americans may have no idea that the content they see online either originated or was amplified by the Kremlin.

    “Russia is taking a whole of government approach to influence the election including the presidential race,” an official from the Office of the Director of National Intelligence said this summer during a briefing. The official spoke on condition of anonymity under rules worked out with that office.

    Groups linked to the Kremlin are increasingly hiring marketing and communications firms within Russia to outsource some of the work of creating digital propaganda while also covering their tracks, the officials said during the briefing with reporters.

    Two such firms were the subject of new U.S. sanctions announced in March. Authorities say the two Russian companies created fake websites and social media profiles to spread Kremlin disinformation.

    The ultimate goal, however, is to get Americans to spread Russian disinformation without questioning its origin. People are far more likely to trust and repost information that they believe is coming from a domestic source, officials said. Fake websites designed to mimic U.S. news outlets and AI-generated social media profiles are just two methods.

    Messages left with the Russian Embassy were not immediately returned.

    Source link

  • France hands Telegram CEO Pavel Durov preliminary charges over alleged criminal activity on the app

    France hands Telegram CEO Pavel Durov preliminary charges over alleged criminal activity on the app

    Paris — French authorities handed preliminary charges to Telegram CEO Pavel Durov on Wednesday for allowing alleged criminal activity on his messaging app and barred him from leaving France pending further investigation. Free-speech advocates and authoritarian governments have spoken in Durov’s defense since his weekend arrest, with the chief Kremlin spokesman in Moscow warning Thursday that the case must “not to run into political persecution.”  

    “We consider him a Russian citizen and as much as possible we will be ready to provide assistance,” Kremlin spokesman Dmitry Peskov told reporters, adding that the Russian government would be “watching what happens next” in the case of the technology entrepreneur. Durov was born in Russia but left the country about a decade ago and now holds citizenship there, as well as in France, the United Arab Emirates and the small Caribbean nation of St. Kitts and Nevis.

    The case has called attention to the challenges of policing illegal activity online, and to Durov’s own unusual biography and multiple passports.

    Telegram Chief Executive Officer Pavel Durov
    Pavel Durov, CEO of Telegram, is seen at the Mobile World Congress in Barcelona, Spain, Feb. 23, 2016.

    Chris Ratcliffe/Bloomberg/Getty


    Durov was detained Saturday at Le Bourget airport outside Paris as part of a sweeping investigation opened earlier this year. He was released earlier Wednesday after four days of questioning. Investigative judges filed preliminary charges Wednesday night and ordered him to pay 5 million euros (about $5.5 million) in bail and to report to a police station twice a week, according to a statement from the Paris prosecutor’s office.

    The Reuters news agency quoted an unnamed government official in the UAE as saying that country was “in touch with the French authorities about this case,” along with Durov’s representatives, adding that the welfare of UAE citizens was a priority and the government would provide assistance if required.

    The allegations against Telegram and Pavel Durov

    The French prosecutors’ allegations against Durov include that his platform is being used for criminal purposes, including the propagation of child sexual abuse material and drug trafficking, and that Telegram refused to share information or documents with investigators when required by law. 

    CBS News senior foreign correspondent Holly Williams said it was important to note that French authorities have not claimed that Durov is or was personally involved in the alleged crimes. They argue instead that his company, which enables users to communicate through encrypted messages, making it difficult for authorities to monitor or review those communications, has not cooperated in other criminal investigations.  

    The first preliminary charge against him was for “complicity in managing an online platform to allow illicit transactions by an organized group,” a crime that can carry a sentence of up to 10 years in prison and a fine of 500,000 euros, the prosecutor’s office said.

    Preliminary charges under French law mean magistrates have strong reason to believe a crime was committed but want to allow more time for further investigation.

    David-Olivier Kaminski, a lawyer for Durov, was quoted by French media as saying “it’s totally absurd to think that the person in charge of a social network could be implicated in criminal acts that don’t concern him, directly or indirectly.”

    Prosecutors said Durov was, “at this stage, the only person implicated in this case.” They did not exclude the possibility that other people were being investigated, but declined to comment on other possible arrest warrants. Any other arrest warrant would be revealed only if the target of such a warrant is detained and informed of their rights, prosecutors said in a statement to the AP.

    French authorities opened a preliminary investigation in February in response to “the near total absence of a response by Telegram to judicial requests″ for data for pursuing suspects, notably those accused of crimes against children, the prosecutor’s office said.

    Russia “ready” to help Durov amid its own crackdown on free speech

    Durov’s arrest in France has caused outrage in Russia, with some government officials calling it politically motivated and proof of the West’s double standard on freedom of speech. The outcry has raised eyebrows among Kremlin critics as, in 2018, Russian authorities themselves tried to block the Telegram app but failed, withdrawing the ban in 2020.

    The Russian government has also implemented a wide range of new laws since it launched its full-scale invasion of Ukraine in February 2022 making it illegal to iterate or publish virtually any criticism of the Kremlin’s military or the war, which it refers to as a special military operation.

    Hundreds of journalists and democracy advocates have fled Russia in recent years, and many others remain imprisoned on charges stemming from the draconian laws curbing free speech in the country. Russia has also detained a number of foreign journalists who have reported on the war, including Wall Street Journal reporter Evan Gershkovich, who was convicted on espionage charges before being freed in a prison swap at the beginning of August. The Journal and the U.S. government always dismissed the charges as baseless.


    Putin crackdown widens, Russian-American arrested and charged with treason

    04:11

    Kremlin spokesman Peskov said he hoped Durov “has all the necessary opportunities for his legal defense,” adding that Moscow stood “ready to provide all necessary assistance and support” to the Telegram CEO but acknowledging the “situation is complicated by the fact that he is also a citizen of France.”

    In Iran, where Telegram is widely used despite being officially banned after years of protests challenging the country’s Shiite theocracy, Durov’s arrest drew comments from the Islamic Republic’s supreme leader. Ayatollah Ali Khamenei issued veiled praise for France for being “strict” against those who “violate your governance” of the internet.

    French President Emmanuel Macron insisted Monday that Durov’s arrest wasn’t a political move but part of an independent law enforcement investigation. Macron said in post on X that his country “is deeply committed” to freedom of expression, but that “freedoms are upheld within a legal framework, both on social media and in real life, to protect citizens and respect their fundamental rights.”

    The history of Telegram and Pavel Durov in Russia

    In a statement posted on its platform after Durov’s arrest, Telegram said it abides by EU laws, and its moderation is “within industry standards and constantly improving.”

    “Almost a billion users globally use Telegram as means of communication and as a source of vital information. We’re awaiting a prompt resolution of this situation,” it said.

    Telegram was founded by Durov and his brother after he himself faced pressure from Russian authorities. In 2013, he sold his stake in VKontakte, a popular Russian social networking site which he had launched in 2006.

    The company came under pressure during the Russian government’s crackdown following mass pro-democracy protests that rocked Moscow at the end of 2011 and 2012.

    Durov had said authorities demanded the site take down online communities of Russian opposition activists, and later that it hand over personal data of users who took part in the 2013-2014 popular uprising in Ukraine, which eventually ousted a pro-Kremlin president.

    Durov said in a recent interview that he had turned down those demands and left the country.

    The demonstrations prompted Russian authorities to clamp down on the digital space, and Telegram and its pro-privacy stance had offered a convenient way for Russians to communicate and share news.

    Telegram also continues to be a popular source of news in Ukraine, where both media outlets and officials use it to share information on the war and to deliver missile and air raid alerts. 

    Western governments have often criticized Telegram for a lack of content moderation.

    Source link

  • Dutch watchdog fines Uber $324 million for alleged inadequate protection of drivers’ data

    Dutch watchdog fines Uber $324 million for alleged inadequate protection of drivers’ data

    THE HAGUE, Netherlands (AP) — The Dutch data protection watchdog slapped a 290 million euro ($324 million) fine Monday on ride-hailing service Uber for allegedly transferring personal details of European drivers to the United States without adequate protection. Uber called the decision flawed and unjustified and said it would appeal.

    The Dutch Data Protection Authority said the data transfers spanning more than two years amounted to a serious breach of the European Union’s General Data Protection Regulation, which requires technical and organizational measures aimed at protecting user data.

    “In Europe, the GDPR protects the fundamental rights of people, by requiring businesses and governments to handle personal data with due care,” Dutch DPA chairman Aleid Wolfsen said in a statement.

    “But sadly, this is not self-evident outside Europe. Think of governments that can tap data on a large scale. That is why businesses are usually obliged to take additional measures if they store personal data of Europeans outside the European Union. Uber did not meet the requirements of the GDPR to ensure the level of protection to the data with regard to transfers to the U.S. That is very serious.”

    The case was initiated by complaints from 170 French Uber drivers, but the Dutch authority issued the fine because Uber’s European headquarters is in the Netherlands.

    Uber insisted it did nothing wrong.

    “This flawed decision and extraordinary fine are completely unjustified. Uber’s cross-border data transfer process was compliant with GDPR during a 3-year period of immense uncertainty between the EU and U.S. We will appeal and remain confident that common sense will prevail,” the company said in a statement.

    The alleged breach came after the EU’s top court ruled in 2020 that an agreement known as Privacy Shield that allowed thousands of companies — from tech giants to small financial firms — to transfer data to the United States was invalid because the American government could snoop on people’s data.

    The Dutch data protection agency said that following the EU court ruling, standard clauses in contracts could provide a basis for transferring data outside the EU, “but only if an equivalent level of protection can be guaranteed in practice.”

    “Because Uber no longer used Standard Contractual Clauses from August 2021, the data of drivers from the EU were insufficiently protected,” the watchdog said. It added that Uber has been using the successor to Privacy Shield since the end of last year, ending the alleged breach.

    The Computer & Communications Industry Association, an advocacy organization for tech companies, said the fine ignored the realities of online business in the aftermath of the 2020 EU court ruling.

    “The busiest internet route in the world could not simply be put on hold for three entire years while governments worked to establish a new legal framework for these data flows,” the association’s European head of policy, Alexandre Roure, said in a statement.

    “Any retroactive fines by data protection authorities are especially worrisome given that these very privacy watchdogs failed to provide helpful guidance during this period of significant legal uncertainty, in absence of any clear legal framework,” he added.

    Monday’s announcement is not the first time the Dutch data protection watchdog has fined Uber. In January, the agency fined it 10 million euros over what it said was the company’s failure to disclose how long it retained data from drivers in Europe or to name non-EU countries it shared the data with.

    Source link

  • Iranian hackers targeted WhatsApp accounts of staffers in Biden, Trump administrations, Meta says

    Iranian hackers targeted WhatsApp accounts of staffers in Biden, Trump administrations, Meta says

    WASHINGTON — The same Iranian hacking group believed to have targeted both the Democratic and Republican presidential campaigns tried to go after the WhatsApp accounts of staffers in the administrations of President Joe Biden and former President Donald Trump, Meta Platforms said Friday.

    Meta said it discovered the network of hackers, who posed as tech support agents for companies including AOL, Microsoft, Yahoo and Google, after individuals who received the suspicious WhatsApp messages reported them. Meta’s investigators linked the activity to the same network blamed for the hacking incident reported by Trump’s campaign.

    The FBI this week said a hack by Iran of the Trump campaign and an attempted breach of the Biden-Harris campaign was part of a broader Iranian effort to interfere with the U.S. presidential election.

    A statement Friday from Meta, the parent of Facebook and Instagram, said that the hackers had tried to target the WhatsApp accounts of individuals in the Middle East, the United States and the United Kingdom, as well as political and diplomatic officials — including unidentified officials associated with the Trump and Biden administrations. A “small cluster” of accounts was blocked by Meta, the company said.

    “We have not seen evidence of the targeted WhatsApp accounts being compromised, but out of an abundance of caution, we’re sharing our findings publicly, in addition to sharing information with law enforcement and our industry peers,” Meta said in a statement.

    In a report this month, Google’s threat intelligence arm said the same Iranian group, which it linked to the country’s Revolutionary Guard, had tried to infiltrate the personal email accounts of roughly a dozen people linked to Biden and Trump since May. That report expanded on a separate study released days earlier by Microsoft that revealed suspected Iranian cyber intrusion in this year’s presidential election.

    U.S. intelligence officials say Iran’s increasingly aggressive use of cyberattacks and disinformation has several motives: to confuse and polarize voters in an effort to undermine confidence in U.S. democracy, to erode support for Israel, and to oppose candidates that it believes will increase tension between Washington and Iran.

    Iran has vowed revenge against Trump, whose administration ended a nuclear deal with Iran, reimposed sanctions and ordered the killing of an Iranian Gen. Qassem Soleimani.

    In July, Director of National Intelligence Avril Haines said Iran’s government gave covert support to American protests against Israel’s war against Hamas in Gaza. Groups linked to Iran posed as online activists, encouraged campus protests and provided financial support to some protest groups, Haines said.

    Messages left with the Trump and Harris campaigns were not immediately returned Friday.

    Source link

  • US intelligence officials say Iran is to blame for hacks targeting Trump, Biden-Harris campaigns

    US intelligence officials say Iran is to blame for hacks targeting Trump, Biden-Harris campaigns

    WASHINGTON — U.S. intelligence officials said Monday they were confident that Iran was responsible for the hack of Donald Trump’s presidential campaign, casting the cyber intrusion as part of a brazen and broader effort by Tehran to interfere in American politics and potentially shape the outcome of the election.

    The assessment from the FBI and other federal agencies was the first time the U.S. government has assigned blame for hacks that have raised anew the threat of foreign election interference and underscored how Iran, in addition to more sophisticated adversaries like Russia and China, remains a top concern. Besides breaching the Trump campaign, officials also believe that Iran tried to hack into the presidential campaign of Kamala Harris.

    The hacking and similar activities, federal officials said, are meant to sow discord, exploit divisions within American society and possibly to influence the outcome of elections that Iran perceives to be “particularly consequential in terms of the impact they could have on its national security interests,” officials said.

    “We have observed increasingly aggressive Iranian activity during this election cycle, specifically involving influence operations targeting the American public and cyber operations targeting Presidential campaigns,” said the statement released by the FBI, the Office of the Director of National Intelligence and the Cybersecurity and Infrastructure Security Agency.

    Iran’s mission to the United Nations denied the allegations as “unsubstantiated and devoid of any standing,” saying that Iran had neither the motive nor intention to interfere with the election. It challenged the U.S. to provide evidence and said if the U.S. does so, “we will respond accordingly.”

    The FBI statement was released at a time of significant tensions between Washington and Tehran as the U.S. hopes to halt or limit a threatened retaliatory strike on Israel over the assassination of Hamas official Ismail Haniyeh in Iran. In addition, an Israeli strike last month in southern Beirut killed Hezbollah’s top commander, but while Tehran and Iran-backed Hezbollah have vowed to retaliate, they have not yet launched strikes as diplomatic endeavors and Gaza cease-fire talks continue in Qatar.

    The U.S. did not detail how it reached the conclusion that Iran was responsible, nor did it describe the nature of any information that may have been stolen from the Trump campaign. But it said the intelligence community was confident “the Iranians have through social engineering and other efforts sought access to individuals with direct access to the Presidential campaigns of both political parties.”

    At least three staffers in the Biden-Harris campaign were targeted with phishing emails, but investigators have uncovered no evidence the attempt was successful, The Associated Press reported last week.

    “Such activity, including thefts and disclosures, are intended to influence the U.S. election process. It is important to note that this approach is not new. Iran and Russia have employed these tactics not only in the United States during this and prior federal election cycles but also in other countries around the world,” the statement said.

    U.S. officials have been on high alert in recent election cycles for foreign influence campaigns and outright interference as in 2016, when Russian military intelligence operatives hacked the campaign of Democratic nominee Hillary Clinton and orchestrated the release of politically damaging emails through the website WikiLeaks.

    Iran has more recently emerged as an aggressive threat to American elections. In 2020, U.S. intelligence officials say, Iran carried out an influence campaign aimed at harming Trump’s reelection bid that was probably approved by Supreme Leader Ayatollah Ali Khamenei and was the subject of an unusual evening news conference featuring FBI Director Christopher Wray and other officials.

    U.S. officials also have expressed alarm about Tehran’s efforts to seek retaliation for a 2020 strike on an Iranian general that was ordered by Trump.

    The Trump campaign disclosed on Aug. 10 that it had been hacked and said Iranian actors had stolen and distributed sensitive internal documents. At least three news outlets — Politico, The New York Times and The Washington Post — were leaked confidential material from inside the Trump campaign. So far, each has refused to reveal any details about what it received.

    Politico reported that it began receiving emails on July 22 from an anonymous account. The source — an AOL email account identified only as “Robert” — passed along what appeared to be a research dossier the campaign had apparently done on the Republican vice presidential nominee, Ohio Sen. JD Vance. The document was dated Feb. 23, almost five months before Trump selected Vance as his running mate.

    The U.S. government’s assessment aligns with the findings of private companies.

    Earlier this month, Microsoft issued a report on Iranian agents’ attempts to interfere in this year’s election. It said Iran had impersonated activists and created fake news targeted to voters on opposite sides of the political spectrum. The report also cited an instance of an Iranian military intelligence unit in June sending “a spear-phishing email to a high-ranking official of a presidential campaign from a compromised email account of a former senior advisor.”

    In a separate report, Google said an Iranian group linked to the country’s Revolutionary Guard has tried to infiltrate the personal email accounts of roughly a dozen people linked to President Joe Biden and Trump since May.

    ____

    Associated Press writer Edith M. Lederer at the United Nations contributed to this report.

    Source link

  • What we know about suspected Iranian cyber intrusion in the US presidential race

    What we know about suspected Iranian cyber intrusion in the US presidential race

    NEW YORK (AP) — Details emerged over the weekend of a suspected Iranian cyber intrusion into the campaign of Republican presidential nominee Donald Trump, potentially resulting in the theft of internal campaign documents.

    The FBI is investigating the matter as well as attempts to infiltrate President Joe Biden’s reelection campaign, which became Vice President Kamala Harris’ campaign after Biden dropped out of the race.

    Here’s what we know:

    What happened?

    Trump’s presidential campaign said Saturday that it had been hacked and that sensitive internal documents were stolen and distributed. It declared that Iranian actors were to blame.

    The same day, Politico revealed it had received leaked internal Trump campaign documents by email, from a person only identified as “Robert.” The outlet said the documents included vetting materials on Republican vice presidential nominee JD Vance and Sen. Marco Rubio, who also was considered as a potential vice president.

    Two other news outlets, The New York Times and The Washington Post, also said they received leaked materials. None of them revealed details about what they had, instead describing the documents in broad terms.

    It’s still unclear whether the materials the news outlets received were related to Trump’s alleged campaign hack. Trump campaign spokesman Steven Cheung indicated they were connected, saying the documents “were obtained illegally” and warning that “any media or news outlet reprinting documents or internal communications are doing the bidding of America’s enemies and doing exactly what they want.”

    The FBI on Monday confirmed that it’s investigating the intrusion of the Trump campaign. Two people familiar with the matter said the FBI also is investigating attempts to gain access to the Biden-Harris campaign.

    Why is Trump blaming Iran?

    Trump’s campaign didn’t provide specific evidence showing Iran was behind the hack. But it pointed to a Microsoft report released Friday that detailed an Iranian attempt to infiltrate a presidential campaign in June.

    Microsoft’s report said an Iranian military intelligence unit had sent “a spear-phishing email to a high-ranking official of a presidential campaign from a compromised email account of a former senior advisor.” Spear-phishing is a form of cyberattack in which an attacker poses as a known or trusted sender, often to install malware or gather sensitive information.

    The tech company wouldn’t disclose which campaign or adviser was targeted, but said it had notified them. Since then, both Trump and a longtime friend and adviser of the former president, Roger Stone, have said they were contacted by Microsoft related to suspected cyber intrusions.

    “We were just informed by Microsoft Corporation that one of our many websites was hacked by the Iranian Government – Never a nice thing to do!” Trump wrote on his Truth Social platform on Saturday.

    Grant Smith, an attorney for Stone, said his client “was contacted by Microsoft and the FBI regarding this matter and continues to cooperate with these organizations.” He declined further comment.

    What does the government say?

    U.S. State Department officials declined to speculate on allegations that Iran was behind the hack, but a spokesperson said it would be in keeping with Tehran’s past use of cyberattacks and deception.

    What to know about the 2024 Election

    “These latest attempts to interfere in U.S. elections are nothing new for the Iranian regime,” spokesperson Vedant Patel said on Monday.

    U.S. intelligence officials declined to comment on the incident and referred questions to the FBI, which has said only that it’s investigating.

    Iran’s mission to the United Nations, when asked about the claim of the Trump campaign, denied being involved.

    “We do not accord any credence to such reports,” the mission told The Associated Press. “The Iranian government neither possesses nor harbors any intent or motive to interfere in the United States presidential election.”

    However, Iran long has been suspected of running hacking campaigns targeting its enemies in the Middle East and beyond. Tehran also has threatened to retaliate against Trump over the 2020 drone strike he ordered that killed prominent Revolutionary Guard Gen. Qassem Soleimani.

    Was Harris targeted too?

    Harris’ campaign has declined to say whether it has identified any state-based intrusion attempts, only saying it vigilantly monitors cyber threats and wasn’t aware of any security breaches of its systems.

    But two people familiar with the matter said the Biden-Harris campaign also was targeted in the suspected Iranian cyber intrusion. The people spoke on the condition of anonymity because they were not authorized to discuss the details of the investigation.

    At least three staffers in the Biden-Harris campaign were targeted with phishing emails, but investigators have uncovered no evidence the attempt was successful, one of the people said. The attempts came before Biden dropped out of the race.

    The FBI began investigating that cyber incident in June, and intelligence officials believe Iran was behind the attempts, that person said.

    Where have I heard this before?

    A suspected foreign hack-and-leak of campaign materials might sound familiar because it’s happened before — notably in 2016.

    That year, a Russian hack exposed emails to and from Hillary Clinton’s campaign manager, John Podesta. The website Wikileaks published a trove of the messages, which were reported on extensively by news outlets.

    Senate Majority Leader Chuck Schumer on Tuesday noted the repeated use of the tactic against the U.S. and said it shows foreign adversaries are “intent on sowing chaos and undermining our democratic process.”

    “So we have to stand firm to ensure our cybersecurity can withstand such intrusions as we head into November,” he said in a statement.

    Experts say that the recent apparent hack of the Trump campaign is not likely to be the last such attempt to influence the U.S. election, either through cyberattacks or online disinformation. Both Iran and Russia, for example, have begun targeting Americans with fake news websites and other social media content that appears intended to sway voters, Microsoft and U.S. intelligence officials have said.

    The nation’s former top election security official, Chris Krebs, warned on the social platform X that Americans should take this threat seriously.

    “You might not like the victim here, but the adversary gives zero Fs who you like or don’t like,” he said of the Trump campaign hack. “American voters decide American elections. Let’s keep it that way.”

    ___

    Associated Press writers Alanna Durkin Richer, David Klepper and Zeke Miller in Washington contributed to this report.

    ___

    The Associated Press receives support from several private foundations to enhance its explanatory coverage of elections and democracy. See more about AP’s democracy initiative here. The AP is solely responsible for all content.

    Source link

  • Mayor of Columbus, Ohio, says ransomware attackers stole corrupted, unusable data

    Mayor of Columbus, Ohio, says ransomware attackers stole corrupted, unusable data

    COLUMBUS, Ohio (AP) — Hackers recently stole data from Ohio’s largest city, but what they got was not usable and no personal information about city workers was made available online, the mayor said.

    Columbus Mayor Andrew Ginther confirmed the data breach and noted Tuesday that the city never received a ransom request. The city learned Friday that most of the data published to the dark web by the ransomware group Rhysida was corrupted or encrypted, he said.

    The group initially claimed to have 6.5 terabytes of stolen data — including log-in information, emergency service files and city camera access — that it unsuccessfully put up for auction. But Ginther said the city’s forensics indicated the group had far less data than that, and that its screenshots posted to the dark web were “the most compelling asset” it had.

    After the breach, city workers, including police and fire, had said their personal information had been compromised. Ginther, though, said that while employees’ personal information was not uploaded to the dark web, someone temporarily accessed it during the attack.

    The city’s payroll system was accessed long enough to view files, but there is no evidence files were downloaded or posted to the dark web, city officials said. There also is no evidence that data belonging to the general public was exposed.

    The city is now focusing on increasing digital security and technology training to prevent another breach, Ginther said.

    “I think when this is all said and done, we will have spent several million dollars dealing with the attack,” Ginther said.

    Other major cities in Ohio have also dealt with cyberattacks. Cleveland’s city hall was closed to the public for several days in June following a ransomware attack that forced the city to shut down most of its systems, and Akron had to shut down some city functions after a digital attack in 2019.

    Source link

  • Google confirms an Iranian group is trying to access emails linked to both US presidential campaigns

    Google confirms an Iranian group is trying to access emails linked to both US presidential campaigns

    NEW YORK (AP) — Google said Wednesday that an Iranian group linked to the country’s Revolutionary Guard has tried to infiltrate the personal email accounts of roughly a dozen people linked to President Joe Biden and former President Donald Trump since May.

    The tech company’s threat intelligence arm said the group is still actively targeting people associated with Biden, Trump and Vice President Kamala Harris, who replaced Biden as the Democratic candidate last month when he dropped out. It said those targeted have included current and former government officials, as well as presidential campaign affiliates.

    The new report from Google’s Threat Analysis Group affirms and expands on a Microsoft report released Friday that revealed suspected Iranian cyber intrusion in this year’s U.S. presidential election. It sheds light on how foreign adversaries are ramping up their efforts to disrupt the election that is now less than three months away.

    Google’s report said its threat researchers detected and disrupted a “small but steady cadence” of the Iranian attackers using email credential phishing, a type of cyberattack where the attacker poses as a trusted sender to try to get an email recipient to share their login details. John Hultquist, chief analyst for the company’s threat intelligence arm, said the company sends suspected targets of these attacks a Gmail popup that warns them that a government-backed attacker might be trying to steal their password.

    The report said Google observed the group gaining access to one high-profile political consultant’s personal Gmail account. Google reported the incident to the FBI in July. Microsoft’s Friday report had shared similar information, noting that the email account of a former senior adviser to a presidential campaign had been compromised and weaponized to send a phishing email to a high-ranking campaign official.

    The group is familiar to Google’s threat intelligence arm and other researchers, and this isn’t the first time it has tried to interfere in U.S. elections, Hultquist said. The report noted that the same Iranian group targeted both the Biden and Trump campaigns with phishing attacks during the 2020 cycle, as early as June of that year.

    The group also has been prolific in other cyber espionage activity, particularly in the Middle East, the report said. In recent months, as the Israel-Hamas War has aggravated tensions in the region, that activity has included email phishing campaigns targeted at Israeli diplomats, academics, non-governmental organizations and military affiliates.

    Trump’s campaign said Saturday that it had been hacked and that sensitive internal documents were stolen and distributed. It declared that Iranian actors were to blame.

    The same day, Politico revealed it had received leaked internal Trump campaign documents by email, though it wasn’t clear whether the leaked documents were related to the suspected Iranian cyber activity. The Washington Post and The New York Times also received the documents.

    While the Trump campaign hasn’t provided specific evidence linking Iran to the hack, both Trump and his longtime friend and former adviser Roger Stone have said they were contacted by Microsoft related to suspected cyber intrusions. Stone’s email was compromised by hackers targeting Trump’s campaign, a person familiar with the matter said.

    What to know about the 2024 Election

    Google and Microsoft wouldn’t identify the people targeted in the Iranian intrusion attempts or confirm that Stone was among them. Google did confirm that the Iranian group in its report, which it calls APT42, is the same as the one in Microsoft’s research. Microsoft refers to the group as Mint Sandstorm.

    Harris’ campaign has declined to say whether it has identified any state-based intrusion attempts, but has said it vigilantly monitors cyber threats and isn’t aware of any security breaches of its systems.

    The FBI on Monday confirmed that it’s investigating the intrusion of the Trump campaign. Two people familiar with the matter said the FBI also is investigating attempts to gain access to the Biden-Harris campaign.

    The reports of Iranian hacking come as U.S. intelligence officials have warned of persistent and mounting efforts from both Russia and Iran to influence the U.S. election through their online activity. Beyond these hacking incidents, groups linked to the countries have used fake news websites and social media accounts to churn out content that appears intended to sway voters’ opinions.

    While neither Microsoft nor Google specified Iran’s intentions in the U.S. presidential race, U.S. officials have previously hinted that Iran particularly opposes Trump. U.S. officials also have expressed alarm about Tehran’s efforts to seek retaliation for a 2020 strike on an Iranian general that was ordered by Trump.

    Iran’s mission to the United Nations, when asked about the claim of the Trump campaign, denied being involved.

    “We do not accord any credence to such reports,” the mission told The Associated Press. “The Iranian government neither possesses nor harbors any intent or motive to interfere in the United States presidential election.”

    The mission did not immediately respond to a request for comment Wednesday about Google’s report.

    ___

    Associated Press writer Michael Weissenstein contributed to this report.

    ___

    The Associated Press receives support from several private foundations to enhance its explanatory coverage of elections and democracy. See more about AP’s democracy initiative here. The AP is solely responsible for all content.

    Source link

  • What we know about suspected Iranian cyber intrusion in the US presidential race

    What we know about suspected Iranian cyber intrusion in the US presidential race

    NEW YORK — Details emerged over the weekend of a suspected Iranian cyber intrusion into the campaign of Republican presidential nominee Donald Trump, potentially resulting in the theft of internal campaign documents.

    The FBI is investigating the matter as well as attempts to infiltrate President Joe Biden’s reelection campaign, which became Vice President Kamala Harris’ campaign after Biden dropped out of the race.

    Here’s what we know:

    Trump’s presidential campaign said Saturday that it had been hacked and that sensitive internal documents were stolen and distributed. It declared that Iranian actors were to blame.

    The same day, Politico revealed it had received leaked internal Trump campaign documents by email, from a person only identified as “Robert.” The outlet said the documents included vetting materials on Republican vice presidential nominee JD Vance and Sen. Marco Rubio, who also was considered as a potential vice president.

    Two other news outlets, The New York Times and The Washington Post, also said they received leaked materials. None of them revealed details about what they had, instead describing the documents in broad terms.

    It’s still unclear whether the materials the news outlets received were related to Trump’s alleged campaign hack. Trump campaign spokesman Steven Cheung indicated they were connected, saying the documents “were obtained illegally” and warning that “any media or news outlet reprinting documents or internal communications are doing the bidding of America’s enemies and doing exactly what they want.”

    The FBI on Monday confirmed that it’s investigating the intrusion of the Trump campaign. Two people familiar with the matter said the FBI also is investigating attempts to gain access to the Biden-Harris campaign.

    Trump’s campaign didn’t provide specific evidence showing Iran was behind the hack. But it pointed to a Microsoft report released Friday that detailed an Iranian attempt to infiltrate a presidential campaign in June.

    Microsoft’s report said an Iranian military intelligence unit had sent “a spear-phishing email to a high-ranking official of a presidential campaign from a compromised email account of a former senior advisor.” Spear-phishing is a form of cyberattack in which an attacker poses as a known or trusted sender, often to install malware or gather sensitive information.

    The tech company wouldn’t disclose which campaign or adviser was targeted, but said it had notified them. Since then, both Trump and a longtime friend and adviser of the former president, Roger Stone, have said they were contacted by Microsoft related to suspected cyber intrusions.

    “We were just informed by Microsoft Corporation that one of our many websites was hacked by the Iranian Government – Never a nice thing to do!” Trump wrote on his Truth Social platform on Saturday.

    Grant Smith, an attorney for Stone, said his client “was contacted by Microsoft and the FBI regarding this matter and continues to cooperate with these organizations.” He declined further comment.

    U.S. State Department officials declined to speculate on allegations that Iran was behind the hack, but a spokesperson said it would be in keeping with Tehran’s past use of cyberattacks and deception.

    “These latest attempts to interfere in U.S. elections are nothing new for the Iranian regime,” spokesperson Vedant Patel said on Monday.

    U.S. intelligence officials declined to comment on the incident and referred questions to the FBI, which has said only that it’s investigating.

    Iran’s mission to the United Nations, when asked about the claim of the Trump campaign, denied being involved.

    “We do not accord any credence to such reports,” the mission told The Associated Press. “The Iranian government neither possesses nor harbors any intent or motive to interfere in the United States presidential election.”

    However, Iran long has been suspected of running hacking campaigns targeting its enemies in the Middle East and beyond. Tehran also has threatened to retaliate against Trump over the 2020 drone strike he ordered that killed prominent Revolutionary Guard Gen. Qassem Soleimani.

    Harris’ campaign has declined to say whether it has identified any state-based intrusion attempts, only saying it vigilantly monitors cyber threats and wasn’t aware of any security breaches of its systems.

    But two people familiar with the matter said the Biden-Harris campaign also was targeted in the suspected Iranian cyber intrusion. The people spoke on the condition of anonymity because they were not authorized to discuss the details of the investigation.

    At least three staffers in the Biden-Harris campaign were targeted with phishing emails, but investigators have uncovered no evidence the attempt was successful, one of the people said. The attempts came before Biden dropped out of the race.

    The FBI began investigating that cyber incident in June, and intelligence officials believe Iran was behind the attempts, that person said.

    A suspected foreign hack-and-leak of campaign materials might sound familiar because it’s happened before — notably in 2016.

    That year, a Russian hack exposed emails to and from Hillary Clinton’s campaign manager, John Podesta. The website Wikileaks published a trove of the messages, which were reported on extensively by news outlets.

    Senate Majority Leader Chuck Schumer on Tuesday noted the repeated use of the tactic against the U.S. and said it shows foreign adversaries are “intent on sowing chaos and undermining our democratic process.”

    “So we have to stand firm to ensure our cybersecurity can withstand such intrusions as we head into November,” he said in a statement.

    Experts say that the recent apparent hack of the Trump campaign is not likely to be the last such attempt to influence the U.S. election, either through cyberattacks or online disinformation. Both Iran and Russia, for example, have begun targeting Americans with fake news websites and other social media content that appears intended to sway voters, Microsoft and U.S. intelligence officials have said.

    The nation’s former top election security official, Chris Krebs, warned on the social platform X that Americans should take this threat seriously.

    “You might not like the victim here, but the adversary gives zero Fs who you like or don’t like,” he said of the Trump campaign hack. “American voters decide American elections. Let’s keep it that way.”

    ___

    Associated Press writers Alanna Durkin Richer, David Klepper and Zeke Miller in Washington contributed to this report.

    ___

    The Associated Press receives support from several private foundations to enhance its explanatory coverage of elections and democracy. See more about AP’s democracy initiative here. The AP is solely responsible for all content.

    Source link

  • Russians team up with young, English-speaking hackers for cyberattacks | 60 Minutes

    Russians team up with young, English-speaking hackers for cyberattacks | 60 Minutes

    Russians team up with young, English-speaking hackers for cyberattacks | 60 Minutes – CBS News


    Watch CBS News



    Cybersecurity investigators worry ransomware attacks may worsen as young, native-English speaking hackers in the U.S., U.K. and Canada team up with Russian hackers.

    Be the first to know

    Get browser notifications for breaking news, live events, and exclusive reporting.


    Source link

  • Local hospital network data breach may affect over 500

    Local hospital network data breach may affect over 500

    SALEM, N.H. — A data breach at a local hospital network caused more than 500 patients’ personal information to be leaked.

    Northeast Rehabilitation Hospital Network, 70 Butler St., announced on its website that between May 13 and May 22, there was unauthorized access to the company’s network and files containing sensitive information may have been accessed.

    Information was accessed from Neuro Rehab Associates Inc., a subsidiary founded in 1983, according to the data breach portal for the U.S. Department of Health and Human Services’ Office for Civil Rights.

    The breach was reported to the Department of Health and Human Services on July 17.

    Despite claiming it was an instance of unauthorized access, the department categorized the breach as a hacking and IT incident and noted the information was found on network servers.

    NRHN said it is investigating the breach’s severity and will only notify people who have been affected and that it reported the incident to a federal law enforcement agency.

    NRHN has four inpatient hospitals in New Hampshire and more than 25 outpatient rehabilitation clinics across Massachusetts and New Hampshire.

    The company said while it is still investigating the breach’s extent, the information that could have been stolen includes patients’ names, contact information, dates of birth, Social Security numbers, driver’s license and ID numbers, financial account information, diagnoses, treatments and health insurance information.

    NRHN has asked for patients to remain vigilant and, if they believe they are a victim of this breach, to contact it by email at NRHNCyberInfo@northeastrehab.com.

    By Katelyn Sahagian | ksahagian@northofboston.com

    Source link