{"id":19016,"date":"2024-08-23T21:36:58","date_gmt":"2024-08-23T21:36:58","guid":{"rendered":"http:\/\/scannn.com\/facebook\/taking-action-against-malicious-accounts-in-iran\/"},"modified":"2024-08-23T21:36:58","modified_gmt":"2024-08-23T21:36:58","slug":"taking-action-against-malicious-accounts-in-iran","status":"publish","type":"post","link":"https:\/\/scannn.com\/lv\/taking-action-against-malicious-accounts-in-iran\/","title":{"rendered":"Taking Action Against Malicious Accounts in Iran"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><span style=\"font-weight: 400;\">As part of our regular updates on notable <\/span><a href=\"https:\/\/transparency.meta.com\/metasecurity\/threat-reporting\"><span style=\"font-weight: 400;\">threat disruption efforts<\/span><\/a><span style=\"font-weight: 400;\">, we\u2019re sharing our most recent insights into a small cluster of likely social engineering activity on WhatsApp that our security teams blocked after investigating user reports. This malicious activity originated in Iran and attempted to target individuals in Israel, Palestine, Iran, the United States and the UK<\/span><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"> This effort appeared to have focused on political and diplomatic officials, and other public figures, including some associated with administrations of President Biden and former President Trump.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our investigation linked it to APT42 (also known as UNC788 and Mint Sandstorm), an Iranian threat actor known for its persistent adversarial campaigns using basic phishing tactics across the internet to steal credentials to people\u2019s online accounts. We have previously <\/span><a href=\"https:\/\/about.fb.com\/wp-content\/uploads\/2022\/04\/Meta-Quarterly-Adversarial-Threat-Report_Q1-2022.pdf\"><span style=\"font-weight: 400;\">shared<\/span><\/a><span style=\"font-weight: 400;\"> our threat research related to APT42 targeting people in the Middle East, including Saudi military, dissidents and human rights activists from Israel and Iran, politicians in the US, and Iran-focused academics, activists and journalists around the world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These accounts posed as technical support for AOL, Google, Yahoo and Microsoft. Some of the people targeted by APT42 reported these suspicious messages to WhatsApp using our in-app reporting tools. Those reported messages enabled us to investigate this latest campaign and link it to the same hacking group responsible for similar attempts aimed at political, military, diplomatic and other officials, as reported by our industry peers at <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2024\/08\/08\/iran-targeting-2024-us-election\/\"><span style=\"font-weight: 400;\">Microsoft<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/blog.google\/threat-analysis-group\/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us\/\"><span style=\"font-weight: 400;\">Google<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The vigilance of these users to report the messages to us suggests that these efforts were unsuccessful. We have not seen evidence that their accounts were compromised.<\/span><span style=\"font-weight: 400;\"> We have encouraged those who reported to us to take steps to ensure their online accounts are safe across the internet. Out of an abundance of caution and given the heightened threat environment ahead of the US election, we also shared information about this malicious activity with law enforcement and with the presidential campaigns to encourage them to stay cautious against potential adversarial targeting<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We continue to monitor<\/span><span style=\"font-weight: 400;\"> information coming from our industry peers, our own investigations and user reports <\/span><span style=\"font-weight: 400;\">and will take action if we detect further attempts by malicious actors to target people on our apps. We strongly encourage public figures, journalists, political candidates and campaigns to<\/span><a href=\"https:\/\/faq.whatsapp.com\/2286952358121083\"><span style=\"font-weight: 400;\"> remain vigilant<\/span><\/a><span style=\"font-weight: 400;\">, take advantage of <\/span><a href=\"https:\/\/blog.whatsapp.com\/new-privacy-features-silence-unknown-callers-and-privacy-checkup\"><span style=\"font-weight: 400;\">privacy and security settings<\/span><\/a><span style=\"font-weight: 400;\">, avoid engaging with messages from people they don\u2019t know and <\/span><a href=\"https:\/\/faq.whatsapp.com\/1142481766359885\/?cms_platform=iphone&amp;helpref=platform_switcher\"><span style=\"font-weight: 400;\">report suspicious activity<\/span><\/a><span style=\"font-weight: 400;\"> to us.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a reminder, cyber espionage actors typically target people across the internet to collect intelligence, manipulate them into revealing information and compromise their devices and accounts. When we disrupt these operations, we take down their accounts, block their domains from being shared on our platform and notify people who we believe were targeted by these malicious groups. Learn\u00a0 more about our <\/span><a href=\"https:\/\/transparency.meta.com\/metasecurity\/threat-reporting\"><span style=\"font-weight: 400;\">threat disruption efforts<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/p><\/div>\n<p><script async defer crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&#038;version=v5.0\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/about.fb.com\/news\/2024\/08\/taking-action-against-malicious-accounts-in-iran\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our regular updates on notable threat disruption efforts, we\u2019re sharing our most recent insights into a small cluster of likely social engineering activity on WhatsApp that our security teams blocked after investigating user reports. This malicious activity originated in Iran and attempted to target individuals in Israel, Palestine, Iran, the United States [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":19017,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[],"class_list":["post-19016","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-facebook"],"_links":{"self":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/19016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/comments?post=19016"}],"version-history":[{"count":0,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/posts\/19016\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media\/19017"}],"wp:attachment":[{"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/media?parent=19016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/categories?post=19016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scannn.com\/lv\/wp-json\/wp\/v2\/tags?post=19016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}