- Iran: Eight Prisoners Hanged on Drug Charges
- Daughter of late Iranian president jailed for ‘spreading lies’ - IRAN: Annual report on the death penalty 2016 - Taheri Facing the Death Penalty Again - Dedicated team seeking return of missing agent in Iran - Iran Arrests 2, Seizes Bibles During Catholic Crackdown
- Trump to welcome Netanyahu as Palestinians fear U.S. shift
- Details of Iran nuclear deal still secret as US-Tehran relations unravel - Will Trump's Next Iran Sanctions Target China's Banks? - Don’t ‘tear up’ the Iran deal. Let it fail on its own. - Iran Has Changed, But For The Worse - Iran nuclear deal ‘on life support,’ Priebus says
- Female Activist Criticizes Rouhani’s Failure to Protect Citizens
- Iran’s 1st female bodybuilder tells her story - Iranian lady becomes a Dollar Millionaire on Valentine’s Day - Two women arrested after being filmed riding motorbike in Iran - 43,000 Cases of Child Marriage in Iran - Woman Investigating Clinton Foundation Child Trafficking KILLED!
- Senior Senators, ex-US officials urge firm policy on Iran
- In backing Syria's Assad, Russia looks to outdo Iran - Six out of 10 People in France ‘Don’t Feel Safe Anywhere’ - The liberal narrative is in denial about Iran - Netanyahu urges Putin to block Iranian power corridor - Iran Poses ‘Greatest Long Term Threat’ To Mid-East Security |
Tuesday 13 October 2015Iranian hackers are creating a network of fake LinkedIn profilesA group of suspected Iran-based hackers called TG-2889 have created a network of fake LinkedIn profiles, according to security researchers at Dell. The 25 fake LinkedIn accounts are fully fleshed profiles, with regularly updated pictures, job descriptions and endorsements. Some of the profiles have repeatedly changed names and descriptions, allowing them to maintain old connections while pursuing new ones, and several have copied over details directly from legitimate profiles. Even more alarming, many of the imposters claim to work at major corporations such as Northrop Grumman and Airbus, and several of them work as “recruitment consultants” — giving them cover to directly contact users. “CTU researchers assess with high confidence the purpose of this network is to target potential victims through social engineering. Most of the legitimate LinkedIn accounts associated with the fake accounts belong to individuals in the Middle East, and CTU researchers assess with medium confidence that these individuals are likely targets of TG-2889.” The fake accounts are split into “leaders” and “supporters”, with the less fleshed-out supporter accounts largely acting to provide legitimacy to the primary accounts. Between them, the profiles have racked up hundreds of connections with real people, and they seem to be very targeted. More than a quarter of the connections are with people who work in telecommunications, especially in the Middle East and North Africa. Another significant segment are people who work for governments and defense organisations in the Middle East and South Asia. Dell have highlighted 204 potential targets. Most are in the Middle East, but they are spread all across the globe. The concentration of the targets in specific industries, combined with the corporations the fake profiles claim to work for (largely defense contractors and industrial organisations) lead the researchers to believe the campaign is against the aerospace industry. The countries targeted make them believe it originates from Iran. http://www.businessinsider.com.au/iranian-hackers-are-creating-a-network-of-fake-linkedin-profiles-2015-10 |