Cybersecurity NewsNews

Iraqi Hackers Seize Control of Iran Nuclear Arsenal Websites and Databases

Loading

Prana Network claimed that the 1915 Team breached several Iranian government websites. The group allegedly consists of individuals of Kurdish, Iraqi, and Yemeni origins.

Iran Nuclear Website Among Targets

The attack led to the shutdown of over 20 Iranian government websites, including those related to nuclear testing, organization, employment, complaints handling, the Ministry of Energy, the Ministry of Health, information technology organizations, the national catalog system, the monitoring system, the Center for Medical Care Control, and civil aviation organizations.

Additionally, the hackers targeted the Holy Quran and Traditions Center, Halal Research Center, National Productivity Organization, and the Ministry of Najafabad. Reports suggest that the hackers may have gained access to sensitive databases.

However, the motive behind the attack is unclear, as the group always damages cyber infrastructures without disclosing a specific motive.

In April 2023, the 1915 team declared their intention to launch an attack on Israel’s economic and government institution infrastructures starting from April 7, 2023.

It is noteworthy that the same group has targeted Indian assets based on religious orientation in the past. The extent of the damage caused by the attack is also unclear, as the group has yet to reveal how much data was hijacked in the hack and the extent of the hack’s effect.

It is important to monitor developments closely to ensure the safety and security of the affected websites and databases.

Alleged Nation-state Hackers Breached MITRE Corporation

Recently, the MITRE Corporation, a non-profit organization known for managing federally funded research grants, faced a severe data breach by a group of alleged nation-state hackers. These hackers were able to infiltrate MITRE’s systems by exploiting two zero-day vulnerabilities in Ivanti’s products.

According to the report, the hackers gained access to MITRE’s systems by taking advantage of one of its VPNs. The firewall in place further aided the hackers in exploiting the Ivanti Connect Secure’s vulnerabilities.

The hackers were able to exploit CVE-2023-46805 and CVE-2024-21887, two significant defects in Ivanti that had already victimized at least ten customers before MITRE.

The MITRE CTO, Charles Clancy, has attributed the data breach to an adversary nation-state and several other factors. However, he didn’t disclose the identity of the threat actor.