• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Microsoft Captures the Websites used by Iranian Hackers

5403

The 99 Websites which were said to be used by Iranian hackers for stealing sensitive information from US targets have now been under Microsoft's control.

This lets the tech giant stop any future cyber attacks and also check how previously infected computers were compromised.

The hackers “specifically directed” their attacks on people in Washington, Microsoft said in the filing. The hacking group typically has targeted the personal email accounts of people working in both the public and private sectors, including dissidents and workers in government agencies, Microsoft said in court documents.

Among the targeted, users from the Treasury Department and similar agencies were found to be more.

The Treasury Department, which did not immediately respond to a request for comment, oversees economic sanctions against Iran. Microsoft sued the hackers in the United States District Court in Washington and asked to gain control of the sites, saying the hackers had harmed its brand and the value of its trademarks by impersonating its products to trick victims. On March 15, Judge Amy Berman Jackson granted a temporary restraining order that let Microsoft take over the websites.

Microsoft said the hacking group, which it calls Phosphorus but is also known as APT 35 and Charming Kitten had been linked to Iran. The group uses a technique known as spear phishing, sending an email and social media links to victims while imitating the personas of people or institutions they may know. That either prompts the users to click on links that install malware that lets the hacker's spy on the victims’ computers or prompts the victims to enter their login credentials, which the hackers then later use to log in to official systems.

Tags:
elijah
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 0 )

No questions available

Related Tutorials in Microsoft Captures the Websites used by Iranian Hackers

Related Tutorials in Microsoft Captures the Websites used by Iranian Hackers

How to create and configure Load Balancer on Microsoft Azure
How to create and configure Load Balancer on Microsoft Azure
Oct 31, 2022
How to Deploy and Configure Azure Application Gateway
How to Deploy and Configure Azure Application Gateway
Dec 26, 2022
How to create Microsoft Azure Virtual Machine Scale Sets
How to create Microsoft Azure Virtual Machine Scale Sets
Nov 7, 2022
How to create Linux Virtual Machine on Microsoft Azure
How to create Linux Virtual Machine on Microsoft Azure
Dec 3, 2022
How to create storage account on Microsoft Azure
How to create storage account on Microsoft Azure
Sep 6, 2022
Introduction to Microsoft Azure
Introduction to Microsoft Azure
Dec 5, 2022

Related News in Microsoft Captures the Websites used by Iranian Hackers

Related News in Microsoft Captures the Websites used by Iranian Hackers

Microsoft outages hits bunch of services including Xbox and Azure
Microsoft outages hits bunch of services including Xbox and Azure
Mar 22, 2017
Microsoft Say Edge May Come to Linux “Eventually”
Microsoft Say Edge May Come to Linux “Eventually”
Apr 19, 2019
Fear of Worldwide virus outbreak prompts Microsoft release updates for old widows
Fear of Worldwide virus outbreak prompts Microsoft release updates for old widows
May 21, 2019
IoT devices in US & UK send user data to third-parties including Netflix, Microsoft, and Google
IoT devices in US & UK send user data to third-parties including Netflix, Microsoft, and Google
Sep 26, 2019
Microsoft Captures the Websites used by Iranian Hackers
Microsoft Captures the Websites used by Iranian Hackers
Apr 10, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaiah ?
What is the use of SUID & SGID commands

How to set the special permissions to the files and folders using SUID and SGID commands...

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.