#iraniangroup — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #iraniangroup, aggregated by home.social.
-
FalseFont, the bespoke backdoor deployed in the campaign disclosed by Microsoft, grants its operators remote access to compromised systems, enabling file execution and transfer to command-and-control (C2) servers.
-
The malware uses IOCTLs (Input/Output Control) to interact directly with the underlying HTTP.sys driver, making it stealthier and harder to detect by security solutions.
#Cybersecurity #Iran #Cyberattack #IranianGroup #MOIS #Government
-
This cyber offensive, codenamed “Crambus” by the cybersecurity firm, saw the adversary employ the PowerExchange implant to closely monitor incoming emails sent from an Exchange Server.