The social platform has suspended six sets of accounts across four jurisdictions for running alleged influence campaigns, including Iran.
An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.
The Remexi spyware has been improved and retooled.
Part two of RSA’s Conference Advisory Board look into the future tackles how approaches to cybersecurity must evolve to meet new emerging challenges.
An emergency directive from the Department of Homeland Security provides “required actions” for U.S. government agencies to prevent widespread DNS hijacking attacks.
The attacks, targeting several countries to redirect traffic and harvest credentials, have been linked to Iran.
The campaign targets politicians involved in economic and military sanctions against Iran, along with various journalists and human rights activists.
The Iran-linked APT appears to be in a state of continuous tool development, analogous to the DevOps efforts seen in the legitimate software world.
Spreading via fake Android apps, the malware lifts a range of sensitive information from victims’ devices.
The Iran-linked group is using a variant of the data-exfiltration OopsIE trojan to attack a Mideast government entity.