Iranian state-sponsored threat group HomeLand Justice was reported by the FBI and the Cybersecurity and Infrastructure Security Agency to have initially infiltrated the Albanian government network nearly 14 months before deploying the devastating cyberattack against the country in July, according to BleepingComputer.
"The actors maintained continuous network access for approximately a year, periodically accessing and exfiltrating e-mail content," said the FBI and CISA in a joint advisory.
After claiming the attack, which involved the delivery of a ransomware-style file encryptor and disk wiping malware, HomeLand Justice proceeded to leak data stolen from the network of the Albanian government.
"These were likely done in retaliation for public attribution of the cyberattacks in July and severed diplomatic ties between Albania and Iran," said the agencies.
The attack has prompted Albania to cut diplomatic ties with Iran, but Iranian state-backed actors have since launched a new wave of attacks leveraging techniques similar to those used in the July intrusion.
New attacks by Chinese state-backed threat operation Camaro Dragon, which overlaps with Mustang Panda, have involved the novel Go-based TinyNote malware, which creates various persistency tasks to ensure host access despite its lacking sophistication, according to The Hacker News.
News media organizations, academic entities, and think tanks have been warned by U.S. and South Korean intelligence agencies regarding the cyberespionage attacks by North Korean state-sponsored hacking operation Kimsuky, also known as TA406 and Thallium, reports The Record, a news site by cybersecurity firm Recorded Future.
The commercial attack tool’s use by bad actors has faded after an initial flurry, while Cobalt Strike remains the go-to post-exploitation tool for many.