Dino spyware was behind a campaign that targeted “sensitive centers” inside Iran for 18 months, Computer Emergency Response Team Coordination Center head Masoud Biglarian said, according to a July 5 report by Trend News Agency.
But Trend said Iran's Mehr news agency reported that Biglarian spurned claims that the malware had infected those centers and said steps had been taken to protect the country's assets. “We took appropriate measures to prevent damage to the strategic centers of the country by Dino,” said Biglarian, who noted that his organization had sent a report on the Dino campaign to Iranian officials.
Last week, ESET malware researchers detailed findings that they say show Dino, which is a sophisticated backdoor linked to the Animal Farm cyberespionage group, is the work of French speaking developers. The spyware's victims “were located in Iran in 2013,” ESET said.