Monday, August 10, 2015
Iranian Dark Coders Hacking Team: Everywhere and Anywhere but not Harmless
A presentation at American security conference BlackHat USA in Las Vegas, has said that Iran appears to be actively seeking for critical national infrastructure systems connected to the Internet to exploit them.
At BlackHat USA Trend Micro researchers Kyle Wilhoit and Stephen Hilt revealed how their honeypot version of a Vedeer-Root Guardian AST gas gauge monitoring system (nickname «Gaspot») apparently fooled some Iranian hackers.
The Iranian hacking group Iranian Dark Coders, so called IDC-Team, modified the names of two pumps situated in Jordan. The IDC-Team which is best known for defacements and malware distribution, renamed two different tank names in the systems, one as «H4CK3D by IDC-TEAM» and other as «AHAAD Was Here».
IDC-Team
This is not a new thing. As a Google search will show IDC-Team has been hacking websites for a long time. According to their Facebook page the team started in 2012 and have grown since then in to a team with many members on its forum talking about hacks and bugs and computer security.
Over the last year IDC-Team have submitted more than 950 website defacements of targets all over the world. Many of these defacements are government sites (gov.pl, gov.co, gov.in) or companies with famous products (Jeep). This shows that the team have hacking skills that are enough advanced to damage to secure websites.
Why do they hack?
Despite the amount of hacks by IDC-Team and who they hack it is clear their agenda is little more than publicity. Their defacements are advertisements for their community and the individuals involved and they are not messages of hate and violence.
IDC-Team is everywhere and goes anywhere as Trend Micro revealed. However they appear to be looking for recognition as computer security experts and not hacktivists.
Labels:
Blackhat USA,
defacement,
Gaspot,
hacktivists,
honeypot,
IDCT,
iran,
Iranian Dark Coders Team,
Jeep,
Jordan,
malware,
security experts,
Trend Micro
Subscribe to:
Post Comments (Atom)
-
Iran launched sophisticated computer espionages leading to a series of cyberattacks against US State Department officials over the pas...
-
According to the Wall Street Journal, hackers who took Sony Pictures Entertainment’s computer systems offline used tools which were...
-
The United Kingdom (UK) Parliament appears to have been hacked by Iran. The cyber-attack on 23 June 2017 was a brute-force attack again...
-
Following on from my article here about the Iranian Cyber Police asking Iranians to stop using Telegram, it appears that the Iranian hac...
-
The IRGC Organized Cyber Crime Investigation Center have reported that over 3,000 Iranian websites have been hacked by a group called ...
-
Since my last post in October, there has been no confirmation of which group was behind the cyber-attack on Westminster, or the role of the ...
-
Duqu 2.0: ‘Almost Invisible’ Cyber Espionage Tool Targeted Russian Co., Linked to Iran Nuclear TalksA Russian cyber security company says that it has discovered a highly-technical, “almost invisible” cyber espionage tool that t...
-
The Iranians appear to be engaged in a strange soft-war propaganda campaign projecting to a Western audience using the hashtag, "Pow...


No comments:
Post a Comment