Iran Operated Fake Human-Resources Firm to Root Out Unfriendly Spies, Researchers Say

FILE PHOTO: Figurines with computers are seen in front of USA and Iran flags in this illustration taken, September 10, 2022. REUTERS/Dado Ruvic/Illustration/File Photo
FILE PHOTO: Figurines with computers are seen in front of USA and Iran flags in this illustration taken, September 10, 2022. REUTERS/Dado Ruvic/Illustration/File Photo
TT

Iran Operated Fake Human-Resources Firm to Root Out Unfriendly Spies, Researchers Say

FILE PHOTO: Figurines with computers are seen in front of USA and Iran flags in this illustration taken, September 10, 2022. REUTERS/Dado Ruvic/Illustration/File Photo
FILE PHOTO: Figurines with computers are seen in front of USA and Iran flags in this illustration taken, September 10, 2022. REUTERS/Dado Ruvic/Illustration/File Photo

An Iranian hacking group ran a fake professional recruiting business to lure national security officials across Iran, Syria and Lebanon into a cyber espionage trap, according to new research by US cybersecurity firm Mandiant, a division of Alphabet's Google Cloud.
Researchers said the hackers are loosely connected to a group known as APT42 or Charming Kitten, which was recently accused of hacking the US presidential campaign of Republican candidate Donald Trump. APT42 is widely attributed to an intelligence division of the Iranian Revolutionary Guard, an expansive military organization based in Tehran. The FBI has said it is investigating APT42’s ongoing efforts to interfere in the 2024 US election, Reuters reported.
The mission uncovered by Mandiant dates back to at least 2017 and was active until recently. At different times, the Iranians made their operation appear as if it was controlled by Israelis. Analysts say the likely purpose of the impersonation was to identify individuals in the Middle East who were willing to sell secrets to Israel and other Western governments. It targeted military and intelligence staff associated with Iran’s allies in the region.
“The data collected by this campaign may support the Iranian intelligence apparatus in pinpointing individuals who are interested in collaborating with Iran’s perceived adversarial countries,” the Mandiant report said. “The collected data may be leveraged to uncover human intelligence (HUMINT) operations conducted against Iran and to persecute any Iranians suspected to be involved in these operations.”
Iran's mission to the United Nations did not immediately respond to a request for comment.
Mandiant found that the digital spies used a network of websites impersonating human resources companies to manipulate Farsi-speaking targets. The bogus firms were named VIP Human Solutions, also known as VIP Recruitment, Optima HR and Kandovan HR, among others. They leveraged dozens of inauthentic online profiles on Telegram, Twitter, YouTube and social media platform Virasty, which is popular in Iran, to promote the front companies. Nearly all the associated internet accounts have since been removed.
“VIP Recruitment, a center for recruiting respected military personnel into the army, security services and intelligence from Syria and Hezbollah, Lebanon,” said a statement on one of the websites. “Join us to help each other impact the world. Our duty is to protect your privacy.”
The hackers cast a wide net by using various social media platforms to disseminate links about their fake HR scheme. It is unclear how many targets ultimately fell for the ruse. The collected data, which included addresses, contact details and other resume-related data, could still be exploited in the future, Mandiant said.



Taiwan Reports Chinese Balloon, First Time in Six Months

A woman holds flags amid celebrations of the 130th foundation anniversary of Taiwan's largest opposition party Kuomintang (KMT), in Taoyuan, Taiwan November 24, 2024. (Reuters)
A woman holds flags amid celebrations of the 130th foundation anniversary of Taiwan's largest opposition party Kuomintang (KMT), in Taoyuan, Taiwan November 24, 2024. (Reuters)
TT

Taiwan Reports Chinese Balloon, First Time in Six Months

A woman holds flags amid celebrations of the 130th foundation anniversary of Taiwan's largest opposition party Kuomintang (KMT), in Taoyuan, Taiwan November 24, 2024. (Reuters)
A woman holds flags amid celebrations of the 130th foundation anniversary of Taiwan's largest opposition party Kuomintang (KMT), in Taoyuan, Taiwan November 24, 2024. (Reuters)

Taiwan's defense ministry on Monday reported that a Chinese balloon had been detected over the sea to Taiwan's north, the first time since April it has reported such an incident in what Taipei views as part of a pattern of harassment by Beijing.

Taiwan, which China claims as its own territory, complained that in the weeks leading up to its presidential election in January Chinese balloon activity took place at an "unprecedented scale".

It described the incidents as part of a Chinese pressure campaign - so-called grey-zone warfare designed to exhaust a foe using irregular tactics without open combat.

Taiwan strongly objects to China’s sovereignty claims and says only the island’s people can decide their future.

The ministry, in its regular morning update on Chinese military activities over the previous 24 hours, said the single balloon was detected at 6:21 p.m. (1021 GMT) on Sunday 60 nautical miles (111 km) to the north of Taiwan's Keelung port.

It then vanished some two hours later, having flown at an altitude of 33,000 ft (10,000 meters), but without crossing Taiwan itself, the ministry said.

China's defense ministry did not respond to a request for comment.

China has previously dismissed Taiwan's complaints about the balloons, saying they were for meteorological purposes and should not be hyped up for political reasons.

The potential for China to use balloons for spying became a global issue last year when the United States shot down what it said was a Chinese surveillance balloon. China said the balloon was a civilian craft that accidentally drifted astray.