Monday, November 25, 2024
HomeComputer SecurityIranian Based OilRig APT Hackers Owned Email Hacking Tool Leaked in Telegram

Iranian Based OilRig APT Hackers Owned Email Hacking Tool Leaked in Telegram

Published on

OilRig APT hackers group owned Email Hacking Tool leaked by another group of hackers named “Lab Dookhtegan” in Telegram.

This tool named as Jason, which is one among the hacking tools listed in the Iranian Ministry of Intelligence arsenal.

This group also has known as APT 34, a team of highly intelligent hackers and malware developers to be originated from the Ministry of Intelligence of Iran that appears to target financial, energy, telecommunications, and chemical companies around the world.

- Advertisement - SIEM as a Service

Another group of hackers who was continuously leaking various hacking tools in their Telegram channel against APT 34 Iranian state sponsor group since March 26.

Email Hacking Tool

The same group already leaked many hacking arsenals in Telegram which includes malware source code, PowerShell Payload, a server-side module which is the c2 made in node.js, ASP Webshell, dubbed “HighShell” that has more than 30k lines of code.

Email Hacking Tool Used for Bruteforce Attack

Leaked Email hacking tool seems to be used for launching a Bruteforce attack against the target then trying to execute the various login passwords until it finds the original password.

Email Hacking Tool

The Email Hacking Tool uploaded as an archived file with the name “Jason.zip,” Once I extracted the file, it compiled with four files, one indicates that the tool used to perform a brute-force attack against Microsoft exchange server.

According to Omri Segev, The tool has been uploaded to Virustotal quickly after it’s released in the telegram channel and has 0 detection rate at the time although compiled in 2015.

The unknown individual from Lab Dookhtegan Telegram channel wrote upon the tool leaks said “We are exposing today another cyber tool (Jason, an Email Hacking tool) being abused by the b**tard Iranian Ministry of Intelligence for hacking emails and stealing information. We thank our suffering compatriots for their cooperation with no hesitation.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Digital Wallets Bypassed To Allow Purchase With Stolen Cards

Digital wallets enable users to securely store their financial information on smart devices and...

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...