Iran-linked hackers pose as journalists in email scam

The phony request was in reality an attempt to break into Kasraie’s email account. (Reuters)
Short Url
Updated 06 February 2020

Iran-linked hackers pose as journalists in email scam

  • Incidents come to light at a time when US has warned of Iranian cyberthreats

WASHINGTON: When Iranian-born German academic Erfan Kasraie received an email from The Wall Street Journal requesting an interview, he sensed something was amiss.

The Nov. 12 note purportedly came from Farnaz Fassihi, a veteran Iranian-American journalist who covers the Middle East. Yet it read more like a fan letter, asking Kasraie to share his “important achievements” to “motivate the youth of our beloved country.”

“This interview is a great honor for me,” the note gushed.

Another red flag: The follow-up email that instructed Kasraie to enter his Google password to see the interview questions.

The phony request was in reality an attempt to break into Kasraie’s email account. The incident is part of a wider effort to impersonate journalists in hacking attempts that three cybersecurity firms said they have tied to the Iranian government, which rejected the claim. The incidents come to light at a time when the US government has warned of Iranian cyberthreats in the wake of the US airstrike that killed Iran’s second most powerful official, Maj. Gen. Qassem Soleimani.

In a report published on Wednesday, London-based cybersecurity company Certfa tied the impersonation of Fassihi to a hacking group nicknamed Charming Kitten, which has long been associated with Iran. Israeli firm ClearSky Cyber Security provided Reuters with documentation of similar impersonations of two media figures at CNN and Deutsche Welle, a German public broadcaster. ClearSky also linked the hacking attempts to Charming Kitten, describing the individuals targeted as Israeli academics or researchers who study Iran. ClearSky declined to give the specific number of people targeted or to name them, citing client confidentiality.

Iran denies operating or supporting any hacking operation. Alireza Miryousefi, the spokesman for the Islamic republic’s mission to the UN, said that firms claiming otherwise “are merely participants in the disinformation campaign against Iran.”

Reuters uncovered similar hacking attempts on two other targets, which the two cybersecurity firms, along with a third firm, Atlanta-based Secureworks, said also appeared to be the work of Charming Kitten. Azadeh Shafiee, an anchor for London-based satellite broadcaster Iran International, was impersonated by hackers in attempts to break into the accounts of a relative of hers in London and Prague-based Iranian filmmaker Hassan Sarbakhshian.

Sarbakhshian — who fled the Islamic republic amid a crackdown that saw the arrest of several fellow photojournalists in 2009 — was also targeted with an email that claimed to be from Fassihi. The message asked him to sign a contract to sell some of his pictures to The Wall Street Journal. Sarbakhshian said in an interview that he was suspicious of the message and didn’t respond.

Neither did the ruse fool Kasraie, an academic who frequently appears on television criticizing Iran’s government.

“I understood 100 percent that it was a trap,” he said in an interview.

That is not surprising given the hackers’ sloppy tactics. For instance, they missed the fact that Fassihi had left the Journal last year for a new job at The New York Times.

The Journal declined to comment. Fassihi referred questions to The Times, which in a statement called the impersonation “a vivid example of the challenges journalists are facing around the globe.”

US officials and cybersecurity experts see Iran as a digital threat. Earlier this month, the US Department of Homeland Security and the Federal Bureau of Investigation (FBI) issued alerts about the threat of Iranian cyberattacks following the controversial US attack that killed Soleimani. Microsoft, which tracks attempts to undermine election security, in October accused Charming Kitten of targeting a US presidential campaign; sources told Reuters at the time that the campaign was Donald Trump’s.

Homeland Security and FBI spokespeople declined to comment on the recent impersonations identified by Reuters. Certfa, ClearSky, and Secureworks said they could be tied to Charming Kitten through a study of the tactics, targets, and digital infrastructure involved — including servers, link shortening services, and domain registration patterns.

“This activity does align with prior Iranian cyber operations,” said Allison Wikoff, a Secureworks researcher who has tracked Charming Kitten for years.

In early 2019, the US indicted Behzad Mesri — who ClearSky has linked to Charming Kitten through emails and social media activity — on charges of recruiting a former US Air Force intelligence officer to spy on behalf of Iran. Mesri remains at large and could not be reached for comment.

Other impersonated journalists included CNN national security analyst Samantha Vinograd, whose identity was stolen in August and used in attempts to break into email accounts in Israel, ClearSky said. Another was Michael Hartlep, a Berlin-based video journalist who has done freelance assignments for Deutsche Welle and Reuters. ClearSky found his name on an email inviting recipients to a bogus Deutsche Welle webinar on Iran’s role in the Middle East. The firm did not find evidence that the Reuters name was used in hacking attempts.

In another case, the hackers appear to have invented a journalist — “Keyarash Navidpour” — to send out a phony invitation on Jan. 4 to an online seminar that it claimed Deutsche Welle would hold about the killing of Soleimani the day before. No such journalist works for Deutsche Welle, said the news organization’s spokesman Christoph Jumpelt.

Vinograd referred questions to CNN, which did not return messages seeking comment. Hartlep told Reuters he worried such stunts might give sources second thoughts about answering a reporter’s queries.

“If this becomes the usual way of tricking people,” he said, “definitely it makes our work very hard.”


LIVE: Countries ease coronavirus regulations to reverse coronavirus pandemic impact on economies

Updated 25 min 27 sec ago

LIVE: Countries ease coronavirus regulations to reverse coronavirus pandemic impact on economies

DUBAI: Saudi Arabia announced it was easing the 24-hour lockdown brought into force during Eid – except in Makkah.
The initial timings will be from 3 p.m. until 6 a.m., but May 31, the curfew will run from 8 p.m. until 6 a.m. The Kingdom plans to remove all curfews by June 21.
Meanwhile, Dubai will allow free movement and business activity to restart during the day from Wednesday. The new timing of the curfew will be from 11.00 p.m. to 6.00 a.m., the Dubai Media Office said in a press release.
May 26, 2020, Wednesday (All times in GMT)

07:04 – Daejeon, a cafe in South Korea, hires a robot barista to help with social distancing.

05:56 – The WHO suspended trials of the drug that Donald Trump has promoted as a coronavirus defence, fuelling concerns about the US president's handling of the pandemic that has killed nearly 100,000 Americans.
04:52 – South American carrier LATAM Airlines says it is seeking Chapter 11 bankruptcy protection as it grapples with the sharp downturn in air travel sparked by the coronavirus pandemic.
Santiago, Chile-based LATAM Airlines Group S.A. said Tuesday that it and its affiliated companies launched the reorganization effort in the United States.
04:49 – Singapore’s embattled economy could shrink by as much as 7 percent this year, which would be the county’s worst reading since its independence, with the government saying Tuesday the coronavirus pandemic had throttled the key export sector.
The city-state is seen as a bellwether of the global economy and the historic contraction highlights the extreme pain being wrought on countries by the killer disease.
04:44 – Thailand on Tuesday reported three new coronavirus cases and no new deaths, bringing its total to 3,045 confirmed cases and 57 fatalities.