Facebook catches Iranian spies for US military launch

[ad_1]
If you are a US military member who has found friends Facebook Messages from those who have been writing to the general public for months, suggesting a brighter future in the aviation industry or security companies, Facebook could have some bad news.
On Thursday, the movie giant revealed that they were tracked and possibly disrupted for a while Iran hackers who used Facebook accounts to act as co-workers, simply looking at US scams and proven methods of using technology before sending them infected files or tricking them into submitting their personal information to websites. Facebook says the swindlers also pretend to work for hospitality or the medical industry, the media, or government agencies or airlines, sometimes with their intentions for months and years in various social media sites. And unlike other recent Iranian-sponsored lawsuits that have focused on Iran’s neighbors, this recent campaign seems to have affected mainly Americans, as well as Britain and Europe.
Facebook claims to have removed “less than 200” false profiles from its platforms due to the search, and reported almost the same people Facebook had hacked. “Our research found that Facebook was part of a massive intelligence operation that targeted people with a bad reputation, architecture, crippled pages and bad communities on a number of media options, emails and social media sites,” said David Agranovich, Facebook’s chief executive for threatening threats. He said this on Thursday by calling the media.
Facebook has been identified as a backbone of development projects such as the “Tortoiseshell” group, which it believes operates on behalf of the Iranian government. The group, which links freely and resembles other well-known Iranian groups known by the names APT34 or Helix Kitten and APT35 or Charming Kitten, first appeared in 2019. At that time, security company Symantec saw the perverts violating those who are providing Saudi Arabia to the technology that appears to be the company’s customer support agent with a criminal program called Syskit. Facebook has seen the same malware being used in this recent activity, but it is more of a way to spread the word and experience it in the US and other western countries instead of the Middle East.
Tortoiseshell appears to have chosen from the very beginning of the technical crisis, and will start using violent media outlets in 2018, according to Mandiant defense. That includes more than Facebook, says John Hultquist’s vice-president of the Mandiant Intelligent Intelligence Agency. “From the very beginning, they pay for the simple media, which is Iran’s rightful place,” Hultquist said.
In 2019, the Cisco security team in Talos saw the Tortoiseshell running a fake military page called Hire Military Heroes, Designed to trick victims into installing software on their PC that had malware. Craig Williams, director of Talos’ intelligence group, says the fake location and the massive Facebook campaign that has shown all of them show how soldiers who are trying to get government jobs are targeted at spies. “The problem we have is that migrants moving to the business is a big job,” Williams said. “Bad people can find people who make mistakes, who just click on the wrong things, who are attracted to other ideas.”
Facebook warns that the group also hacked the U.S. Department of Labor page; the company provided a list of the group’s fake domains that turned the video pages, YouTube and LiveLeak brands, with various variations on Trump’s families and URLs related to the Trump administration.
[ad_2]
Source link



