Article 54B4V Iran- and China-backed phishers try to hook the Trump and Biden campaigns

Iran- and China-backed phishers try to hook the Trump and Biden campaigns

by
Dan Goodin
from Ars Technica - All content on (#54B4V)
2020-election-800x517.jpg

Enlarge (credit: Marco Verch Professional Photographer and Speaker)

State-backed hackers from Iran and China recently targeted the presidential campaigns of Republican President Donald Trump and Democrat Joe Biden, a Google threat analyst said on Thursday.

The revelation is the latest evidence of foreign governments attempting to gain intelligence on US politicians and potentially disrupt or meddle in their election campaigns. An Iran-backed group targeted the Trump campaign, and China-backed attackers targeted the Biden campaign, said Shane Huntley, the head of Google's Threat Analysis Group on Twitter. Both groups used phishing emails. There's no indication that either attack campaign succeeded.

Kittens and Pandas

Huntley identified the Iranian group that targeted Trump's campaign as APT35, short for Advanced Persistent Threat 35. Also known as Charming Kitten, iKittens, and Phosphorous, the group was caught targeting an unnamed presidential campaign before, Microsoft said last October. In that campaign, Phosphorous members attempted to access email accounts campaign staff received through Microsoft cloud services. Microsoft said that the attackers worked relentlessly to gather information that could be used to activate password resets and other account-recovery services Microsoft provides.

Read 6 remaining paragraphs | Comments

index?i=uh8DmQzNClU:56nBrL-5a94:V_sGLiPB index?i=uh8DmQzNClU:56nBrL-5a94:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments