- 09:02US and China reach deal to reduce tariffs by 115% to resolve trade dispute
- 08:50Pakistan seeks stronger role in Morocco’s future growth
- 08:31PKK announces disbandment and end of armed conflict with Turkey
- 08:20Algeria’s covert crackdown in France deepens diplomatic rift
- 08:01Trump’s Kashmir Comments Spark Backlash Amid Fragile India-Pakistan Ceasefire
- 07:50France backs green agriculture push in Morocco with €350M AFD-OCP deal
- 07:30Hamas Says It Will Release US-Israeli Captive Edan Alexander
- 16:00Trump Offers Mediation in Kashmir Conflict as India and Pakistan Observe Ceasefire
- 15:38The invaluable chalice used by Pope Leo XIV in his first Mass
Follow us on Facebook
Iranian Cyber Group Targets U.S. Political Figures via WhatsApp, Meta Reveals
Meta recently disclosed that an Iranian hacker group, identified as "Mint Sandstorm," attempted to infiltrate the communications of current Biden administration officials and former Trump administration members via WhatsApp. This sophisticated cyber operation, which began earlier this year, targeted several dozen individuals worldwide, including prominent public figures and diplomatic officials.
The group's strategy involved creating fewer than 10 accounts, posing as technical support representatives from well-known companies such as AOL, Google, Yahoo, and Microsoft. Meta became aware of this campaign after multiple recipients reported suspicious messages, suspecting them to be phishing attempts.
Experts classify this operation as a social engineering attack, where hackers seek to build trust with their targets to gain access to sensitive information or systems. The campaign extended beyond the United States, affecting users in Iran, Israel, Palestine, and the United Kingdom.
This revelation follows recent statements from the U.S. government and Google, which indicated that a persistent cyberespionage group linked to Iran's Islamic Revolutionary Guard Corps (IRGC) had targeted the presidential campaigns of both major U.S. political parties. Notably, they successfully breached former President Donald Trump's campaign, while the Harris campaign reported no compromise.
Additionally, the state of Utah privately circulated a warning last month about the same group's attempts to access state data related to oil, gas, and geological research.
Meta emphasized that detecting such campaigns on WhatsApp poses unique challenges due to the platform's end-to-end encryption. The company can only view message content if a user forwards it directly to them. Despite these limitations, Meta stated that they found no evidence of compromised accounts, although they acknowledged the difficulty in determining whether targets had inadvertently provided valuable information to the hackers.
The discovery of this Iranian operation highlights the ongoing threat of state-sponsored cyber activities targeting political entities and critical infrastructure. It underscores the need for vigilance and robust cybersecurity measures in an increasingly interconnected digital landscape.
This incident also draws comparisons to previous cyber operations, such as the 2016 hack of Democratic Party and Hillary Clinton campaign files. However, unlike the widespread dissemination of information in 2016, major U.S. media outlets have shown restraint in covering the recently hacked Trump campaign documents, reflecting a shift in approach to potentially stolen information.
As the digital battlefield continues to evolve, this incident serves as a stark reminder of the persistent and sophisticated nature of cyber threats facing political institutions and public figures worldwide.
Comments (0)