- 13:20Casablanca Stock Exchange's MASI Surges Over 20% in Q1 2025
- 12:50Morocco’s Billionaire Standouts Highlight Economic Growth in 2025
- 12:20Tamwilcom Achieves $4.75 Billion in Financing for 2024
- 12:00Rabat launches 41 million dirham underground parking project
- 11:50Morocco to Be Guest of Honor at Sommet de l’Élevage 2025
- 11:30US greenlights $5.58 billion fighter jet sale to Philippines
- 11:20X-Links President warns of relocating Morocco-UK energy project amid UK delays
- 11:00Israel expands Gaza offensive amid territorial seizure plans
- 10:50Moroccan migrants face rising EU deportation orders
-
Weather
13.7°C/21°C
-
Thursday
15°C/19.7°C
-
Friday
15°C/19.3°C
-
Saturday
13.9°C/18.9°C
-
Sunday
14.3°C/19.1°C
-
Monday
14.8°C/14.8°C
Follow us on Facebook
Iranian Cyber Group Targets U.S. Political Figures via WhatsApp, Meta Reveals
Meta recently disclosed that an Iranian hacker group, identified as "Mint Sandstorm," attempted to infiltrate the communications of current Biden administration officials and former Trump administration members via WhatsApp. This sophisticated cyber operation, which began earlier this year, targeted several dozen individuals worldwide, including prominent public figures and diplomatic officials.
The group's strategy involved creating fewer than 10 accounts, posing as technical support representatives from well-known companies such as AOL, Google, Yahoo, and Microsoft. Meta became aware of this campaign after multiple recipients reported suspicious messages, suspecting them to be phishing attempts.
Experts classify this operation as a social engineering attack, where hackers seek to build trust with their targets to gain access to sensitive information or systems. The campaign extended beyond the United States, affecting users in Iran, Israel, Palestine, and the United Kingdom.
This revelation follows recent statements from the U.S. government and Google, which indicated that a persistent cyberespionage group linked to Iran's Islamic Revolutionary Guard Corps (IRGC) had targeted the presidential campaigns of both major U.S. political parties. Notably, they successfully breached former President Donald Trump's campaign, while the Harris campaign reported no compromise.
Additionally, the state of Utah privately circulated a warning last month about the same group's attempts to access state data related to oil, gas, and geological research.
Meta emphasized that detecting such campaigns on WhatsApp poses unique challenges due to the platform's end-to-end encryption. The company can only view message content if a user forwards it directly to them. Despite these limitations, Meta stated that they found no evidence of compromised accounts, although they acknowledged the difficulty in determining whether targets had inadvertently provided valuable information to the hackers.
The discovery of this Iranian operation highlights the ongoing threat of state-sponsored cyber activities targeting political entities and critical infrastructure. It underscores the need for vigilance and robust cybersecurity measures in an increasingly interconnected digital landscape.
This incident also draws comparisons to previous cyber operations, such as the 2016 hack of Democratic Party and Hillary Clinton campaign files. However, unlike the widespread dissemination of information in 2016, major U.S. media outlets have shown restraint in covering the recently hacked Trump campaign documents, reflecting a shift in approach to potentially stolen information.
As the digital battlefield continues to evolve, this incident serves as a stark reminder of the persistent and sophisticated nature of cyber threats facing political institutions and public figures worldwide.
Comments (0)