Search Results for “Times of Israel”


September 12, 2019
Daniel Lippman / Politico

Daniel Lippman / Politico  
Israel Was Most Likely Behind Placement of Surveillance Stingray Devices Near White House Which Aimed to Spy on Donald Trump, Administration Failed to Rebuke Israeli Government, Sources

The U.S. government concluded within the last two years that Israel was most likely behind the placement of cell-phone surveillance devices known as Stingrays, or more formally international mobile subscriber identity-catchers or IMSI-catchers, that were found near the White House and other sensitive locations around Washington, D.C., yet the Trump Administration did nothing about it and failed to rebuke the Israeli government. The devices were intended to spy on Donald Trump as well as his top aides and closest associates. U.S. officials shared their findings with relevant federal agencies, according to a letter a top DHS official, Christopher Krebs, wrote in May 2018 to Sen. Ron Wyden (D-OR.). According to a detailed forensic analysis, the FBI and other agencies working on the case felt confident that Israeli agents had placed the devices, sources say. Israel issued a pro forma denial that it is the culprit behind the stingrays.

Related: Gizmodo, Slate, Bloomberg, The Guardian, Just Security, Washington Examiner, Israel National News, Haaretz.com, Washington Examiner, NBC News Top Stories, PressTV, South China Morning Post, FuturismCBSNews.com, Jerusalem Post, Vox, BBC News – World, CBSNews.com, The Times of Israel, Algemeiner.com, BBC News – World, SC Magazine, Reuters: World News, Slashdot

Tweets:@dlippman @thegrugq @maxblumenthal @olgaNYC1211 @kenklippenstein @yashar @KyleWOrton @NTarnopolsky @AkiPeritz @CrispinBurke @ericgeller @timothypmurphy @gregotto @russellbrandom

Gizmodo: Israel Allegedly Installed Stingray Devices Around D.C. to Spy on President Trump
Slate: Israel Reportedly Known to Be Spying on White House Cell Phones, but Trump Didn’t Do Anything About It
Bloomberg: Israel Denies Report it Planted Spying Devices in Washington D.C.
The Guardian: Israel accused of planting spying devices near White House
Just Security: The Early Edition: September 12, 2019
Washington Examiner: Israel blamed for spy devices found near White House
Israel National News : Report: Israel accused of planting spy devices near White House
Haaretz.com: Israel reportedly planted mysterious spy devices near White House
Washington Examiner: Israel blamed for spy devices found near White House
NBC News Top Stories: Netanyahu denies Israel planted spy devices near the White House
PressTV: Israel accused of placing spy devices near White House: Report
South China Morning Post: Israel accused of planting mysterious spy devices near the White House
Futurism: The FBI Reportedly Thinks Israel Spied on Trump’s Phone
CBSNews.com: Politico: Israel accused of planting spy devices near White House
Jerusalem Post: Trump says he does not believe Israelis are spying on the U.S.
Vox: Vox Sentences: Another hurdle for asylum seekers
BBC News – World: Netanyahu denies Politico report Israel spying on the White House
CBSNews.com: “StingRay” surveillance devices found near the White House
The Times of Israel: Trump says he doesn’t believe report of Israel spying on White House
Algemeiner.com: Netanyahu Denies Report of Israeli Spy Operation in US
BBC News – World: Netanyahu denies Politico report Israel spying on the White House
SC Magazine: Israel reportedly behind spying devices found near White House, other sensitive areas | SC Media
Reuters: World News: Trump says he does not believe Israelis are spying on the U.S.
Slashdot: Israel Accused of Planting Mysterious Spy Devices Near the White House

@dlippman: SCOOP: The U.S. government concluded within the last two years that Israel was most likely behind cell-phone surveillance devices that were found operating near the WH and other sensitive parts of D.C., according to three former senior U.S. officials.
@thegrugq: The counterintelligence threat of using commodity mobile phones for sensitive matters is very very real. The ISMSI catchers found around the WH a couple years ago were apparently intended to capture Trump & his crew’s phones.Linked, allegedly, to Israel.
@maxblumenthal: US govt has concluded within the last two years that Israel was most likely behind surveillance devices found near the White House and other sensitive locations around DCYet “the Trump administration did not rebuke the Israeli government” #IsraelGate
@olgaNYC1211: Wait let me get this straight.. Trump is accusing Israel off spying on him? Can't wait to see Trump cults response
@kenklippenstein: "after the FBI and other agencies concluded that the Israelis were most likely responsible for the devices, the Trump administration took no action to punish or even privately scold the Israeli government."
@yashar: New: Israel was most likely behind the placement of surveillance devices that were found near the White House. But even though officials believe the devices were planted to spy on POTUS and other officials, the WH did not punish Israel@dlippman scoops
@KyleWOrton: Espionage devices, designed to fool mobile telephones into giving up data, were found "near the White House and other sensitive locations around Washington, D.C.", targeting Trump and other senior officials. #Israel is almost certainly responsible.
@NTarnopolsky: #Breaking: The FBI accuses Israel of spying on the White House. Administration tried to downplay findings. Israeli embassy says "we don't spy on the United States."
@AkiPeritz: So it turns out it was Israel that places the Stingrays around downtown DC to collect intelligence on top US policymakers, like POTUS, Kushner and everyone else.
@CrispinBurke: "Unlike most other occasions when flagrant incidents of foreign spying have been discovered on American soil, the Trump administration did not rebuke the Israeli government, and there were no consequences for Israel’s behavior..."
@ericgeller: Israel planted StingRays in D.C. to spy on Trump, and his administration is fine with it because, you know, Israel. https://politico.com/story/2019/09/12/israel-white-house-spying-devices-1491351
@timothypmurphy: best frenz
@gregotto: Three officials tell Politico that Israel planted stingrays in areas around the White House
@russellbrandom: Israel planted Stingrays cell-trackers pointed towards the White House, per Politico


August 22, 2019
Tova Cohen, Ari Rabinovitch / Reuters

Tova Cohen, Ari Rabinovitch / Reuters  
Israel’s Defense Ministry Is Easing Restrictions on the Export of Offensive Cyber Weapons, Economic Ministry Seems Poised to Speed These Exports

A rule change by the Israeli defense ministry is easing export rules on offensive cyber weapons despite accusations by human rights and privacy groups that those technologies are used by some governments to spy on political foes and crush dissent. The rule change means companies can now obtain exemptions on marketing licenses for the sale of some products to specific countries, according to a source. In addition, Israel’s economy ministry, which is responsible for promoting economic growth and exports, is setting up a division to handle exports of cyber technologies that have offensive and defensive capabilities, indicating the country could make more changes that speed the export of offensive cyber weapons. Notorious Israeli companies, including NSO Group and Verint, and defense contractor Elbit Systems, are among the world leaders in the growing global market for cyber weapons.

Related: Reuters, The Times of Israel, Defenseweb.co.za, Algemeiner.comJerusalem Post

Tweets:@CitizenLab @joshyrama @kennethgeers


October 11, 2019
The Times of Israel

The Times of Israel  
Israel Rejected Russian Prisoner Exchange Offer Involving Hacker Slated for Extradition to the U.S.

Russia jailed an Israeli-American woman, Naama Issachar, accused of smuggling marijuana for 7.5 years after Israel rejected repeated Russian offers for a prisoner exchange that would have released a Russian hacker who is due to be extradited from Israel to the United States. Issachar had been detained in Moscow for six months prior to her arrest. The Russian hacker is Aleksey Burkov, a Russian IT specialist who was arrested in Israel in 2016 at the request of Interpol. Burkov is wanted on embezzlement charges in the United States for a massive credit card scheme that saw him allegedly steal millions of dollars from American consumers.

July 19, 2019
Mehul Srivastava and Tim Bradshaw / Financial Times

Mehul Srivastava and Tim Bradshaw / Financial Times  
Spyware Company NSO Group Tells Prospective Clients It Can Scrape Users’ Data from Servers of Apple, Google, Facebook, Amazon, and Microsoft, Report

Notorious Israeli spyware company NSO Group, whose flagship malware Pegasus has been used by authoritarian regimes to spy on smartphones, has told buyers its technology can surreptitiously scrape all of an individual’s data from the servers of Apple, Google, Facebook, Amazon, and Microsoft, according to sources familiar with the company’s sales pitch. Pegasus has evolved to capture ever greater amounts of information, including a target’s location data, archived messages or photos, according to people who shared documents with the Financial Times and described a recent product demonstration for the government of Uganda. The new capabilities are said to copy the authentication keys of services such as Google Drive, Facebook Messenger and iCloud, among others, from an infected phone, allowing a separate server to then impersonate the phone, including its location, giving open-ended access to the cloud storage of those apps without “prompting 2-step verification or warning email on target device,” according to the demonstration. Amazon, Facebook, and Microsoft say they have no evidence of Pegasus access to their cloud files but say they are investigating. Google has not responded.

Related: The Next Web, CNBC, Forbes, Digital Journal, MacRumors, The Loop, Tech Insider, The Mac Observer, AppleInsider, MediaNama: Digital Media in IndiaiPhone Hacks, Softpedia News, HotHardware.com, The Register – Security, SecurityWeek, MacDailyNews, Slashdot

Tweets:@Bing_Chris @hatr @josephfcox @zackwhittaker

The Next Web: NSO Group’s WhatsApp spyware can now snoop on your Facebook, Google, and iCloud data too
CNBC: Israeli security company reportedly has tool that spies on Apple, Google and Facebook cloud data
Forbes : Israel’s NSO Spyware Can Now Hack Google, iCloud And Facebook Via Phones: Report
Digital Journal: Israel spyware firm can mine data from social media: FT
MacRumors: Israeli Security Firm Claims Spyware Tool Can Harvest iCloud Data in Targeted iPhone Attack
The Loop: Israeli Security Firm Claims Spyware Tool Can Harvest iCloud Data in Targeted iPhone Attack
Tech Insider: The Israeli firm behind software used to hack WhatsApp boasted that it can scrape data from Amazon, Apple, Facebook, Google, and Microsoft cloud servers
Verdict: NSO denies having spyware that can hack cloud servers
The Mac Observer: NSO Group Tool Harvests Targeted iCloud Data
AppleInsider: Israeli spyware claims to beat Apple’s iCloud security
MediaNama: Digital Media in India: NSO spyware targets phones to get data from Google, Facebook, iCloud
HotHardware.com: NSO Claims Its WhatsApp Spyware Can Universally Hack iCloud, Google, Facebook, Amazon, Microsoft Cloud Data
The Register – Security: Israel’s NSO Group: Our malware? Slurp your cloud backups plus phone data? They’ve misunderstood
SecurityWeek: Israel Spyware Firm Can Mine Data From Social Media: FT
MacDailyNews: NSO Group says it can scrape data from Apple, Google, Facebook, Amazon, and Microsoft cloud services
Slashdot: NSO Spyware ‘Targets Big Tech Cloud Services’

@Bing_Chris: Per FT, new NSO sales pitch includes claim it can pull data from popular Cloud services. Also reveals Ugandan government had shown interest in capability. Comment from NSO spokesperson says "no mass collection" but that's clearly not the point.
@hatr: NSO seems to have a new pitch and new abilities. Accessing cloud data."This grants open-ended access to the cloud data of those apps without “prompting 2-step verification or warning email on target device”, according to one sales document."https://www.ft.com/content/95b91412-a946-11e9-b6ee-3cdf3174eb89 …
@josephfcox: NSO's malware can log into Facebook, Amazon etc, download content. FT has bizarrely framed this as an issue for the cloud services, when it's really about how end devices secure auth tokens. You own the device, you are the device. This will get dumb hyped
@zackwhittaker: I've been thinking about this FT story. The short of it is that NSO-developed spyware "can surreptitiously scrape all of an individual’s data from the servers of Apple, Google, Facebook, Amazon and Microsoft," say people familiar with its sales pitch. (1/)


October 10, 2019
Jack Nicas / New York Times

Jack Nicas / New York Times  
Apple Caves to Chinese State Criticism and Pulls App That Allowed Hong Kong Protesters to Track Police

In a move among several recent developments that shows the power of the Chinese state to dictate policies by American companies, Apple removed an app, HKmap.live, from its app store that enabled protesters in Hong Kong to track the police, a day after facing intense criticism from Chinese state media for it. Apple’s removal of the app followed an editorial by the People’s Daily, the flagship newspaper of the Chinese Communist Party, that accused Apple of aiding “rioters” in Hong Kong. Apple said it verified with the Hong Kong Cybersecurity and Technology Crime Bureau that the app has been used to target and ambush police, threaten public safety, and criminals have used it to victimize residents in areas where they know there is no law enforcement.

Related: The Next Web, Reuters, Forbes, ZDNet Security, News.com, Apple Insider, Newsweek, Israel National News, South China Morning Post, The Korea Times News, Hong Kong Free Press HKFPPOLITICO, Financial Times, iMoreDaring FireballFortune, Security, Privacy & Tech Inquiries, EJ Insight, The New Daily, RT News, rthk.hk Local, WRAL Tech Wire, MacRumors, TechCrunch, Tech Insider, iPhone Hacks, MacRumors, Silicon Republic, Tech Insider, Z6 Mag, Global Voices, ReutersFortune  iMore, Tech Insider, WRAL Tech Wire, Fortune, Z6 Mag, BBC News, CRN, NDTV, Telegraph, QuartzNaked Security, EFF, Threatpost

Tweets:@juhasaarinen @Pinboard @thegrugq @jpwarren @jeffstone500

The Next Web : Apple bans app that warns Hong Kong citizens about police activity, again
Reuters : Apple pulls police-tracking app used by Hong Kong protestors after consulting authorities
Forbes : Apple Removes App Used To Track Hong Kong Police After Pressure From China
ZDNet Security: Apple pulls HKmap.live from app store
News.com.au : Apple bans app after China threat
Apple Insider : Apple again pulls police monitoring app from Hong Kong app store
Newsweek: What is HKmap? Apple’s Removal of App Used by Hong Kong Protesters is ‘Political Decision to Suppress Freedom,’ Devs Say
Israel National News : Apple withdraws Hong Kong police-tracking app
South China Morning Post: Swedish tech firm Yubico hands Hong Kong protesters free security keys amid fears over police tactics online
The Korea Times News: Swedish firm gives Hong Kong protesters security keys amid police hacking fear
Hong Kong Free Press HKFP: ‘You’re not alone’: Hong Kong activists united over raising awareness about gender-based violence
POLITICO: U.S. passing Hong Kong human rights and democracy act will ‘punish the wrong people,’ says ex-Trump envoy
Financial Times: Apple pulls Hong Kong map used by protesters from App Store
iMore : Hong Kong mapping app removed from App Store
Daring Fireball: Apple Removes HKmap.live From App Store
Fortune: Apple Removes Hong Kong Protest Map From App Store The Day After Beijing Complains
Security, Privacy & Tech Inquiries: Censorship-resilient apps with Progressive Web Applications
EJ Insight: Apple pulls HK police-tracking app after China criticism
The New Daily: Apple removes Hong Kong police tracker app
RT News: Apple removes app that Hong Kong protesters used to track police movements following vandalism, attacks on officers
rthk.hk Local: Apple pulls HK protester app after Beijing warning
WRAL Tech Wire: Apple drops Hong Kong activists app; Huawei may be able to buy some US goods
MacRumors: Apple Pulls Hong Kong Protest App From App Store Following Chinese Criticism
TechCrunch: Apple pulls HKmap from App Store, the day after Chinese state media criticized its “unwise and reckless decision” to approve it
Tech Insider: China’s grip on Apple tightens as it boots a Hong Kong police-tracking app and news app Quartz
iPhone Hacks: Tim Cook Explains Why Apple Removed the Controversial Hong Kong Protest App
MacRumors: Tim Cook Defends Removal of Hong Kong Mapping App From App Store in Leaked Memo
Silicon Republic: Apple accused of bowing to political pressure amid Hong Kong app removal
Tech Insider: Hong Kong lawmaker who relied on the banned HKMap Live app warns Apple from becoming an ‘accomplice for Chinese censorship’
Z6 Mag: Apple CEO Tim Cook justifies removal of Hong Kong maps app from App Store
Global Voices: Google removes Hong Kong protester role-playing game from its Play Store
Reuters : Apple pulls app used to track Hong Kong police, Cook defends move
Fortune: Apple CEO Tim Cook Defends Decision to Drop Hong Kong Protest Map From App Store After China Complaint
iMore: Read Charles Mok’s open letter to Tim Cook about Hong Kong
Tech Insider: Hong Kong lawmaker who relied on the banned HKMap Live app warns Apple from becoming an ‘accomplice for Chinese censorship’
WRAL Tech Wire: Tim Cook’s choice: Apple kowtows to China or face punishing costs
Fortune: Apple CEO Tim Cook Defends Decision to Drop Hong Kong Protest Map From App Store After China Complaint
Z6 Mag: Apple CEO Tim Cook justifies removal of Hong Kong maps app from App Store
BBC News : Few convinced by Apple’s case for Hong Kong app removal – BBC News
CRN : Apple criticised for pulling app that tracks Hong Kong police
NDTV : Apple Removes Quartz News App From China App Store Over Hong Kong Protest Coverage
Telegraph : Fury as Apple pulls US news app Quartz from China ‘over Hong Kong coverage’
Quartz: Tim Cook doesn’t seem to know how the Hong Kong app Apple removed actually works
Naked Security: Apple removes app that tracks Hong Kong police and protestors
EFF: China’s Global Reach: Surveillance and Censorship Beyond the Great Firewall
Threatpost: China’s Sway Over Tech Companies Tested with Apple, Blizzard

@juhasaarinen: Apple pulls http://HKmap.live from app store https://zd.net/2nxabSt via @ZDNet & @dobes
@Pinboard: This is important. Note the hypothetical language used here by Hong Kong police—they contacted "several app stores" (presumably including Apple) with the complaint that @hkmaplive "could leak the officers' whereabouts, which could facilitate the criminals to ambush our officers."
@thegrugq: This pure information warfare attack surface is brilliant. Blizzard punished a player for being pro Hong Kong. Players are attempting to get Blizzard games banned by Chinese censors. Winnie the Pooh is already censored due to memes about Xi, so this isn’t too unrealistic a goal.
@jpwarren: I am doubling my order of @Yubico keys and telling everyone I know to do the same, because of their principled stance on Hong Kong. And so should you. Please RT.
@jeffstone500: Censorship is just the beginning. China is using powerful DDoS attacks to knock foreign websites offline, per @EFF @Mala. Recent victims include Telegram, a Hong Kong protest forum, and social media outside government control.


August 28, 2019
Julian E. Barnes / New York Times

Julian E. Barnes / New York Times  
Secret U.S. Cyberattack Against Iran Wiped Out Critical Database Used by Revolutionary Guards to Plot Attacks Against Oil Tankers, Iran Still Trying to Repair Critical Communications Systems, Officials

A secret U.S. cyberattack against Iran in June wiped out a critical database used by Iran’s paramilitary arm, Islamic Revolutionary Guards Corps, to plot attacks against oil tankers and degraded Tehran’s ability to covertly target shipping traffic in the Persian Gulf, at least temporarily, senior American officials say. The database targeted in the attack helped Tehran choose which tankers to target and where, according to one official. The officials are speaking out in order to dispel doubts within the Trump administration about whether the benefits of the operation outweighed the costs. The costs included lost intelligence and lost access to a critical network used by the Islamic Revolutionary Guards. Iran has not escalated its attacks on the U.S. in retaliation. Iran is still trying to repair critical communications systems and has not recovered the data lost in the attack, officials said.

Related: Jewish News Syndicate, Business Insider, Washington Post, The Times of Israel, CNET, Washington Free Beacon, SC Magazine, DataBreachToday.com, Law & Disorder – Ars Technica. Slashdot, Glock Takes Stock, Cybersecurity Insiders, SC MagazineThe Hill, Arutz Sheva News

Tweets:@peterbakernyt @kimzetter @julianbarnes @weldpond @adamgoldmanNYT @rgoodlaw @amyfiscus @nedprice @RevaGoujon @jeffstone500

Jewish News Syndicate: Report: US cyberattack hurt Iranian capability to target oil tankers in Persian Gulf
Business Insider: The US hit Iran with a secret cyberattack to disrupt oil tanker attacks the same day Trump almost authorized military strikes
Washington Post: U.S. military carried out secret cyber strike on Iran to prevent it from interfering with shipping
The Times of Israel: US cyber attack said to have disabled Iran’s ability to target oil tankers
CNET: US cyberattack damaged Iran’s ability to target oil tankers, report says
Washington Free Beacon: Iranian Foreign Minister Zarif Forgets His Regime Bans YouTube, Instagram
SC Magazine: U.S. cyberattack crippled Iran’s efforts to attack ships in Persian Gulf | SC Media
DataBreachToday.com: Sizing Up Impact of U.S. Cyberattack Against Iran
Law & Disorder – Ars Technica: US hack attack hobbles Iran’s ability to target oil tankers, NYT says
Slashdot: US Cyberattack Hurt Iran’s Ability To Target Oil Tankers, Officials Say
Glock Takes Stock: US cyber attack said to have disabled Iran’s ability to target oil tankers
Cybersecurity Insiders: US Cyber Attack foils Iran’s ability to attack Oil Tankers
SC Magazine: U.S. cyberattack crippled Iran’s efforts to attack ships in Persian Gulf | SC Media
The Hill: US cyberattack took out Iran’s ability to target oil tankers: report
Arutz Sheva News: Report: US cyberattack hurt Iran’s ability to attack tankers

@peterbakernyt: A secret cyberattack against Iran in June wiped out a critical database used by Iran’s paramilitary arm to plot attacks against oil tankers and degraded its ability to covertly target shipping traffic in the Persian Gulf. ? @julianbarnes
@kimzetter: US hacked database Iran used to choose which oil tankers to hijack. The effects of the June attack "have lasted longer than expected and Iran is still trying to repair critical communications systems and has not recovered the data lost in the attack"
@julianbarnes: The June 20 cyber attack on Iran took out a key database on tanker traffic and curbed, at least for a time, Iran's ability to launch covert attacks.
@weldpond: We are in a "cyberconflict" with Iran. Buckle up US defenders.Cyber words in article: cyberattack, cyberconflict, cyberoperations, cyberstrikes, Cyber Command, and cyberweapons
@adamgoldmanNYT: Iran is still trying to recover information destroyed in the June 20 attack and restart some of the computer systems — including military communications networks — taken offline, the officials said. https://nyti.ms/2PjbxNW @julianbarnes
@rgoodlaw: "The American operations are calibrated to stay well below the threshold of war, the official added."But did US cyber op—as reported here by @julianbarnes —cross threshold of the use of force under UN Charter?What so you international law Twitter? https://nytimes.com/2019/08/28/us/politics/us-iran-cyber-attack.html
@amyfiscus: NEW: The cyberattack against Iran in June degraded its ability to target oil tankers and shipping traffic in the Gulf @julianbarnes
@nedprice: There's always a good degree of opacity in these instances--and rightly so--but the @nytimes ' description sure makes it sound like this was an operation pushed through by hardliners in the policy community over the objections of intelligence professionals
@RevaGoujon: In trying to avoid military response, US launched a cyber attack on Iran on June 20. But did the benefit outweigh the cost? Iran still detained a UK tanker following the attack, and US burned access to key IRGC target
@jeffstone500: U.S. Cyber Command determined Iran was using a secret database to target oil tankers in the Persian Gulf. After a White House debate, the U.S. decided to move forward with a June 20 cyberattack, per @nytimes . The effects have lasted longer than intended.


October 3, 2019
Ronen Bergman and Declan Walsh / New York Times

Ronen Bergman and Declan Walsh / New York Times  
Egyptian Government Launched Sophisticated Surveillance Attacks Against Opposition Figures Through Mobile Monitoring Apps on Google Play Store, at Least Thirty-Three Victims Targeted

A series of sophisticated, targeted surveillance attacks against Egyptian journalists, academics, lawyers, opposition politicians, and human rights activists that began in 2016 has been traced to Egyptian government offices, researchers at CheckPoint report. The attackers used a stealthy and efficient way of accessing the victims’ inboxes called “OAuth Phishing” and deployed an array of contaminated apps in the Google Play Store, which has now been removed. The central server used in the attacks was registered in the name of the Egyptian Ministry of Communications and Information Technology, and the geographic coordinates embedded in one of the applications used to track the activists corresponded to the headquarters of Egypt’s leading spy agency, the General Intelligence Service. Although the number of victims is unknown, Check Point identified 33 people, mostly well-known civil society and opposition figures, who had been targeted in one part of the operation. This number of victims is higher than an earlier report by Amnesty International suggested. Two of the victims, Hassan Nafaa, a political scientist at Cairo University, and Khaled Dawoud, a former journalist and leader of the secular Constitution Party, a prominent el-Sisi critic, were arrested after scattered protests erupted against Egypt’s president, Abdel Fattah el-Sisi last month. A third victim, Dr. Shady al-Ghazaly Harba, a surgeon and opposition activist, is currently in solitary confinement in a Cairo prison where he faces charges of insulting the president and spreading false news.

October 4, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Microsoft Says ‘Phosphorous’ Threat Group Linked to Iranian Government Targeted Unnamed 2020 U.S. Presidential Candidate’s Email Account Along With 2,700 Other Email Accounts

Microsoft said that it has seen a threat group linked to the Iranian government, which it calls Phosphorous but is also known as APT 35, target an unnamed 2020 U.S. presidential candidate. In a 30-day period between August and September of this year, Phosphorous made more than 2,700 attempts to identify consumer email accounts belonging to specific Microsoft customers that are “associated” with a presidential campaign, current and former U.S. government officials, journalists and prominent Iranians living outside the country. Four of the accounts not associated with the U.S. presidential campaign or current and former U.S. government officials were compromised in the effort. The attacks, which Microsoft described as not sophisticated, attempted to use a “significant amount of personal information” to game password reset or account recovery features and try to take over some targeted accounts. Some of the attacks entailed gathering and targeting user phone numbers.

Related: Microsoft, Fifth Domain | Cyber, New York Post, Digital Trends, Algemeiner.com, AOL, Financial Times, The Hill: Cybersecurity, The Hill: Cybersecurity, The Register – Security, MSPoweruser, Gizmodo, The Age, Reuters, Axios , BleepingComputer.com, News : NPR, UPI.com, CNN.com, Slashdot , Haaretz.com, Jerusalem Post, Channel News Asia, Arutz Sheva News, News.com.au, CNBC, News.com.au, AP Breaking News,NBC News Top Stories, VentureBeat, USA Today, RT News, CTVNews.ca, TribLIVE, Star TribuneEngadget, PCMag.com, WashingtonExaminer.com, ZDNet, Bloomberg Politics, Al Jazeera English, CNET News, CNN.com, New York Times – Nicole Perlroth, CNET News, Deutsche Welle, Washington Post, Washington Post, ZDNet, The Palm Beach Post, The Age, ZDNet, Stars and Stripes, Windows Central , Law & Disorder – Ars Technica, GeekWire, JNS.org, The Verge, Fortune, TIME, POLITICO, RT News, The Times of Israel, South China Morning Post

Tweets:@Bing_Chris @Olivia_Gazis @W7VOA @tonyromm @adrianweckler @g_ratnam @shanav @jseldin @gregotto @jamestutt @magmill95 @alexwardvox

Microsoft: Recent cyberattacks require us all to be vigilant
Fifth Domain | Cyber: Iran-backed hackers targeted 2020 presidential campaign, says Microsoft
New York Post: Microsoft says Iran plotted cyber attack against US presidential campaign
Digital Trends: Microsoft blames Iran for hacking attempts on U.S. presidential candidates
Algemeiner.com: France Gives One Month to Get Iran-US to Negotiating Table
AOL: Iran-linked hackers tried to compromise presidential campaign, Microsoft says
Financial Times: Microsoft says Iran tried to hack 2020 Democratic campaign
The Register – Security: Iran tried to hack hundreds of politicians, journalists email accounts last month, warns MicrosoftThe Hill: Cybersecurity: Iran-linked group targeted email accounts for US presidential campaign, government officials
MSPoweruser: Microsoft uncovers US election hacking plot by Iranian agencies
Gizmodo: Someone ‘Highly Motivated’ Tried to a Hack 2020 Presidential Campaign, Microsoft Warns
Firstpost: Iranian hackers targeted U.S. presidential campaign, did not succeed – Microsoft
The Age: Iranian hackers targeted US presidential campaign, Microsoft says
Reuters: Iranian hackers targeted U.S. presidential campaign, did not succeed: Microsoft
Axios : Microsoft: Iranian group tried to hack unnamed 2020 candidate, others
BleepingComputer.com: Microsoft Discovers Iranian Hacking Campaign Targeting U.S. Politics
News : NPR: Microsoft Says Iranians Tried To Hack U.S. Presidential Campaign
UPI.com: Microsoft: Iran-linked hacking group has targeted 2020 U.S. campaign
CNN.com: Iranian hackers targeted presidential campaign and US government officials
Slashdot : Microsoft: Iranian Hackers Targeted a 2020 Presidential Campaign
Haaretz.com: Iranian hackers targeted a U.S. presidential campaign, Microsoft says
Jerusalem Post: Microsoft finds Iranian hackers targeted a U.S. presidential campaign
Channel News Asia: Iranian hackers targeted US presidential campaign, did not succeed – Microsoft
Arutz Sheva News: Microsoft: Iran-linked hackers tried to compromise US campaign
News.com.au: Microsoft: Iranian hackers targeted US campaign
CNBC: Microsoft says Iranian hackers targeted presidential campaign, government officials, media
News.com.au: Microsoft: Iranian hackers targeted US campaign
AP Breaking News: Iranian hackers said to target presidential campaign
New York Times : Iranian Hackers Targeted Presidential Campaign, Microsoft Says
NBC News Top Stories: Iran-linked hackers tried to compromise presidential campaign, Microsoft says
VentureBeat: Microsoft: Hackers linked to Iran targeted U.S. presidential candidate
USA Today: Microsoft: Iran government-linked hacker targeted 2020 presidential campaign
RT News: Iranian govt-linked op tried to HACK TRUMP 2020 campaign, Reuters sources claim
CTVNews.ca: Iranian hackers said to target U.S. presidential campaign
TribLIVE: Iranian hackers said to target presidential campaign
Star Tribune: Iranian hackers said to target presidential campaign
CNN.com: Iranian hackers targeted presidential campaign and US government officials
Engadget: Microsoft: Iranian cyberattack targeted a US presidential campaign
USA Today: Microsoft: Iran government-linked hacker targeted 2020 presidential campaign
PCMag.com: Microsoft: Iranian Hackers Targeted US Presidential Campaign
WashingtonExaminer.com: Microsoft: Iran-tied group attempted to hack US presidential campaign email accounts
ZDNet: Microsoft: Iranian hackers targeted a 2020 presidential campaign
Bloomberg Politics: Microsoft Says Iran Tried Hack of U.S. Presidential Campaign
Al Jazeera English: Iranian hackers targeted a US presidential campaign: Microsoft
CNET News: Iranian hackers targeted a US presidential campaign, Microsoft says – CNET
CNET News: Iranian hackers targeted a US presidential campaign, Microsoft says – CNET
Deutsche Welle: Hackers target US presidential campaign, Microsoft reports
Washington Post: Iranians tried to hack U.S. presidential campaign in effort that targeted hundreds, Microsoft says
The Palm Beach Post: Iranian hackers said to target presidential campaign
The Age: Iranian hackers targeted US presidential campaign, Microsoft says
ZDNet: Microsoft: Iranian hackers targeted a 2020 presidential campaign
Stars and Stripes: Iran tried to hack US candidates, journalists in effort that targeted hundreds, Microsoft finds
Firstpost: Iranian hackers targeted a U.S. presidential campaign, Microsoft says
Windows Central : Microsoft: Iranian hacking group targeted 2020 presidential campaign
TechCrunch: Microsoft says Iranian hackers targeted a 2020 presidential candidate
Law & Disorder – Ars Technica: Microsoft says Iranian hackers tried to hack a US presidential campaign
GeekWire: Iranian hacker group attacked email accounts tied to a US presidential candidate, Microsoft says
JNS.org: Microsoft: Iran sought to hack US presidential campaign
The Verge: Microsoft says Iranian hacking group targeted a 2020 US presidential candidate
Fortune: How Iran-linked Hackers Tried to Compromise a Presidential Campaign
TIME: Microsoft Says Iranian Hackers Targeted U.S. Presidential Campaign
POLITICO: Iranian hackers targeted 2020 presidential campaign, Microsoft finds
The Times of Israel: Microsoft says Iranian hackers targeted a US presidential campaign
South China Morning Post: Iranian hackers targeted 2020 US presidential campaign, Microsoft finds

@Bing_Chris: "The targeted accounts are associated with a U.S. presidential campaign, current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran"
@Olivia_Gazis: .@Microsoft says it has detected hackers linked to the Iranian government targeting at least one U.S. presidential campaign:
@W7VOA: Cyber activity from #Iran and linked to that government detected by @Microsoft.
@tonyromm: A campaign linked to the Iranian government attempted to identify, attack and breach email addresses belonging to U.S. presidential campaigns, government officials and journalists, according to new data unveiled by Microsoft
@adrianweckler: Microsoft head of security posts blog saying Iranian govt-backed hackers attacked email accounts of journalists and an unnamed US presidential campaign
@g_ratnam: A group called Phosphorous, believed to be tied to Iran, has targeted 2700 email accounts associated with US presidential campaigns, US officials, journalists and others, per @Microsoft . 241 of those were then attacked.
@shanav: NEW: Microsoft says Iranian APT group Phosphorous, with ties to Iran's government, has worked to get past two-factor authentication and reset passwords for a U.S. presidential campaign, as well as current and former U.S. gov officials and journalists.
@jseldin: "Microsoft has notified the customers related to these investigations and threats and has worked as requested with those whose accounts were compromised to secure them" per @TomBurt45More here:
@gregotto: NEW: Microsoft found an Iranian group going after microsoft email accounts tied to a presidential campaign, current and former gov, and journalists
@jamestutt: Today we are sharing details of significant cyber activity from a threat group we call Phosphorous, believed to originate in Iran with links to the Iranian govt. More here: https://blogs.microsoft.com/on-the-issues/2019/10/04/recent-cyberattacks-require-us-all-to-be-vigilant/
@magmill95: Big cyber news today: Microsoft announced that it tracked an Iranian-linked threat group over 30 days attempt to identify and attack consumer email accounts linked to Microsoft customers, including an unnamed U.S. presidential campaign and U.S. officials:
@alexwardvox: .@Microsoft's @TomBurt45 : "Today we’re sharing that we’ve recently seen significant cyber activity by a threat group we call Phosphorous, which we believe originates from Iran and is linked to the Iranian government."


July 28, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Bellingcat Researchers Investigating Activities of Russian Government Targeted by Phishing Attacks on ProtonMail Accounts

Investigative news site Bellingcat has confirmed several of its researchers who work on projects related to activities by the Russian government were targeted by an attempted but failed phishing attack on their ProtonMail accounts. The researchers were targeted by a phishing email purportedly from ProtonMail itself which asked users to change their email account passwords or generate new encryption keys through a similarly-named domain set up by the attackers. The attackers tried to exploit a little-known unpatched flaw in third-party software used by ProtonMail, which has yet to be fixed or disclosed by the software maker. The targeted Bellingcat researchers worked on the ongoing investigation into the downing of flight MH17 by Russian forces and the use of a nerve agent in a targeted killing in the U.K.

Related: Forbes, TechCrunch, Proton Mail, Radio Free Europe/Radio Liberty, The Times of Israel, ThreatConnect, Digital Journal, Channel News Asia IB Times, RAPPLER, Kyiv Post, News Agency UNIAN, Crime Russia

Tweets:@zackwhittaker


September 23, 2019
David E. Sanger and Julian E. Barnes / New York Times

David E. Sanger and Julian E. Barnes / New York Times  
White House Views Cyber Strike Against Iran as Most Appealing Course of Action but Pentagon, Cyber Command Warn That It’s No ‘Magic Bullet’ and Might Trigger Even Larger Iranian Counterattack, Sources

A second cyber strike against Iran after one launched three months ago has emerged as the most appealing course of action for the White House, according to several senior officials, although a broader debate is taking place inside and outside the administration over whether a cyberattack alone will be enough to alter Iran’s aggressive calculations. The concerns in White House, the Pentagon and Cyber Command’s operations room center on whether a strong message of deterrence with a cyberattack might trigger an even larger Iranian counterattack. General. Paul Nakasone, head of Cyber Command NSA, and a key player in designing a plan called “Nitro Zeus” to shut down Tehran and other Iranian cities in the event of a war, reportedly warned Trump and his aides that a cyberattack is no “magic bullet” against Iran because Iran has an increasingly skillful “cyber corps.” Other officials in the Administration believe that a sufficiently large cyberattack against Iran would be an effective deterrent against further aggression by the country.

Related: MSSP Alert, Yahoo News, JNS.org, Zero Hedge, TIME, POLITICO, Task & Purpose, Algemeiner.com, Vox

Tweets:@gonzadan @SangerNYT