The Federal Bureau of Investigation on Thursday issued an alert to warn that Iranian cyber group Emennet Pasargad is targeting organizations to steal their data and leak it online.
Previously known as Eeleyanet Gostar and Net Peygard Samavat, Emennet Pasargad is an organization that often changes its name to avoid US sanctions, and which is known for providing cybersecurity services to government entities in Iran.
In November 2020, the US warned that Iranian hackers exploited known vulnerabilities to access voter registration data, and in November 2021 the US Treasury announced sanctions against five Iranians and Emennet Pasargad, the company they worked for.
“According to FBI information, since at least 2020, Emennet targeted entities primarily in Israel with cyber-enabled information operations that included an initial intrusion, theft and subsequent leak of data, followed by amplification through social media and online forums, and in some cases the deployment of destructive encryption malware,” FBI’s alert reads (PDF).
The Bureau says Emennet uses online personas such as hacktivist or cybercriminal groups to execute false-flag campaigns targeting Israel, and warns that the company might employ the same tactics to target US entities as well, as it did during the 2020 US presidential elections.
In fact, the FBI says, Emennet has already been observed launching a destructive cyberattack against an organization in the US, “indicating the group remains a cyber threat to the United States”.
According to the FBI, the hack-and-leak operations that the group has been conducting against Israeli entities were likely meant to undermine confidence in the victim network’s security and to embarrass the targeted organizations.
“These hack-and-leak campaigns involve a combination of hacking/theft of data and information operations that impact victims via financial losses and reputational damage,” the FBI says.
In addition to engaging in computer intrusion, Emennet is also believed to be making exaggerated or fictitious claims to increase the impact of their operations.
In an early-2022 destructive cyberattack against a US organization – but meant to target the Iranian opposition group The People’s Mujahedin (aka MEK) – Emennet leaked personally identifiable information (PII) supposedly obtained during the intrusion.
“Although Emennet personas may exaggerate their level of access to a victim network or the volume of victim data stolen, the FBI judges that each of these campaigns likely start with some level of cyber intrusion,” the alert reads.
Emennet is known for researching its targets before an attack, to mainly target websites running PHP code or which have externally accessible MySQL databases, to use open source penetration testing tools, and to deface websites, in addition to deploying destructive encryption malware on the victim networks.
“Emennet is likely more opportunistic in choosing victims rather than targeting specific entities. However, victim trends appear to show their preference for companies with significant traffic and a large customer base,” the FBI says.
The cyber group leaks stolen data on its own dedicated websites, via Telegram, and on cybercrime forums. It also creates false-flag online personas to attract additional attention and often contacts news organizations or uses email-marketing services to amplify information operations.
The FBI also shares a series of tactics, techniques, and procedures (TTPs) associated with Emennet, as well as recommendations for organizations to mitigate the risk associated with the group.