Cloud Security

Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups

Researchers unmask an Iranian-run company providing command-and-control services to hacking groups, including state-sponsored APT actors.

Iranian hackers

Researchers at cybersecurity startup Halcyon have unmasked an Iranian-run company providing command-and-control services to more than 20 hacking groups, including ransomware operators, spyware vendors, and state-sponsored APT actors.

The company, identified as Cloudzy, is registered in the United States, but Halcyon believes that it is operated out of Tehran, Iran, by an individual named Hassan Nozari, likely in violation of US sanctions.

In a research note published on Tuesday, Halcyon said the ISP acts like a command-and-control provider (C2P) for various types of threat actors, advertises its services as protecting user anonymity, and does not appear to respond when malicious activity is brought to its attention.

The company said Cloudzy only requires a working email address for registration, never verifies the identity of customers, and accepts anonymous payment in cryptocurrencies. Although its terms and conditions prohibit the use of its services for illicit activities, Halycyon found that the cloud provider asks abusers to pay a nominal fee to continue operations.

Halcyon said it discovered that more than half of the servers hosted by Cloudzy appear to directly support malicious activities, mainly on infrastructure loaned from a dozen other ISPs.

“Our research assesses that Cloudzy’s RDP services, and nearly all malicious activity we identified were principally run from the IP space owned by other Internet service providers,” Halcyon said.

During a 90-day analysis of Cloudzy’s services, Halcyon discovered attack infrastructure associated with hacking groups tied to Chinese, Iranian, Indian, North Korean, Pakistani, Russian, and Vietnamese governments, by the sanctioned Israeli spyware vendor Candiru, and by cybercrime rings and ransomware groups.

The investigation revealed the existence of two previous unreported ransomware groups that rely on Cloudzy as a C2P — Ghost Clown (seen deploying Cobalt Strike implants and Conti and BlackBasta ransomware) and Space Kook (relies on Cobalt Strike and the Quantum Locker and Royal ransomware).

Advertisement. Scroll to continue reading.

Halcyon also discovered that Cloudzy is a company registered in the United States, although it has no physical office in the country. Digging further, it identified a connection with the Iranian firm abrNOC, also allegedly founded by Hannan Nozari, who the company traced to Tehran, Iran.

The researchers identified eight other individuals who appear to be employed at Cloudzy but are in Iran, and discovered a crossover between some of them and employees of abrNOC.

The Halcyon investigation revealed that Cloudzy only exists on paper, with its so-called employees being the employees of abrNOC in Tehran. Some Cloudzy bloggers are either made up or employees of abrNOC.

“Halcyon therefore assessed with high confidence that C2P Cloudzy is almost certainly a cutout for the actual hosting company, abrNOC, operating out of Tehran, Iran,” the cybersecurity firm added.

Related: Ransomware Attacks on Industrial Organizations Doubled in Past Year

Related: Iranian Cyberspies Target US Think Tank With macOS Malware

Related: ‘Asylum Ambuscade’ Group Launch Cybercrime, Espionage Campaigns

Related Content

Data Breaches

The Ohio Lottery cyberattack conducted by the DragonForce ransomware group has impacted more than 500,000 individuals.

Data Breaches

Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident.

Ransomware

The LockBit cybercrime group has taken credit for the recent ransomware attack that disrupted City of Wichita systems.

Ransomware

Organizations need to look beyond preventive measures when it comes to dealing with today’s ransomware threats and invest in ransomware response.

Ransomware

Philadelphia-based real estate company Brandywine Realty Trust shuts down systems following a ransomware attack.

Ransomware

Charges and sanctions announced against Dimitry Yuryevich Khoroshev, the alleged developer and operator of LockBit ransomware.

Ransomware

The City of Wichita, Kansas, has shut down its network after falling victim to a file-encrypting ransomware attack.

Email Security

The US government warns of a North Korean threat actor abusing weak email DMARC settings to hide spear-phishing attacks.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version