Tuesday May 13, 2025
NEWSLETTER
www.israelhayom.com
  • Home
  • News
    • Gaza War
    • US Election Coverage
    • Middle East
    • Cyber & Internet
    • Business & Finance
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
  • In Memoriam
www.israelhayom.com
  • Home
  • News
    • Gaza War
    • US Election Coverage
    • Middle East
    • Cyber & Internet
    • Business & Finance
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
  • In Memoriam
www.israelhayom.com
Home News World News

Report: Iranian hackers hunt for Arab nuclear scientists, US officials

by 
Published on  12-14-2018 00:00
Last modified: 03-20-2020 05:32
Report: Iranian hackers hunt for Arab nuclear scientists, US officialsReuters

Cyber-criminals are alert to the work from home trend and they are doing what they can to use it to infiltrate into organizations | Illustration: Reuters

Share on FacebookShare on Twitter

As U.S. President Donald Trump reimposed harsh economic sanctions on Iran last month, Iranian hackers scrambled to break into personal emails of American officials tasked with enforcing them, another sign of how deeply cyberespionage is embedded into the fabric of U.S.-Iranian relations.

The Associated Press drew on data gathered by the London-based cybersecurity group Certfa to track how a hacking group often nicknamed "Charming Kitten" spent the past month trying to break into the private emails of more than a dozen U.S. Treasury officials. Also on the hackers' hit list: high-profile defenders, detractors and enforcers of the nuclear deal struck between Washington and Tehran, as well as Arab nuclear scientists, Iranian civil society figures and D.C. think tank employees.

"Presumably, some of this is about figuring out what is going on with sanctions," said Frederick Kagan, a scholar at the American Enterprise Institute who has written about Iranian cyberespionage and was among those targeted.

Kagan said he was alarmed by the targeting of foreign nuclear experts.

"This is a little more worrisome than I would have expected," he said.

The hit list surfaced after Charming Kitten mistakenly left one of its servers open to the internet last month. Researchers at Certfa found the server and extracted a list of 77 Gmail and Yahoo addresses targeted by the hackers that they handed to the AP for further analysis.

It is hard to know how many of the accounts were successfully compromised or how exactly they were targeted in each case. But even though the addresses likely represent only a fraction of the hackers' overall efforts, they still provide considerable insight into Tehran's espionage priorities.

"The targets are very specific," Certfa researcher Nariman Gharib said.

In a report published Thursday, Certfa tied the hackers to the Iranian government, a conclusion drawn in part on operational blunders, including a couple of cases where the hackers appeared to have accidentally revealed that they were operating from computers inside Iran. The assessment was backed by others who have tracked Charming Kitten. Allison Wikoff, a researcher with Atlanta-based SecureWorks, recognized some of the digital infrastructures in Certfa's report and said the hackers' past operations left little doubt they were government-backed.

"It's fairly clear-cut," she said.

Calls to Iranian officials were not returned late Wednesday, the beginning of the weekend in the country.

Iran has previously denied conducting any hacking operations, but an AP analysis of its targets suggests that Charming Kitten is working in close alignment with the Islamic republic's interests. The most striking among them were the nuclear officials – a scientist working on a civilian nuclear project for the Pakistani Defense Ministry, a senior operator at the Research and Training Reactor in the Jordanian city of Ramtha, and a high-ranking researcher at the Atomic Energy Commission of Syria.

The trio suggested a general interest in nuclear technology and administration.

Others on the hit list – such as U.S. Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense Programs Guy Roberts – pointed to an eagerness to keep track of officials charged with overseeing America's nuclear arsenal.

"This is something I've been worried about," Roberts said when alerted to his presence on the list.

More targets are connected to the Iran deal – a 2015 pact negotiated by former U.S. President Barack Obama's administration and other world powers that called for Tehran to curb its uranium enrichment in exchange for the lifting of international sanctions. Trump tore up the deal in May and has since reimposed a series of punishing restrictions on Iran.

One of Charming Kitten's targets was Andrew J. Grotto, whose tenure on the U.S. National Security Council straddled the Obama and Trump administrations and who has written about Iran's nuclear ambitions.

Jarrett Blanc, a U.S. State Department official involved in the implementation of the nuclear deal under Obama, was also on the list. He said news of his targeting was no shock.

"I've retained contact with Iranian counterparts since leaving government," he said. "I'd be very surprised if there were not Iranian groups trying to hack into my various email accounts."

Like the Russian hackers who have chased after America's drone, space and submarine secrets, the list indicates that Iranian spies were also interested in the world of U.S. defense companies. One of those targeted is a senior director of "breakthrough technology" at the aerospace arm of Honeywell International Inc., the New Jersey-based industrial conglomerate. Another is a vice president at Virginia-based Science Applications International Corp., a prominent Pentagon contractor.

Honeywell said it was aware that one of its employees had their personal account "exposed," adding there was no evidence the company's network itself was compromised. SAIC said it found no trace of any hacking attempt against its employee's account.

There were Iranian targets, too, including media workers, an agronomist and a senior employee of the country's Environment Department – a possible sign that Tehran's crackdown on environmentalists, which began earlier this year, continues.

Hacking has long been a feature of the tense relationship between the United States and Iran, whose militant brand of Shia Islam has challenged American interests in the Middle East and beyond since 1979.

It was against Iran that U.S. and Israeli spies are said to have deployed the pioneering, centrifuge-rattling computer worm dubbed Stuxnet in a bid to sabotage the country's uranium enrichment capabilities. Iranian hackers, in turn, are blamed for denial of service assaults on American banks and computer-wrecking cyberattacks in Saudi Arabia, Iran's regional arch-rival.

The Charming Kitten campaign uncovered by Certfa is far less sophisticated, generally relying on a password-stealing technique called phishing. Two Nov. 17 emails provided to the AP by Jim Sisco of Enodo Global Inc., a Virginia-based risk advisory firm targeted by Charming Kitten, mimic the look and feel of Gmail security alerts, a technique used by hackers across the globe.

An analysis of Certfa's data shows the group targeted at least 13 U.S. Treasury employees' personal emails, including one belonging to a director at the Financial Crimes Enforcement Network, which fights money laundering and terror financing, and one used by the Iran licensing chief at the Office of Foreign Asset Control, which is in charge of enforcing U.S. sanctions. But a few employees' LinkedIn profiles referenced back-office jobs or routine tax work.

The U.S. Treasury, which did not comment directly on the hacking, said it went to "great lengths" to protect its employees.

The mixed bag of government targets suggests "a fairly scattershot attempt," said Clay Stevenson, a former Treasury official who was himself targeted by Charming Kitten.

Others' experience suggests a more professional effort.

Georgetown University professor and South Asia security expert Christine Fair said she had only recently returned from a conference in Afghanistan attended by Iranian officials and a visit to the Iranian border when she learned she was in the hackers' sights.

"The timing is uncanny," she said.

Another Charming Kitten target was an intern working for the Foundation for Defense of Democracies, a Washington think tank that has been one of the Iran deal's fiercest critics. How the intern – whose email isn't public and whose name appears nowhere on the organization's website – crossed the hackers' radar is not clear. The foundation issued a statement calling the revelation "yet another indicator that Iran must be viewed as a nefarious actor in all theatres in which it operates."

Kagan, the scholar, said most signs pointed to a serious, state-backed operation.

"It doesn't look like freelancers," he said.

Related Posts

'Visited 700 times': White House signals fatigue with NetanyahuMiriam Alster/Flash90, Reuters/Leah Millis

'Visited 700 times': White House signals fatigue with Netanyahu

by Erez Linn

Israeli leader won't receive a face-to-face with Trump during regional tour, with a senior White House official telling the Washington...

Israeli athlete excluded from US team after coach invites Palestinian swimmerSt. Thomas Athletics/Social media

Israeli athlete excluded from US team after coach invites Palestinian swimmer

by Oren Aharoni

An Israeli swimmer at Saint Thomas University in Florida claims he was excluded from participation in the championship after complaining...

Trump offers 30-day Ukraine-Russia unconditional ceasefireAP/Aurelien Morissard, left and center, Pavel Bednyakov, right

Trump offers 30-day Ukraine-Russia unconditional ceasefire

by Miri Weissman

Trump threatened, "If the ceasefire is not respected, the US and its partners will impose further sanctions."

Menu

Analysis 

Archaeology

Blogpost

Business & Finance

Culture

Exclusive

Explainer

Environment

 

Features

Health

In Brief

Jewish World

Judea and Samaria

Lifestyle

Cyber & Internet

Sports

 

Diplomacy 

Iran & The Gulf

Gaza Strip

Politics

Shopping

Terms of use

Privacy Policy

Submissions

Contact Us

About Us

The first issue of Israel Hayom appeared on July 30, 2007. Israel Hayom was founded on the belief that the Israeli public deserves better, more balanced and more accurate journalism. Journalism that speaks, not shouts. Journalism of a different kind. And free of charge.

All rights reserved to Israel Hayom

Hosted by sPD.co.il

  • Home
  • News
    • Gaza War
    • US Election Coverage
    • Middle East
    • Cyber & Internet
    • Business & Finance
    • Sports
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
    • Environment & Wildlife
    • Health & Wellness
  • In Memoriam
  • Subscribe to Newsletter
  • Submit your opinion
  • Terms and conditions

All rights reserved to Israel Hayom

Hosted by sPD.co.il

Newsletter

[contact-form-7 id=”508379″ html_id=”isrh_form_Newsletter_en” title=”newsletter_subscribe”]

  • Home
  • News
    • Gaza War
    • US Election Coverage
    • Middle East
    • Cyber & Internet
    • Business & Finance
    • Sports
  • Opinions
  • Jewish World
    • Archaeology
    • Antisemitism
  • Lifestyle
    • Food
    • Travel
    • Fashion
    • Culture
  • Magazine
    • Feature
    • Analysis
    • Explainer
    • Environment & Wildlife
    • Health & Wellness
  • In Memoriam
  • Subscribe to Newsletter
  • Submit your opinion
  • Terms and conditions

All rights reserved to Israel Hayom

Hosted by sPD.co.il