Check Point Cybersecurity Laboratory investigators have uncovered a surveillance campaign run by Iranian entities against regime dissidents that has been going on for six years. Since 2014, the cybercriminals behind this campaign have been launching attacks to spy on their victims, including the hijacking of Telegram accounts, the extraction of two-factor authentication codes through SMS messages, phone recordings, access to KeePass account information and the distribution of malicious phishing pages using fake Telegram service accounts. The victims seem to have been selected at random among opposition organisations and resistance movements such as Mujahedin-e Khalq, the National Resistance Organisation of Azerbaijan,…
Comments