Close  

US: Russian hackers use Iranians to mask their identities

/ 06:23 PM October 21, 2019

LONDON — The United States and the United Kingdom have said they have exposed how a group of Russian hackers hijacked the tools of their Iranian counterparts to attack dozens of countries around the world.

The so-called Turla group, also known as Waterbug or Venomous Bear, is widely reported to be associated with Russian actors. The U.S. National Security Agency and Britain’s National Cyber Security Center (NCSC) said Monday that Turla acquired control of the tools and infrastructure of Iranian hacking groups for their attacks in an attempt to mask their identity.

ADVERTISEMENT

The attacks extracted documents from multiple sectors, including governments, and were mostly carried out in the Middle East.

Paul Chichester, NCSC’s director of operations, said Monday: “Turla acquired access to Iranian tools and the ability to identify and exploit them to further their own aims.” /kga

FEATURED STORIES

TOPICS: Computer, Hackers, hacking, International news, Internet, Iran, News, Russia, Turla group, US, Venomous Bear, Waterbug, World, World News
Read Next
LATEST STORIES
MOST READ
Don't miss out on the latest news and information.
View comments

Subscribe to INQUIRER PLUS to get access to The Philippine Daily Inquirer & other 70+ titles, share up to 5 gadgets, listen to the news, download as early as 4am & share articles on social media. Call 896 6000.

For feedback, complaints, or inquiries, contact us.
entertainment

Unlikely triangle

November 16, 2019 12:35 AM

entertainment

Epy’s advice to guys who are ‘torpe’

November 16, 2019 12:30 AM

entertainment

Alec Baldwin’s wife mourns miscarriage

November 16, 2019 12:25 AM

entertainment

Love shines through in GMA Network’s Christmas Station ID

November 16, 2019 12:20 AM



© Copyright 1997-2019 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.