{"id":904,"date":"2024-08-09T19:13:08","date_gmt":"2024-08-09T19:13:08","guid":{"rendered":"http:\/\/filipzajac.me\/?p=904"},"modified":"2024-08-12T02:59:09","modified_gmt":"2024-08-12T02:59:09","slug":"iran-targeting-us-elections-using-fake-news-cyberattacks-microsoft","status":"publish","type":"post","link":"http:\/\/filipzajac.me\/index.php\/2024\/08\/09\/iran-targeting-us-elections-using-fake-news-cyberattacks-microsoft\/","title":{"rendered":"Iran targeting US elections using fake news, cyberattacks: Microsoft"},"content":{"rendered":"
\n\t\t<\/div>\n

Iran is using fake news and cyberattacks to target the 2024 election, according to a new report<\/a> from Microsoft released Friday.<\/p>\n

\u201cOver the past several months, we have seen the emergence of significant influence activity by Iranian actors,\u201d the Microsoft Threat Analysis Center (MTAC) wrote. \u201cRecent activity suggests the Iranian regime \u2014 along with the Kremlin \u2014 may be equally engaged in election 2024.\u201d<\/p>\n

The report details the Iranian regime has posed as and impersonated \u201cAmerican extremists” to sow division among the electorate and incite violence.<\/p>\n

\u201cLooking forward, we expect Iranian actors will employ cyberattacks against institutions and candidates while simultaneously intensifying their efforts to amplify existing divisive issues within the US, like racial tensions, economic disparities, and gender-related issues,\u201d MTAC said.<\/p>\n

MTAC outlined several covert news operations operated by the Iranian regime, including a site called Nio Thinker established in late October. The site originally posted about the war in Gaza but has shifted its focus to the U.S. elections in recent months. Its contents are geared toward liberal audiences, according to MTAC\u2019s assessment, and have written pieces insulting former President Trump.<\/p>\n

Another site focuses heavily on Republican issues, particularly on subjects of gender, posing as local newsroom and \u201ctrusted source for conservative news in the vibrant city of Savannah.\u201d<\/p>\n

Alongside news operations, groups run by the Islamic Revolutionary Guard Corps (IRGC) have launched cyberattacks against high-ranking U.S. officials. One such incident involving Mint Sandstorm, an operation from the IRGC\u2019s intelligence unit, targeted a high-ranking official of a presidential campaign in June.<\/p>\n

The attackers sent a spear-phishing email using the compromised account of a former senior adviser, which would take the user to an Iranian-controlled domain before redirecting them to the correct website.<\/p>\n

Following the first attack, the same group attempted to log in to the account belonging to a \u201cformer presidential candidate\u201d on June 13.\u00a0<\/p>\n

\u201c[T]his targeting is a reminder that senior policymakers should be cognizant of monitoring and following cybersecurity best practices even for legacy or archived infrastructure, as they can be ripe targets for threat actors seeking to collect intelligence, run cyber-enabled influence operations, or both,\u201d the MTAC added.<\/p>\n

In a statement to The Associated Press, Iran\u2019s U.N. mission denied involvement with the cyberattacks or interference.<\/p>\n

“Iran has been the victim of numerous offensive cyber operations targeting its infrastructure, public service centers, and industries. Iran’s cyber capabilities are defensive and proportionate to the threats it faces. Iran has neither the intention nor plans to launch cyber attacks. The U.S. presidential election is an internal matter in which Iran does not interfere,\u201d it wrote.<\/p>\n

The alleged Iranian election attacks are accompanied by threats from Russia and China. China\u2019s interference has intentionally directed left wing messaging about pro-Palestine protests into right-wing groups, which MTAC says was likely done to \u201cagitate conflict\u201d or \u201cmisunderstanding.\u201d\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"

Iran is using fake news and cyberattacks to target the 2024 election, according to a new report from Microsoft released Friday. \u201cOver the past several months, we have seen the emergence of significant influence activity by Iranian actors,\u201d the Microsoft Threat Analysis Center (MTAC) wrote. \u201cRecent activity suggests the Iranian regime \u2014 along with the […]<\/p>\n","protected":false},"author":1,"featured_media":906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[14],"tags":[],"_links":{"self":[{"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/posts\/904"}],"collection":[{"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/comments?post=904"}],"version-history":[{"count":1,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/posts\/904\/revisions"}],"predecessor-version":[{"id":905,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/posts\/904\/revisions\/905"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/media\/906"}],"wp:attachment":[{"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/media?parent=904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/categories?post=904"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/filipzajac.me\/index.php\/wp-json\/wp\/v2\/tags?post=904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}