US political campaigns face increased digital attacks from Iranian hackers.

Cybercriminals exploiting phishing links to gain access to your devices

US political campaigns face increased digital attacks from Iranian hackers.
US political campaigns face increased digital attacks from Iranian hackers.

As elections approach, threat actors are intensifying their efforts to deceive voters and sabotage political campaigns. Researchers have uncovered new Iranian hacker infrastructure designed to target U.S. political campaigns. These hackers use phishing emails and links to deceive users into installing malicious software, posing as cloud services.

Iranian hackers ramp up digital attacks on US political campaigns
Illustration of a hacker using phishing techniques (Kurt "CyberGuy" Knutsson)

What you need to know

GreenCharlie, an Iran-nexus cyberthreat group with connections to Mint Sandstorm, Charming Kitten, and APT42, has been discovered by Recorded Future's Insikt Group, which has been tracking it since June 2024.

Social engineering techniques are frequently used by GreenCharlie in highly targeted phishing operations that exploit current events and political tensions, according to Recorded Future.

The hackers have meticulously set up their systems, employing specific services to construct phishing websites that resemble cloud services, file-sharing platforms, or document-viewing tools, in order to deceive individuals into divulging personal information or downloading malicious files.

The majority of these fake websites were registered with the .info domain, which is a shift from the other domains like .xyz, .icu, and .online that hackers used previously. Examples of these fake website names include "cloud," "uptimezone," "doceditor," "joincloud," and "pageviewer."

Iranian hackers ramp up digital attacks on US political campaigns
Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)

It's not their first rodeo

Malware such as POWERSTAR and GORBLE, which was recently identified by Google's Mandiant as being used in attacks against Israel and the U.S., are commonly used by threat actors to launch highly targeted phishing attacks through sophisticated social engineering tricks.

The cybersecurity company stated that Iran and its associated cyber-espionage actors have a history of targeting U.S. elections and domestic information spaces with influence and interference operations. These campaigns are likely to continue using hack-and-leak tactics to undermine or support political candidates, influence voter behavior, and create discord.

Iranian hackers ramp up digital attacks on US political campaigns
Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)

Phishing attacks are more advanced than ever

A phishing email or message is typically the initial stage of a cyberattack. Hackers craft a link that appears trustworthy, but it's not. It actually infects your computer with malware, granting them access to your system and the ability to pilfer your funds and information. It's not your fault if you can't discern a phishing link.

This month, I reported on the malware known as "Voldemort," which poses as a government agency to trick people into clicking on harmful links. This demonstrates the cunning of these scammers in employing deceitful tactics to infect your devices.

To safeguard yourself from malicious links that can compromise your private information, make sure to install antivirus software on all your devices. This software can also detect phishing emails and ransomware attacks. Discover my top picks for the best antivirus protection solutions for Windows, Mac, Android, and iOS devices in 2024.

4 additional ways to protect yourself from phishing attacks

Here are some specific steps you can take to safeguard yourself from phishing attacks that employ fraudulent cloud services and other deceitful methods.

Ensure website security: Before submitting any sensitive data, confirm the website's URL. Check for indicators of a secure connection, such as "https://" and a padlock symbol in the browser's address bar. Be wary of minor spelling errors or unusual domain extensions like .info.

2) Consider investing in data removal services: Your personal information is at risk of being accessed by hackers through publicly available data, such as leaked information from a data breach or information provided to an e-commerce shop. Discover my top recommendations for data removal services here.

To safeguard against hacker exploitation of vulnerabilities, it is essential to update your operating system, browsers, and security software regularly. Updates typically include security patches, bug fixes, and performance enhancements. Enable automatic updates to avoid missing critical patches. If automatic options are unavailable, manually check for updates. Keeping your devices up-to-date ensures both security and functionality.

To safeguard your accounts from unauthorized access, use distinct, powerful passwords. Incorporate a combination of letters, numbers, and symbols into your passwords and avoid reusing the same password for multiple accounts. Utilize a password manager to securely store and generate complex passwords. This will enable you to create unique and challenging passwords that even a hacker would struggle to guess. For more information about the top-rated password managers of 2024, click here.

Kurt’s key takeaway

The U.S. elections are not only significant to Americans but also to the global community, which is why foreign adversaries are attempting to influence the campaigns. Hackers are working tirelessly to infect individuals' devices to conduct espionage, spread false information, and cause financial losses. To safeguard yourself, remain vigilant, avoid clicking on untrusted links, and invest in antivirus software. As hackers continue to evolve their tactics, it is crucial to utilize the available tools to protect yourself.

Do you verify the authenticity of a website or email before clicking on links or providing personal information? Please let us know by writing to Cyberguy.com/Contact.

To receive my tech tips and security alerts, sign up for my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

A revolutionary device may enable you to identify microplastics in your beverages.

A revolutionary device may enable you to identify microplastics in your beverages.

tech
Become a proficient user of Google Workspace and Microsoft Office.

Become a proficient user of Google Workspace and Microsoft Office.

tech
Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

tech
Human window washers on skyscrapers are being replaced by robots.

Human window washers on skyscrapers are being replaced by robots.

tech
A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

tech
How to safeguard your baby monitor from hackers?

How to safeguard your baby monitor from hackers?

tech
The origin of the bizarre "hello" text messages.

The origin of the bizarre "hello" text messages.

tech
Over 900,000 Medicare beneficiaries are at risk of data breach.

Over 900,000 Medicare beneficiaries are at risk of data breach.

tech
Humans can teach robots to sense human touch without the need for artificial skin.

Humans can teach robots to sense human touch without the need for artificial skin.

tech
Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

tech
Conduct a 5-minute phone privacy audit to prevent spying.

Conduct a 5-minute phone privacy audit to prevent spying.

tech
Scams and people search sites: a dangerous intersection

Scams and people search sites: a dangerous intersection

tech
Reach your destination effortlessly with this advanced self-driving sleep pod.

Reach your destination effortlessly with this advanced self-driving sleep pod.

tech
US political campaigns face increased digital attacks from Iranian hackers.

US political campaigns face increased digital attacks from Iranian hackers.

tech
A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

tech
Four effective strategies for reducing expenses.

Four effective strategies for reducing expenses.

tech