Security researchers believe they've identified the group's main programmer Credit: Thinkstock In a single year, a cyberespionage group with possible ties to the Iranian government has targeted over 1,600 defense officials, diplomats, researchers, human rights activists, journalists and other high-profile individuals around the world.The group, known as Rocket Kitten, has been active since early 2014 and its attacks have been analyzed by various security vendors. However, a major breakthrough in the investigation came recently when researchers from Check Point Software Technologies obtained access to the command-and-control servers used by the attackers.Compared to other cyberespionage groups, Rocket Kitten is not very sophisticated, but it is persistent. It makes extensive use of social engineering through spear-phishing attacks that infect victims with custom-written malware, the Check Point researchers said in a report published Monday.The attackers were not very concerned with operational security and left major weaknesses in their infrastructure, which researchers were able to exploit. This allowed them to extract messages between the different members of the group from the custom-built Web application that it used to coordinate phishing attacks, as well as a list of over 1,600 intended victims that were targeted between August 2014 and 2015. The list included human rights activists, business executives, ministry officials, nuclear scientists, military personnel, national security and foreign policy researchers, scholars, persons of influence, representatives of NATO and other countries, and employees of educational institutions and media outlets. The largest number of victims were from Saudi Arabia, the U.S., Iran, the Netherlands and Israel.Iranian professors, scientists, journalists and investors living abroad were also targeted. It seems that the attackers did not take into consideration the possible compromise of their own command-and-control server and have infected their own computers with their custom keylogger-type malware, most likely for testing purposes.This allowed the researchers to identify an Iranian software engineer who they believe is the main developer of the group’s tools. This was done by correlating data copied by the malware from the developer’s workstation with online research.“In this case, as in other previously reported cases, it can be assumed that an official body recruited local hackers and diverted them from defacing web sites to targeted espionage at the service of their country,” the Check Point researchers said. Such inexperienced personnel with limited training often lack operational security awareness, the researchers said, with the result that they leave “a myriad of traces to the origin of the attack and their true identities.” Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe