fireeye-operation-saffron-rose

0xtyler
  • No tags were found...

fireeye-operation-saffron-rose

In 2013, the Ajax Security Team, and “HUrr!c4nE!” in particular, took part in “#OpIsrael”and “#OpUSA”. 27Figure 15: Screenshot of the defacementcontent used in #OpUSABy early 2014, the Ajax Security Team appears to have dwindled. There have been no defacementssince December 2013. The website and forum at ajaxtm[.]org operated by “HUrr!c4nE!”, aka“k3yv4n”, is no longer active.“HUrr!c4nE!” has the most open/documented Internet persona of the Ajax Security Team. Heregistered the ajaxtm[.]org domain name using the email address keyvan.ajaxtm@gmail[.]com.This was also the email address used to register the domain aerospace2014[.]org, which was usedin spear phishing attacks against companies in the U.S. and is linked with malware activity directed atusers of anti-censorship tools in Iran.27 Ashraf, N. “#OpIsrael: Hacktivists Starting Cyber Attack against Israel on 7th of April”. March 2013.“OpUSA Targeting Government & Financial Sectors on 07 May 2013: Likely Tools, Targets and Mitigating Measures”. May 2013.FireEye, Inc. Operation Saffron Rose 17

More magazines by this user
Similar magazines