home.aspx
 
. Resources/Whitepapers/b93398bc-a01e-4b17-b361-9de38b6e0ee5_IranianNatio_wp.pdf
whitepaper
IRANIAN NATION-STATE APT GROUPS BLACK BO' LEAK OVERVIEW AND ANALYSIS OF EXPOSED DOCUMENTS: TARGETS, PLANS, AND ATTACK VECTORS
First stage – attempting to breach the network via a social engineering attack. This attack was unsuccessful as the nobody opened the malicious file. Concurrently, breaching the Linux system used by the website and injecting a shell. Note however that the Linux system had limited capabilities (it is unclear what the attackers meant by this). After considerable efforts the attackers eventually were able to install a hydra system. Afterwards the attackers executed a successful brute force attack on the SMB systems. DOWNLOAD