-
Russian hacker group hijacked Iranian spying operation: US, UK officials

Russian hackers piggy-backed on an Iranian cyber-espionage operation to attack government and industry organizations in dozens of countries while masquerading as attackers from the Islamic Republic, British and US officials said on Monday.
The Russian group, known as “Turla” and accused by Estonian and Czech authorities of operating on behalf of Russia’s FSB security service, has used Iranian tools and computer infrastructure to successfully hack in to organizations in at least 20 different countries over the last 18 months, British security officials said.
The hacking campaign, the extent of which has not been previously revealed, was most active in the Middle East but also targeted organizations in Britain, they said.
Paul Chichester, a senior official at Britain’s GCHQ intelligence agency, said the operation shows state-backed hackers are working in a “very crowded space” and developing new attacks and methods to better cover their tracks.
In a statement accompanying a joint advisory with the US National Security Agency (NSA), GCHQ’s National Cyber Security Centre said it wanted to raise industry awareness about the activity and make attacks more difficult for its adversaries.
“We want to send a clear message that even when cyber actors seek to mask their identity, our capabilities will ultimately identify them,” said Chichester, who serves as the NCSC’s director of operations.
Officials in Russia and Iran did not immediately respond to requests for comment sent on Sunday. Moscow and Tehran have both repeatedly denied Western allegations over hacking.
Western officials rank Russia and Iran as two of the most dangerous threats in cyberspace, alongside China and North Korea, with both governments accused of conducting hacking operations against countries around the world.
Intelligence officials said there was no evidence of collusion between Turla and its Iranian victim, a hacking group known as “APT34” which cybersecurity researchers at firms including FireEye say works for the Iranian government.
Rather, the Russian hackers infiltrated the Iranian group’s infrastructure in order to “masquerade as an adversary which victims would expect to target them,” said GCHQ’s Chichester.
Turla’s actions show the dangers of wrongly attributing cyberattacks, British officials said, but added that they were not aware of any public incidents that had been incorrectly blamed on Iran as a result of the Russian operation.
The United States and its Western allies have also used foreign cyberattacks to facilitate their own spying operations, a practice referred to as “fourth party collection,” according to documents released by former US intelligence contractor Edward Snowden and reporting by German magazine Der Spiegel.
GCHQ declined to comment on Western operations.
By gaining access to the Iranian infrastructure, Turla was able to use APT34’s “command and control” systems to deploy its own malicious code, GCHQ and the NSA said in a public advisory.
The Russian group was also able to access the networks of existing APT34 victims and even access the code needed to build its own “Iranian” hacking tools.
source:Reuters
Tags
You May Also Like
Popular Posts
Caricature
BENEFIT Sponsors BuildHer...
- April 23, 2025
BENEFIT, the Kingdom’s innovator and leading company in Fintech and electronic financial transactions service, has sponsored the BuildHer CityHack 2025 Hackathon, a two-day event spearheaded by the College of Engineering and Technology at the Royal University for Women (RUW).
Aimed at secondary school students, the event brought together a distinguished group of academic professionals and technology experts to mentor and inspire young participants.
More than 100 high school students from across the Kingdom of Bahrain took part in the hackathon, which featured an intensive programme of training workshops and hands-on sessions. These activities were tailored to enhance participants’ critical thinking, collaborative problem-solving, and team-building capabilities, while also encouraging the development of practical and sustainable solutions to contemporary challenges using modern technological tools.
BENEFIT’s Chief Executive Mr. Abdulwahed AlJanahi, commented: “Our support for this educational hackathon reflects our long-term strategic vision to nurture the talents of emerging national youth and empower the next generation of accomplished female leaders in technology. By fostering creativity and innovation, we aim to contribute meaningfully to Bahrain’s comprehensive development goals and align with the aspirations outlined in the Kingdom’s Vision 2030—an ambition in which BENEFIT plays a central role.”
Professor Riyadh Yousif Hamzah, President of the Royal University for Women, commented: “This initiative reflects our commitment to advancing women in STEM fields. We're cultivating a generation of creative, solution-driven female leaders who will drive national development. Our partnership with BENEFIT exemplifies the powerful synergy between academia and private sector in supporting educational innovation.”
Hanan Abdulla Hasan, Senior Manager, PR & Communication at BENEFIT, said: “We are honoured to collaborate with RUW in supporting this remarkable technology-focused event. It highlights our commitment to social responsibility, and our ongoing efforts to enhance the digital and innovation capabilities of young Bahraini women and foster their ability to harness technological tools in the service of a smarter, more sustainable future.”
For his part, Dr. Humam ElAgha, Acting Dean of the College of Engineering and Technology at the University, said: “BuildHer CityHack 2025 embodies our hands-on approach to education. By tackling real-world problems through creative thinking and sustainable solutions, we're preparing women to thrive in the knowledge economy – a cornerstone of the University's vision.”
opinion
Report
ads
Newsletter
Subscribe to our mailing list to get the new updates!