Iranian and Russian Hackers Targeting UK Politicians and Journalists: Cyber Watchdog

Iranian and Russian Hackers Targeting UK Politicians and Journalists: Cyber Watchdog
In an illustration image, a man types on a computer keyboard in Warsaw in this Feb. 28, 2013. (Kacper Pempel/Reuters)
Alexander Zhang
1/26/2023
Updated:
1/26/2023

Iranian and Russian hackers have been “ruthlessly” trying to steal sensitive information from British journalists and politicians, the UK’s cyber security watchdog has warned.

In an advisory published on Jan. 26, the National Cyber Security Centre (NCSC) said groups based in Iran and Russia have been targeting a range of organisations and individuals in the UK and elsewhere, mostly those who are doing research and work on Iran and Russia.

“The Russia-based SEABORGIUM (Callisto Group/TA446/COLDRIVER/TAG-53) and Iran-based TA453 (APT42/Charming Kitten/Yellow Garuda/ITG18) actors continue to successfully use spear-phishing attacks against targeted organisations and individuals in the UK, and other areas of interest, for information gathering activity,” NCSC’s alert stated.

The attacks are not aimed at the general public but target specific sectors, including academia, defence, government organisations, NGOs, think tanks, as well as politicians, journalists, and activists, the watchdog said.

The NCSC advisory recommended organisations and individuals remain vigilant to approaches and follow the mitigation advice to protect their online accounts from compromise.

A logo is displayed on a television screen in the National Cyber Security Centre in London, on Feb. 14, 2017. (Carl Court/Getty Images)
A logo is displayed on a television screen in the National Cyber Security Centre in London, on Feb. 14, 2017. (Carl Court/Getty Images)

‘Persistent Threat’

Spear-phishing involves hackers building trust with victims by impersonating real contacts before sending meeting invitations containing malicious code, which once clicked on, allow the hackers access to sensitive information.

According to the NCSC, SEABORGIUM and TA453 conduct reconnaissance on social media and professional networking platforms and identify hooks to engage their target.

They have also created fake social media or networking profiles that impersonate respected experts and used supposed conference or event invitations, as well as false approaches from journalists.

Both groups use webmail addresses from different providers (including Outlook, Gmail, and Yahoo) in their initial approach, impersonating known contacts of the target or eminent names in the target’s field of interest or sector.

The actors have also created malicious domains resembling legitimate organisations to appear authentic.

NCSC Director of Operations Paul Chichester said: “The UK is committed to exposing malicious cyber activity alongside our industry partners and this advisory raises awareness of the persistent threat posed by spear-phishing attacks.

“These campaigns by threat actors based in Russia and Iran continue to ruthlessly pursue their targets in an attempt to steal online credentials and compromise potentially sensitive systems.

“We strongly encourage organisations and individuals to remain vigilant to potential approaches and follow the mitigation advice in the advisory to protect themselves online.”

The centre advised the use of strong passwords, multi-factor authentication, and email vigilance including disabling mail-forwarding to reduce the risk of being hacked.

The NCSC urged individuals or organisations in the identified sectors to report to the centre if they recognise the targeted activities described in the advisory.

The China Threat

The NCSC, a part of the UK’s GCHQ intelligence agency that was set up in 2017, is charged with protecting the nation from cyber-attacks.

In November 2020, then-Prime Minister Boris Johnson announced the formation of the National Cyber Force (NCF), which would work alongside the NCSC and conduct cyber operations to disrupt hostile state activities, counter-terror plots, and support military operations.

While the latest alert is about Russia and Iran, the NCSC has previously highlighted the threat from the Chinese Communist Party (CCP) regime.

The NCSC’s sixth annual review, published in November 2022, named regimes in Russia, China, Iran, and North Korea as presenting “the most acute cyber threat to the UK and its interests.”

The regimes’ activities targeting local and national governments of other states include cyber-enabled espionage to gain classified information, using tools such as wiper malware to damage IT systems or institutions, cyber-enabled theft of intellectual property or personal data of citizens, and stealing and publishing sensitive or restricted information to embarrass states or institutions or to undermine social cohesion, according to the review.
Lindy Cameron, CEO of the UK’s National Cyber Security Centre. (Courtesy of the NCSC)
Lindy Cameron, CEO of the UK’s National Cyber Security Centre. (Courtesy of the NCSC)
Launching the review, NCSC CEO Lindy Cameron said that, while the threat from Russia has been “particularly obvious,” China will likely be “the single biggest factor” affecting the UK’s technology.

She warned that the UK can’t take its eyes off China, saying: “While the threat from Russia has been particularly obvious over the last year, it’s important not to forget that China’s technical development and evolution—the scale and pace of what they are able to do—is still likely to be the single biggest factor affecting our cybersecurity in the years to come.”

The NCSC said UK organisations haven’t been significantly impacted by the cyber front of Russia’s invasion of Ukraine but cautioned against complacency as Russia “continues to be a persistent and active threat to the UK and its interests.”

The cybersecurity watchdog also stated that the Chinese regime poses the biggest threat to the UK’s cybersecurity in the coming years.

It stated that China has put “significant resources” into emerging tech research and development, including artificial intelligence, quantum computing, and semiconductors, in order to achieve “technical supremacy.”

The report also cited FBI Director Christopher Wray as saying that China has “a bigger hacking program than that of every other major nation combined.”

Lily Zhou and PA Media contributed to this report.