Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

Iranian hackers used female 'honey pot' on social media to lure targets, finds new research

The Mia Ash persona was used to send malware concealed as a 'photography survey'

Dustin Volz
Friday 28 July 2017 06:01 EDT
Comments
It is believed that Iranian hacking group Cobalt Gypsy is behind Mia Ash
It is believed that Iranian hacking group Cobalt Gypsy is behind Mia Ash (Reuters)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Hackers believed to be working for the Iranian government have impersonated a young female photographer on social media for more than a year, luring men working in industries strategically important to Tehran's regional adversaries, according to new research.

The so-called Mia Ash persona has been active on sites including LinkedIn, Facebook Inc, WhatsApp and Blogger since at least April of last year, researchers at Dell SecureWorks said.

The campaign showed Iran engaged in a social engineering plot to ensnare its targets with a "honey pot", a classic espionage trap often involving seduction, more commonly used by criminal hackers.

Dell SecureWorks observed Mia Ash sending specific malware, concealed as a "photography survey" with an attachment, to a victim that matched malware sent by Iranian hacking group Cobalt Gypsy during an unsuccessful "spearphishing" email attempt to the same victim's employer in January.

The malware, known as PupyRAT, would give an attacker complete control of a compromised computer and access to network credentials, suggesting government espionage. The researchers did not have visibility into how many targets were compromised or what Mia Ash sought to gain with the access.

The fake profile used publicly available social media images of a real photographer based in eastern Europe to create an identity of an attractive woman in her mid-twenties who lived in London and enjoyed travel, football, and popular musicians including Ed Sheeran and Ellie Goulding, Dell SecureWorks said. Her social media biographies appeared to lift details from a New York photographer's LinkedIn profile.

Dell SecureWorks said it had high confidence Mia Ash was created and operated by the Iranian hacking group known as Cobalt Gypsy.

Iranian officials did not immediately respond to requests for comment.

Mia Ash primarily lured middle-aged men who worked as technicians and engineers at oil and gas, aerospace and telecommunications firms in the Middle East that had been previously targeted by the same group.

Those included firms in Saudi Arabia and Israel in addition to India and the United States.

Mia Ash's victims failed to notice that none of her profiles included a way to contact her for photography services, according to Allison Wikoff, a senior security researcher at Dell SecureWorks who tracked Mia Ash's activity.

"These guys aren't hiring her for photography," Wikoff said. "Their main thing is, 'Wow, she's young, she's cute, she likes to travel, she's whimsical'."

LinkedIn removed the fake Mia Ash profile before Dell SecureWorks finished its research, Wikoff said.

Facebook, where Mia Ash listed her relationship status as "it's complicated," took down the profile last week after being contacted by Dell SecureWorks.

Cobalt Gypsy, also known as OilRig, has been previously accused of operating a network of fake LinkedIn profiles to pose as recruiters at major companies, including Northrop Grumman Corp and General Motors Co, but the Mia Ash persona showed an elevated level of persistence, Wikoff said.

Western security officials for years have considered Iran to be among the most sophisticated nation-state cyber adversaries, along with Russia, China and North Korea.

Another report released this week by researchers at Tokyo-based Trend Micro and ClearSky of Israel described efforts to impersonate major technology brands including Twitter Inc and Microsoft Corp by another hacking group widely suspected of having links to Iran.

Reuters

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in