Operation Cleaver

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Operation Cleaver, as labelled in a report by American firm Cylance Inc. in late 2014, was a cyberwarfare covert operation targeting critical infrastructure organizations worldwide, allegedly planned and executed by Iran.

Cylance's report was later tacitly acknowledged in a confidential report by Federal Bureau of Investigation (FBI), though Iranian officials denied involvement in the operation.[1]

Cylance report[edit]

Logo designed by Cylance

In December 2014, California-based cyber security firm Cylance Inc. published results of a 2-year investigation,[2] an 86-page technical report, indicating that an operation, called "Operation Cleaver", has targeted the military, oil and gas, energy and utilities, transportation, airlines, airports, hospitals and aerospace industries organizations worldwide.[3]

The title "Operation Cleaver" alludes to frequent uses of the word "cleaver" in the malware's coding.[4]

According to the report, over 50 entities in 16 countries have been hit by the campaign, based in the United States, Israel, China, Saudi Arabia, India, Germany, France and England among others.[5] Cylance's research does not name individual companies, but Reuters reports citing "a person familiar with the research" Navy Marine Corps Intranet, Calpine, Saudi Aramco, Pemex, Qatar Airlines and Korean Air were among the specific targets.[5]

Stuart McClure, Cylance founder and CEO believes that the hackers are sponsored by Iran and have ties to Islamic Revolutionary Guard Corps.[2]

FBI report[edit]

According to Reuters, the Federal Bureau of Investigation has filed a confidential "Flash" report, providing technical details about malicious software and techniques used in the attacks. The technical document said the hackers typically launch their attacks from two IP addresses that are in Iran, but does not attribute the attacks to the Iranian government.[5] FBI warned businesses to stay vigilant and to report any suspicious activity spotted on the companies' computer systems.[3]

Alleged victims' reaction[edit]

  • A Pemex spokesman said the company had not detected any attacks from the Iranian groups but was constantly monitoring.[5]
  • Muhammad Haneef Rana, a spokesman for Pakistan International Airlines, said he wasn’t aware of any threat from hackers and “We are well secured and our firewall is in place”.[2]
  • Korean Air declined to comment.[2]

Iran's reaction[edit]

Iran has officially denied involvement in the hacking campaign. "This is a baseless and unfounded allegation fabricated to tarnish the Iranian government image, particularly aimed at hampering current nuclear talks", said Hamid Babaei, spokesman for Permanent mission of Islamic Republic of Iran to the United Nations.[5]

References[edit]

  1. ^ Finkle, Jim (December 13, 2014). Christian Plumb, ed. "Exclusive: Iran hackers may target U.S. energy, defense firms, FBI warns". Reuters. Retrieved March 30, 2015. 
  2. ^ a b c d Riley, Michael A; Robertson, Jordan (December 2, 2014). "Iran-Backed Hackers Target Airports, Carriers: Report". Bloomberg News. Retrieved March 30, 2015. 
  3. ^ a b Plummer, Quinten (December 15, 2014). "Operation Cleaver is Bigger Threat than Previously Thought, FBI Warns US Businesses". Tech Times. Retrieved March 30, 2015. 
  4. ^ Bertrand, Natasha (December 8, 2014). "Iran Is Officially A Real Player In The Global Cyber War". Business Insider. Retrieved March 30, 2015. 
  5. ^ a b c d e Finkle, Jim (December 2, 2014). Richard Valdmanis, Christian Plumb and W Simon, ed. "Iran hackers targeted airlines, energy firms: report". Reuters. Retrieved March 30, 2015. 

See also[edit]

External links[edit]