Iranian Hackers Target US Midterm Elections

The FBI has warned that an Iranian threat group known as 'Emennet Pasargad' is preparing to interfere in  the forthcoming cycle of US midterm elections, targeting officials and companies associated with the election process, similar to what happened at the 2020 US election. At that time, the FBI said that Iran was behind the most significant foreign attempt to influence that year’s US elections. 

According to intelligence sources, Emennet Pasargad is a private Iranian organization hired by the Iranian government to interfere in U.S. elections, attacking voting-related websites and news outlets and distributing misinformation designed to undermine confidence in the U.S. electoral system

In 2020 it was found that Democrats registered to vote in Florida, which at the time made voter information publicly accessible, received intimidating emails in the weeks before the election, instructing them to become Republicans. The emails were signed “Proud Boys,” an extremist pro-Trump group. The fake emails ordered Democrat voters in Florida to switch parties and vote for the Republican candidates. The email was supposed to come from "Proud Boys." the right-wing groups of Trump supporters.  

Although Emennet Pasargad is largely dedicated to launching attacks against Israeli officials, the FBI warns the group is likely to engage in hack-and-leak operations against US interests in the upcoming mid-term elections. The group regularly engages in hack-and-leak campaigns. And the group’s activities typically involve breaches, data theft, data leaks and amplification of leaked data on social media. 

The FBI found that the group was active during the 2020 elections and are likely to reemerge in the next few weeks before the mid-terms. The FBI also noted that Emennet was linked to a cyber attack on a US organisation in 2022, which highlights that the group is still an active threat.

FBI:     CFR:     NYT:      NBC:       Yahoo:    Dark Reading:       Oodaloop

You Might Also Read: 

Iran Caught Using Intermediaries To Hack Israeli Business:

 

« The Five Stages Of A Cyber Attack
Ed Sheeran's Music Pirate Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Creative Destruction Lab (CDL)

Creative Destruction Lab (CDL)

Creative Destruction Lab is a nonprofit organization that delivers an objectives-based program for massively scalable, seed-stage, science- and technology-based companies.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.