Today, CISA and the Federal Bureau of Investigation (FBI) released joint fact sheet, How to Protect Against Iranian Targeting of Accounts Associated with National Political Organizations. This fact sheet provides information about threat actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps (IRGC) targeting and compromising accounts of Americans to stoke discord and undermine confidence in U.S. democratic institutions.

IRGC actors have previously gained and continue to seek access to personal and business accounts using social engineering techniques by targeting victims across email and chat. This fact sheet includes steps that individuals and organizations can take to enhance their security and resilience to protect themselves against the common techniques used by these cyber actors.

CISA and FBI strongly recommend all individuals and organizations associated with national political organizations apply the mitigations in this fact sheet, including protecting their sensitive accounts with phishing-resistant multifactor authentication (MFA)

Election infrastructure stakeholders and the public can find more resources on how to protect against cyber and physical threats at #Protect2024. CISA encourages organizations to review its Iran Cyber Threat webpage for advisories and actions to defend their networks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore More

Zero-Day Vulnerabilities Surged by Over 50% Annually, Says Google

March 27, 2024 0 Comments 0 tags

Google detected nearly 100 zero-day vulnerabilities exploited in the wild in 2023

Notorious ransomware group claims responsibility for attacks roiling US pharmacies

February 28, 2024 0 Comments 0 tags

A notorious ransomware and extortion group tied to dozens of cyberattacks against health care entities claimed responsibility Wednesday for an ongoing attack that’s disrupting payment processing at pharmacies and other

Fraudsters Exploit Telegram’s Popularity For Toncoin Scam

April 22, 2024 0 Comments 0 tags

The scheme was uncovered by Kaspersky and has been operational since November 2023