The United States government, in partnership with cyber authorities from Australia, Canada, and the U.K., have sanctioned 10 individuals and two entities associated with Iran's Islamic Revolutionary Guard Corps (IRGC) for their participation in malicious cyber activity, including ransomware.
The group of threat actors has been observed exploiting known vulnerabilities in Fortinet FortiOS and Microsoft Exchange servers since early 2021 to gain access to a wide range of targeted entities. They have also been known to exploit VMware Horizon Log4j vulnerabilities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) describes the IRGC's actions in the last few years:
Brian E. Nelson, Under Secretary for Terrorism and Financial Intelligence at the U.S. Department of the Treasury, discussed the sanctions:
"Ransomware actors and other cybercriminals, regardless of their national origin or base of operations, have targeted businesses and critical infrastructure across the board—directly threatening the physical security and economy of the United States and other nations. We will continue to take coordination action with our global partners to combat and deter ransomware threats, including those associated with the IRGC."
So, what exactly does it look like when you are sanctioned by the U.S. government? In short, not good.
The U.S. Treasury says that as a result of these sanctions, "all property and interests in property of the designated persons described above that are in the United States or in the possession or control of U.S. persons are blocked and must be reported to OFAC." Any entities owned, directly or indirectly, by 50% or more are now blocked. All transactions by individuals within the U.S. that involve any property or interests of the threat actors is prohibited. And financial institutions are no longer allowed engage in transactions with those sanctioned.
It would probably be a pretty weird feeling to wake up in the morning and find out you've been sanctioned by the U.S. government.
CISA has provided a detailed list of ways to mitigate malicious cyber activity. The mitigation techniques include the following:
CISA provides a ton of additional information in its Cybersecurity Advisory on Iranian cyber actors, including technical details, methods for detection, and many more resources.
Something else to note: Last week, the Albanian government severed diplomatic relations with Iran after a cyberattack in July targeted the country's digital infrastructure and public services.
The White House said that the U.S. "strongly condemns" the cyberattack against Albania, and that it would be taking further action to hold those responsible accountable. But it is unclear if the sanctions announced today are connected to the Albania incident.
Follow SecureWorld News for more cybersecurity coverage.