US, UK agencies warn Iran-backed hackers are targeting critical sectors
The state-sponsored APT groups exploited Fortinet and Microsoft Exchange flaws to gain access to systems


US, UK, and Australian cyber authorities have warned that Iran-backed hackers are behind an ongoing ransomware campaign targeting critical infrastructure.
Iranian state-sponsored APT groups exploited four Fortinet and Microsoft Exchange flaws – CVE-2021-34473, 2020-12812, 2019-5591, and 2018-13379 – in order to carry out ransomware attacks, according to the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC), and the Australian Cyber Security Centre (ACSC).
In a joint statement, the agencies said that the FBI and CISA had “observed this Iranian government-sponsored APT group exploit Fortinet vulnerabilities since at least March 2021 and a Microsoft Exchange ProxyShell vulnerability since at least October 2021”.
Meanwhile, the ACSC found that the same APT group had exploited the same Microsoft Exchange vulnerability in Australia.
The flaws were used to gain access to the systems of critical infrastructure organisations, including those in the US transportation and healthcare sectors, in order to then exfiltrate or encrypt data for extortion.
However, the FBI, CISA, ACSC, and NCSC stated that the Iranian-backed threat actors are “focused on exploiting known vulnerabilities rather than targeting specific sectors”.
RELATED RESOURCE
Multi-factor authentication deployment guide
A complete guide to selecting and deploying your MFA authentication guide
The cyber authorities have urged critical infrastructure organisations to patch and update their systems, implement network segmentation and multi-factor authentication, use strong passwords and antivirus software, and stay alert of phishing threats.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The guidance follows a separate report from the Microsoft Threat Intelligence Center (MSTIC) which found that Iranian state-backed hackers stole credentials by sending “interview requests” to target individuals through emails that contained tracking links to confirm whether the user had opened the file. If a victim responded, they then sent a link to a fake Google Meeting, which led to a credential harvesting page.
Microsoft managed to identify six cyber espionage groups in Iran that were found to be behind a spate of ransomware attacks occurring roughly every six weeks since September 2020.
The tech giant’s researchers said that Iranian state-backed hackers collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel, then shifted to scanning for unpatched on-premises Exchange Servers vulnerable to ProxyShell.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Workday snaps up AI-powered conversation recruitment platform, Paradox
News Workday will integrate Paradox’s AI-driven candidate experience agent to help deliver talent faster
-
Has password hygiene ever improved?
In-depth Weak passwords still topple companies in 2025 – experts warn that real progress means replacing them with secure, passwordless authentication
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos
-
Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victim
News In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected
-
Nearly one-third of ransomware victims are hit multiple times, even after paying hackers
News Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics
-
75% of UK business leaders are willing to risk criminal penalties to pay ransoms
News A ransom payment ban is a great idea - until you're the one being targeted...
-
The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees
News The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences
-
Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime
News A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them
-
The ransomware boom shows no signs of letting up – and these groups are causing the most chaos
News Thousands of ransomware cases have already been posted on the dark web this year