Iranian Counterintelligence Operation Targets Farsi Speakers with Fake Recruitment Websites

On August 28, 2024, Mandiant released a comprehensive report uncovering a suspected Iran-nexus counterintelligence operation. This campaign, targeting Farsi speakers within and outside Iran, leveraged fake recruitment websites to collect personal and professional data.

Iranian Counterintelligence Operation Targets Farsi Speakers with Fake Recruitment Websites
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 28, 2024, Mandiant released a comprehensive report uncovering a suspected Iran-nexus counterintelligence operation. This campaign, targeting Farsi speakers within and outside Iran, leveraged fake recruitment websites to collect personal and professional data. The operation, attributed with high confidence to Iran's regime, aims to identify individuals potentially collaborating with foreign intelligence and security agencies, particularly in Israel.

Report Overview

Mandiant's investigation revealed that the operation, potentially linked to the Iranian Revolutionary Guard Corps (IRGC) and APT42, a known Iran-nexus threat actor, has been active since at least 2017. The campaign primarily targeted Iranian dissidents, activists, human rights advocates, and individuals with ties to foreign intelligence services. Similar operations were previously observed targeting Arabic speakers affiliated with Syria and Hezbollah, indicating a broader counterintelligence strategy by Iran.

The operation employed over 35 fake recruitment websites posing as Israel-based human resources firms. These sites used elaborate decoy content, including Israeli national symbols, to lure targets into providing sensitive personal details. The campaign also utilized multiple fake social media accounts to disseminate these websites, directing users to enter their information under the guise of job offers. The data collected was then sent to the attackers, potentially for use in identifying and persecuting individuals of interest to the Iranian regime.

The implications of this operation are significant, particularly for Iranian individuals suspected of collaborating with foreign entities. The collected data could be used to expose and target those perceived as threats to Iran's regime. Mandiant's report highlights the ongoing nature of Iran's counterintelligence efforts, which extend beyond its borders and may support allied operations in Syria and Lebanon.

Insights and Analysis

Mandiant's high-confidence assessment of the operation's connection to Iran's regime is based on observed tactics, techniques, and procedures (TTPs) consistent with past Iranian operations. The report also notes a weak overlap with APT42 activities, further corroborating the campaign's Iran nexus.

To mitigate the threat posed by this operation, individuals should exercise caution when interacting with recruitment websites, especially those requesting sensitive personal details. Verifying the legitimacy of such sites before submitting information is crucial. Additionally, security professionals should monitor for indicators of compromise (IOCs) related to this campaign, as listed in Mandiant's report.

Mandiant's report exposes a sophisticated Iranian counterintelligence operation targeting Farsi speakers with fake recruitment websites. The campaign's high-confidence attribution to Iran's regime underscores the persistent threat posed by state-sponsored cyber operations. As Iran continues to refine its counterintelligence capabilities, vigilance and proactive defence measures are essential to protect against such threats.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
beparas[.]comDomainFake recruitment website posing as an Israel-based HR firm.
parasil[.]meDomainAssociated with the "Optima HR" fake recruitment campaign.
darakeh[.]meDomainAnother domain used in the fake recruitment operation.
kandovani[.]orgDomainAssociated with the "Optima HR" and "Kandovan HR" fake HR campaigns.
topwor4u[.]comDomainPromoted via fake social media accounts as part of the counterintelligence operation.
opthrltd[.]meDomainUsed as part of the "Optima HR" campaign, linked to fake HR firm operations.
joinoptimahr[.]comDomainWebsite posing as an HR firm targeting Farsi speakers.
optimax-hr[.]comDomainAnother fake HR firm domain involved in the operation.
optimac-hr[.]comDomainUsed to target Farsi speakers with fake recruitment offers.
optima-hr[.]comDomainCentral to the "Optima HR" fake recruitment campaign.
titanium-hr[.]comDomainPart of the broader fake HR website network used in the operation.
azadijobs[.]meDomainPart of the "VIP Human Solutions" cluster, used in fake recruitment campaigns.
bilal1com[.]comDomainUsed in the "VIP Human Solutions" fake HR campaign.
damavand-hr[.]meDomainLinked to "VIP Human Solutions" and targeting specific regions.
damkahill[.]comDomainDomain associated with the "VIP Human Solutions" campaign.
dream-jobs[.]orgDomainFake recruitment site targeting Farsi speakers under the "VIP Human Solutions" banner.
dream-jobs[.]vipDomainAnother domain within the "VIP Human Solutions" campaign.
dreamy-job[.]comDomainPart of the fake recruitment network targeting intelligence personnel.
dreamy-jobs[.]comDomainUsed in a similar capacity within the "VIP Human Solutions" operation.
dreamycareer[.]comDomainAnother fake HR domain used in the broader campaign.
golanjobs[.]meDomainDomain targeting individuals related to Syria and Hezbollah under the "VIP Human Solutions" cluster.
hat-cast[.]comDomainAssociated with the "VIP Human Solutions" campaign, possibly for phishing or data collection.
irnjobs[.]meDomainAnother domain linked to the "VIP Human Solutions" fake recruitment sites.
jomehjob[.]comDomainPart of the cluster targeting intelligence personnel through fake HR sites.
radabala[.]comDomainLinked to the broader "VIP Human Solutions" operation.
rostam-hr[.]vipDomainFake HR site associated with the "VIP Human Solutions" cluster.
salamjobs[.]meDomainUsed within the "VIP Human Solutions" fake recruitment campaign.
shirazicom[.]comDomainAnother domain from the "VIP Human Solutions" operation.
syrtime[.]meDomainAssociated with the campaign targeting Syria and Hezbollah intelligence personnel.
topiranjobs[.]meDomainDomain targeting Iranian individuals within the broader operation.
trnjobs[.]meDomainUsed as part of the "VIP Human Solutions" network of fake recruitment sites.
vipjobsglobal[.]comDomainCentral to the "VIP Human Solutions" campaign, targeting intelligence personnel.
wazayif-halima[.]comDomainArabic-language fake HR site targeting Hezbollah and Syrian personnel.
wazayif-halima[.]orgDomainSimilar to wazayif-halima[.]com, used in the same campaign.
wehatcast[.]comDomainAnother domain used in the broader "VIP Human Solutions" operation.
youna101[.]meDomainDomain targeting Farsi speakers under the fake recruitment campaign.
younamesh[.]comDomainPart of the "VIP Human Solutions" fake HR network.

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Initial AccessSpearphishing via ServiceT1566.003The operation used fake recruitment websites to socially engineer individuals into providing personal details, a form of phishing.
Credential AccessInput CaptureT1056The websites required users to input personal and professional details, which were then captured by the attackers.
Command and ControlApplication Layer ProtocolT1071.001The campaign used Telegram links as a command and control mechanism to communicate with targeted individuals under the guise of HR communications.

References

I Spy With My Little Eye: Uncovering an Iranian Counterintelligence Operation | Google Cloud Blog
A suspected Iran-nexus counterintelligence operation aimed at collecting data on Iranians and domestic threats.