Cyber News

Global Airlines Targeted by Iranian Cyber Attackers to Steal Critical Data

A massive data breach has reportedly exposed an Iranian cybersecurity firm’s alleged role in state-sponsored cyber espionage operations targeting major international airlines and freight companies worldwide.

The leaked documents suggest that Amnban, officially known as Sharif Advanced Technologies, served as a front for Iran’s intelligence services while conducting systematic attacks on aviation infrastructure.

State-Sponsored Digital Warfare Operations

According to the leaked files, Amnban operated under the guise of legitimate penetration testing and security consulting while allegedly conducting Cyber Network Exploitation (CNE) operations for Iran’s Ministry of Intelligence and Security (MOIS).

The company, founded in 2018 by graduates from prestigious Iranian universities, reportedly maintained connections to APT39 (also known as Chafer), a notorious hacking group previously linked to Iranian intelligence operations.

The breach allegedly revealed that Amnban’s CEO, Behnam Amiri, had direct ties to APT39 operations.

At the same time, the company employed Ali Kamali, a hacker sanctioned by the FBI in 2020 for attacks on American infrastructure.

Intelligence documents suggest that Hamed Mashayekhi, identified as a MOIS operative, maintained regular access to Amnban’s facilities, indicating direct government oversight of the operation.

Technical analysis of the leaked data reveals sophisticated targeting methodologies designed for both intelligence gathering and potential infrastructure disruption.

The operations allegedly employed advanced persistent threat techniques to maintain long-term access to airline systems, enabling continuous data harvesting and reconnaissance activities.

Extensive Target Portfolio Spanning Multiple Continents

The leaked reconnaissance reports allegedly document systematic targeting of over a dozen major carriers, including Royal Jordanian, Turkish Airlines, Wizz Air, Emirates, Qatar Airways, Etihad, and Rwanda Airlines.

The operation’s scope reportedly extended beyond passenger airlines to include major freight companies such as FedEx, USPS, and DHL, suggesting broader logistical intelligence objectives.

Geographic analysis of the targets reveals a pattern encompassing both allied and adversarial nations from Iran’s perspective, indicating comprehensive intelligence collection rather than selective targeting.

The documents allegedly show detailed technical reconnaissance of each target’s digital infrastructure, suggesting preparation for potential Cyber Network Attack (CNA) capabilities.

Implications for Global Aviation Security

The alleged breach highlights vulnerabilities in the aviation sector’s cybersecurity ecosystem, particularly about third-party security contractors.

If verified, these operations would represent a significant escalation in state-sponsored cyber espionage targeting civilian transportation infrastructure.

Aviation security experts note that passenger data, flight manifests, and operational systems represent high-value intelligence assets for foreign governments.

The alleged systematic nature of these operations suggests long-term strategic objectives beyond simple data theft, potentially enabling future disruption capabilities against critical transportation networks during periods of geopolitical tension.

The revelations underscore the growing intersection between cybersecurity consulting and state-sponsored espionage, highlighting the need for enhanced vetting procedures for security contractors handling sensitive aviation infrastructure.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago