Skip to main content

Iranian hackers targeted 2020 U.S. presidential candidates, Microsoft says

A series of cyberattacks targeted at U.S. presidential candidates and their campaigns, journalists, and current and former government officials is said to be linked to and backed by the Iranian government, according to a recently published report from Microsoft’s Threat Intelligence Center. According to Microsoft, the Phosphorous group is behind the attacks, and the hackers were observed to have made more than 2,700 attempts in identifying Microsoft customer emails in a 30-day period between August and September. Among those attempts, hackers tried to gain access to 241 of those accounts.

In order to carry out the account hack, Phosphorous used personal information about their targets obtained through copious amounts of research. The information was used to game password reset and account recovery features, Microsoft said.

Recommended Videos

“For example, they would seek access to a secondary email account linked to a user’s Microsoft account, then attempt to gain access to a user’s Microsoft account through verification sent to the secondary account,” Microsoft detailed in its cybersecurity blog post. “In some instances, they gathered phone numbers belonging to their targets and used them to assist in authenticating password resets.”

Given the news of the recent attacks, it is advised that users enable multi-factor or two-factor authentication on online accounts that support these enhanced security measures. Microsoft also suggests that users monitor their account history log to see if any unauthorized logins were made or attempted.

Of the 241 attempted attacks, Microsoft reported that a total of four accounts were compromised. These accounts were not linked to any U.S. presidential campaigns or any government officials, and the company has notified affected account holders and is working with them to secure these accounts. Microsoft did not identify the owners of the hacked accounts.

Although these cyberattacks by Phosphorous comes at a sensitive time as the U.S. heads into the 2020 presidential elections, it’s not the first time that the group has been linked to attacks on computer systems of businesses and governments. In the past, it’s been reported that Phosphorous would use spear-phishing techniques to steal trade secrets and gain access to sensitive information. Microsoft had been tracking the group’s activities since 2013, and Microsoft’s Digital Crimes Unit had won a court case filed in the U.S. District Court for Washington D.C. that allowed the organization to take control of — and shut down  — 99 websites used by Phosphorous in its hacks.

Chuong Nguyen
Silicon Valley-based technology reporter and Giants baseball fan who splits his time between Northern California and Southern…
Hackers target U.S. government agencies as FBI investigates
Stock photo of laptop with code on its screen

Hackers have been accessing internal emails at the U.S. Treasury and also the Commerce Department, according to a Reuters report on Sunday.

Four people with knowledge of the incident told the news outlet that state-backed hackers from Russia may have been behind the operation.

Read more
TikTok says it’s here to stay; ban from U.S. app stores delayed to September 27
tiktok logo

TikTok claims that it is here to stay, shortly after President Donald Trump said that he has approved Oracle's proposed deal to acquire the video-sharing app's U.S. assets.

TikTok said on Twitter said that it is not going anywhere, while also uploading a short video message from interim CEO Vanessa Pappas.

Read more
Microsoft fails in effort to acquire TikTok’s U.S. operations
digital trends live episode 437 106619142 15949038932020 07 16t045305z 1572845887 rc24uh9n1ig1 rtrmadp 0 usa legislation tikt

Microsoft has failed in its effort to acquire the U.S. operations of popular social media app TikTok, the computer giant said on Sunday.

Microsoft was an early contender to purchase part of TikTok from its Chinese owner, ByteDance, but talks have evidently led nowhere.

Read more