LAS VEGAS (Reuters) - Hackers believed to be working for the Iranian government have impersonated a young female photographer on social media for more than a year, luring men working in industries strategically important to Tehran's regional adversaries, according to research published Thursday.
The so-called Mia Ash persona has been active on sites including LinkedIn, Facebook Inc (FB.O), WhatsApp and Blogger since at least April of last year, researchers at Dell SecureWorks said.
The campaign showed Iran engaged in a social engineering plot to ensnare its targets with a "honey pot", a classic espionage trap often involving seduction, more commonly used by criminal hackers.
Dell SecureWorks observed Mia Ash sending specific malware, concealed as a "photography survey" with an attachment, to a victim that matched malware sent by Iranian hacking group Cobalt Gypsy during an unsuccessful "spearphishing" email attempt to the same victim's employer in January.
The malware, known as PupyRAT, would give an attacker complete control of a compromised computer and access to network credentials, suggesting government espionage. The researchers did not have visibility into how many targets were compromised or what Mia Ash sought to gain with the access.
The fake profile used publicly available social media images of a real photographer based in eastern Europe to create an identity of an attractive woman in her mid-twenties who lived in London and enjoyed travel, soccer, and popular musicians including Ed Sheeran and Ellie Goulding, Dell SecureWorks said. Her social media biographies appeared to lift details from a New York photographer's LinkedIn profile.
Dell SecureWorks said it had high confidence Mia Ash was created and operated by the Iranian hacking group known as Cobalt Gypsy.
Iranian officials did not immediately respond to requests for comment.
Mia Ash primarily lured middle-aged men who worked as technicians and engineers at oil and gas, aerospace and telecommunications firms in the Middle East that had been previously targeted by the same group. Those include Saudi Arabia and Israel in addition to India and the United States.
Mia Ash's victims failed to notice that none of her profiles included a way to contact her for photography services, according to Allison Wikoff, a senior security researcher at Dell SecureWorks who tracked Mia Ash's activity.
"These guys aren't hiring her for photography," Wikoff said. "Their main thing is, 'Wow, she's young, she's cute, she likes to travel, she's whimsical'."
LinkedIn removed the fake Mia Ash profile before Dell SecureWorks finished its research, Wikoff said.
Facebook, where Mia Ash listed her relationship status as "it's complicated," took down the profile last week after being contacted by Dell SecureWorks.
Cobalt Gypsy, also known as OilRig, has been previously accused of operating a network of fake LinkedIn profiles to pose as recruiters at major companies, including Northrop Grumman Corp (NOC.N) and General Motors Co (GM.N), but the Mia Ash persona showed an elevated level of persistence, Wikoff said.
Western security officials for years have considered Iran to be among the most sophisticated nation-state cyber adversaries, along with Russia, China and North Korea.
Another report released this week by researchers at Tokyo-based Trend Micro and ClearSky of Israel described efforts to impersonate major technology brands including Twitter Inc (TWTR.N) and Microsoft Corp (MSFT.O) by another hacking group widely suspected of having links to Iran.
Reporting by Dustin Volz; editing by Jonathan Weber