Anonymous ID: 61ca6e Sept. 17, 2020, 9:36 a.m. No.10681938   🗄️.is 🔗kun

Dog comms

 

San Bernardino County Sheriff

@sbcountysheriff

Level 1:

It’s with heavy hearts we announce the passing of K9 Deja. Deja passed yesterday surrounded by her handler Deputy Stone & family. Deja & her handler worked tirelessly during her career tracking down criminals & missing persons until her retirement last year #11K92

Image

Image

Image

Image

10:54 AM · Sep 17, 2020

 

https://twitter.com/sbcountysheriff/status/1306622623615393793

Anonymous ID: 61ca6e Sept. 17, 2020, 9:46 a.m. No.10682037   🗄️.is 🔗kun   >>2061 >>2091

Treasury Sanctions Cyber Actors Backed by Iranian Intelligence Ministry

 

https://home.treasury.gov/news/press-releases/sm1127

 

“The FBI, through our Cyber Division, is committed to investigating and disrupting malicious cyber campaigns, and collaborating with our U.S. government partners to impose risks and consequences on our cyber adversaries. Today, the FBI is releasing indicators of compromise attributed to Iran’s MOIS to help computer security professionals everywhere protect their networks from the malign actions of this nation state,” said FBI Director Christopher Wray. “Iran’s MOIS, through their front company Rana, recruited highly educated people and turned their cyber talents into tools to exploit, harass, and repress their fellow citizens and others deemed a threat to the regime. We are proud to join our partners at the Department of Treasury in calling out these actions. The sanctions announced today hold these 45 individuals accountable for stealing data not just from dozens of networks here in the United States, but from networks in Iran’s neighboring countries and around the world."

 

Washington – Today, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) imposed sanctions on Iranian cyber threat group Advanced Persistent Threat 39 (APT39), 45 associated individuals, and one front company. Masked behind its front company, Rana Intelligence Computing Company (Rana), the Government of Iran (GOI) employed a years-long malware campaign that targeted Iranian dissidents, journalists, and international companies in the travel sector. Concurrent with OFAC’s action, the U.S. Federal Bureau of Investigation (FBI) released detailed information about APT39 in a public intelligence alert.

 

“The Iranian regime uses its Intelligence Ministry as a tool to target innocent civilians and companies, and advance its destabilizing agenda around the world,” said Treasury Secretary Steven T. Mnuchin. “The United States is determined to counter offensive cyber campaigns designed to jeopardize security and inflict damage on the international travel sector.”

 

These individuals and entities were designated pursuant to Executive Order (E.O.) 13553.

 

Rana advances Iranian national security objectives and the strategic goals of Iran’s Ministry of Intelligence and Security (MOIS) by conducting computer intrusions and malware campaigns against perceived adversaries, including foreign governments and other individuals the MOIS considers a threat. APT39 is being designated pursuant to E.O. 13553 for being owned or controlled by the MOIS, which was previously designated on February 16, 2012 pursuant to Executive Orders 13224, 13553, and 13572, which target terrorists and those responsible for human rights abuses in Iran and Syria, respectively.

 

Rana is being designated pursuant to E.O. 13553 for being owned or controlled by MOIS. Forty-five cyber actors are also being designated pursuant to E.O. 13553 for having materially assisted, sponsored, or providing financial, material, or technological support for, or goods or services to or in support of the MOIS. The identification of these individuals and their roles related to MOIS and APT39 comes as the result of a long-term investigation conducted by the FBI Boston Division.

 

The 45 designated individuals served in various capacities while employed at Rana, including as managers, programmers, and hacking experts. These individuals provided support for ongoing MOIS cyber intrusions targeting the networks of international businesses, institutions, air carriers, and other targets that the MOIS considered a threat.

 

The FBI advisory, also being released today, details eight separate and distinct sets of malware used by MOIS through Rana to conduct their computer intrusion activities. This is the first time most of these technical indicators have been publicly discussed and attributed to MOIS by the U.S. government. By making the code public, the FBI is hindering MOIS’s ability to continue their campaign, ending the victimization of thousands of individuals and organizations around the world.

Anonymous ID: 61ca6e Sept. 17, 2020, 9:50 a.m. No.10682091   🗄️.is 🔗kun

>>10682037

FBI Boston

@FBIBoston

Level 1:

#BREAKING: As a direct result of an #FBI Boston Division investigation, @USTreasury

is imposing sanctions on 45 cyber actors, and one front company, backed by Iran's Intelligence Ministry, for engaging in a years-long malware campaign. Learn more: https://home.treasury.gov/news/press-releases/sm1127

Image

10:29 AM · Sep 17, 2020·

 

https://twitter.com/FBIBoston/status/1306616320809734144