Iran 'Rocket Kitten' cyber group hit in European raids after targeting Israeli scientists

Europol, the FBI and Israel's internal security service Shin Bet declined immediate comment.

November 9, 2015 15:59
1 minute read.
Hacker in a hood

Hacker in a hood. (photo credit: INGIMAGE)


Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later Don't show it again

FRANKFURT - European authorities have taken action to shut down a cyber espionage operation linked to Iran's powerful Revolutionary Guard in the first operation of its kind since Tehran signed a nuclear treaty, according to security researchers who located computers used to launch attacks.

The hacker group - dubbed "Rocket Kitten" by security experts who have been hunting the hacker group since early 2014 - has mounted cyber attacks on high-profile political and defense figures globally since that time.

Be the first to know - Join our Facebook page.

The action is likely to hamper Tehran's efforts to gather sensitive intelligence from rivals including Saudi Arabia, Israel, Turkey, the United States and Venezuela, which were among the nations targeted.

Researchers from US-Israeli security firm Check Point Software said the 1,600 high-profile targets include members of the Saudi royal family, Israeli nuclear scientists, NATO officials and Iranian dissidents and even the wives of high-ranking generals from unnamed countries.

The company said it had informed national computer security response teams in Britain, Germany and the Netherlands, who in turn alerted police in those countries to the locations of "command and control" servers used to mount attacks controlled from Iran.

Europol, the FBI and Israel's internal security service Shin Bet declined immediate comment.

The actions come as US President Barack Obama and Israel's Prime Minister Benjamin Netanyahu prepare to meet on Monday for the first time since the Israeli leader lost his battle against the Iran nuclear deal and security issues top the agenda.

Check Point plans to issue a report later on Monday. According to an advance copy obtained by Reuters, the report details how its experts burrowed inside the hacker group's database, giving them a map of malicious software tools and remote-controlled computers used by the group.

Related Content

August 15, 2018
Iran Supreme Leader admits mistake regarding nuclear talks