Iranian Threat Actor Cotton Sandstorm Adopts New Cyber Tactics

The US and Israel have released a joint advisory, warning that the Iranian state-sponsored threat actor known as Cotton Sandstorm has adopted new cyber tactics. These new methods include leveraging generative AI tools to enhance their operations, which now target not just Israel but also France, Sweden, and the US. Historically, Cotton Sandstorm, also referred to as Marnanbridge and Haywire Kitten, was primarily involved in “hack and leak” operations targeting organizations mainly in Israel. However, the group has recently broadened its scope, indicating a significant evolution in its approach and intentions.

One of the most concerning developments is Cotton Sandstorm’s newly observed activity, specifically targeting US election-related websites and media outlets. This suggests that the group may be gearing up to conduct direct influence operations as the US Presidential Election Day approaches. To add to the urgency, the group has also targeted the 2024 Paris Olympics, compromising a French commercial dynamic display provider and initiating content harvesting from IP cameras. Since April 2024, the group has used the online persona “Cyber Court” to promote activities by various hacktivist groups, aiming to protest the Israel-Hamas conflict.

Cotton Sandstorm’s New Tradecraft

Recent observations have shown that Cotton Sandstorm has developed several new tactics, techniques, and procedures (TTPs) to execute its operations more effectively. One major shift is the group’s approach to infrastructure tradecraft. Since mid-2023, the group has utilized various hosting providers for infrastructure management and obfuscation. These providers, such as “Server-Speed” and “VPS-Agent," enable the group to set up its own resellers and procure server space from Europe-based providers. These cover resellers are then used to provision operational servers for conducting malicious activities, including technical support to individuals involved in hosting Hamas-affiliated websites.

Cotton Sandstorm has also intensified its efforts to harvest open-source information. Following the October 7, 2023 Hamas attack on Israel, the group has focused on identifying information about Israeli fighter pilots and UAV operators. They accomplish this by searching multiple platforms such as Pastebin and LinkedIn. Furthermore, they utilize online resources like ancestry.com and familysearch.org, as well as previously leaked data sets to gather intelligence. This shift in focus indicates a strategic move to exploit publicly available information for their operations.

Incorporating AI into their tactics, Cotton Sandstorm was observed using generative AI in its messaging efforts during an operation named “For-Humanity.” This cyber-enabled influence operation took place in December 2023 and impacted a US-based Internet Protocol Television (IPTV) streaming company. The attack leveraged unauthorized access to IPTV streaming services to disseminate crafted messages about the Israel-Hamas conflict. This advanced use of AI demonstrates the group’s evolving capabilities in executing sophisticated cyber operations and influence campaigns.

Defending Against Cotton Sandstorm Attacks

The US and Israel have jointly issued an advisory alerting the public about the evolving cyber tactics of the Iranian threat actor Cotton Sandstorm, also known as Marnanbridge and Haywire Kitten. Previously focused on "hack and leak" operations targeting organizations in Israel, Cotton Sandstorm has expanded its reach to include France, Sweden, and the US. They have adopted new strategies that utilize generative AI tools to amplify their operations.

Alarmingly, Cotton Sandstorm is now concentrating its efforts on US election-related websites and media outlets, suggesting potential influence operations as the upcoming US Presidential Election draws near. Additionally, the group has set its sights on the 2024 Paris Olympics, compromising a French commercial display provider and collecting footage from IP cameras. Since April 2024, the group has used the online alias "Cyber Court" to broadcast activities by various hacktivist groups, protesting the Israel-Hamas conflict.

Explore more