Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database

Posted on August 25, 2025August 25, 2025 By CWS

A complicated marketing campaign of cyber sabotage unfolded towards Iran’s maritime communications infrastructure in late August 2025, slicing off dozens of vessels from important satellite tv for pc hyperlinks and navigation aids.

Reasonably than focusing on every ship individually—a logistical nightmare throughout worldwide waters—the attackers infiltrated Fanava Group, the IT supplier accountable for satellite tv for pc communications to Iran’s sanctioned tanker fleets.

By compromising the corporate’s outdated iDirect Falcon terminals, they gained root entry to Linux programs operating kernel 2.6.35 and mapped the complete constellation of vessels by a centralized MySQL database.

The preliminary breach vector seems to have exploited unpatched vulnerabilities in legacy Falcon administration consoles, permitting the risk actors to execute privileged instructions and exfiltrate community mappings.

As soon as inside, they harvested modem serial numbers, community IDs, and IP telephone system configurations in plain textual content, together with credentials akin to “1402@Argo” and “1406@Diamond.”

These particulars have been then weaponized to orchestrate a synchronized blackout: e mail and FBB SIM communications failed, automated climate updates ceased, and port coordination indicators vanished nearly instantaneously.

Nariman Gharib researchers recognized that the marketing campaign, dubbed Lab-Dookhtegan, was not a one-off disruption.

Electronic mail logs relationship again to Might revealed persistent entry and periodic “Node Down” assessments, confirming that the attackers maintained management over the networks for months earlier than launching a harmful finale.

On August 18, they executed a “scorched earth” sequence, overwriting a number of storage partitions on satellite tv for pc modems with zeroed information, rendering distant restoration unimaginable.

FANAVA (Supply – Nariman Gharib)

By crippling Iran’s sanctioned fleets—NITC and IRISL—at a time when covert oil transfers to China intensify, the attackers dealt a blow to the nation’s sanctions-evasion capabilities.

With out communication hyperlinks, tankers danger drifting off-course or changing into straightforward targets for boarding and seizure. The operation’s precision underscores a deep reconnaissance section, permitting the risk actors to ship maximally disruptive payloads on the worst strategic second.

An infection Mechanism

The malware’s an infection mechanism relied on a multi-stage strategy: preliminary entry by unprotected administration ports, lateral motion through SSH keys harvested from MySQL dumps, and deployment of harmful scripts.

After gaining root on a compromised Falcon console, the attackers executed instructions akin to:-

dd if=/dev/zero of=/dev/mmcblk0p1 bs=1M
dd if=/dev/zero of=/dev/mmcblk0p2 bs=1M

These instructions systematically wiped main storage partitions and restoration slices, making certain the terminal’s firmware and configurations have been irrecoverable with out bodily intervention.

IP addresses and passwords in plain textual content (Supply – Nariman Gharib)

Concurrently, SQL queries extracted the fleet blueprint:-

SELECT serial_number, vessel_name, network_id
FROM modems;

Armed with this information, the attackers automated credential injection and shutdown sequences throughout 64 vessels with a single orchestration script.

PoCs (Supply – Nariman Gharib)

By embedding malicious cron entries, they achieved each persistence and timed execution, triggering the blackout at a second calculated to maximise operational chaos.

This an infection chain highlights the significance of isolating administration interfaces and imposing strict patch regimes on crucial satellite tv for pc communication programs.

Increase your SOC and assist your group defend your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Communications, Database, Hackers, Iranian, Maritime, MySQL, Sabotage, Ships, Terminals

Post navigation

Previous Post: Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
Next Post: OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail

Related Posts

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
How Certificate Mismanagement Opens The Door For Phishing And MITM Attacks Cyber Security News
Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News
What is MCP Server – How it is Powering AI-Driven Cyber Defense Cyber Security News
How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Salesforce Attack Campaign Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
  • Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Hackers Sabotage Iranian Ships Using Maritime Communications Terminals in Its MySQL Database
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News