In the present day, Microsoft’s Digital Risk Evaluation Heart (DTAC) is attributing a current affect operation focusing on the satirical French journal Charlie Hebdo to an Iranian nation-state actor. Microsoft calls this actor NEPTUNIUM, which has additionally been recognized by the U.S. Division of Justice as Emennet Pasargad.
In early January, a beforehand unheard-of on-line group calling itself “Holy Souls,” which we are able to now establish as NEPTUNIUM, claimed that it had obtained the private data of greater than 200,000 Charlie Hebdo prospects after “achieve[ing] entry to a database.” As proof, Holy Souls launched a pattern of the information, which included a spreadsheet detailing the total names, phone numbers, and residential and electronic mail addresses of accounts that had subscribed to, or bought merchandise from, the publication. This data, obtained by the Iranian actor, might put the journal’s subscribers liable to on-line or bodily focusing on by extremist organizations.
We imagine this assault is a response by the Iranian authorities to a cartoon contest carried out by Charlie Hebdo. One month earlier than Holy Souls carried out its assault, the journal introduced it might be holding a global competitors for cartoons “ridiculing” Iranian Supreme Chief Ali Khamenei. The difficulty that includes the profitable cartoons was to be printed in early January, timed to coincide with the eighth anniversary of an assault by two al-Qa’ida within the Arabian Peninsula (AQAP)-inspired assailants on the journal’s places of work.
Holy Souls marketed the cache of information on the market for 20 BTC (equal to roughly $340,000 on the time). The discharge of the total cache of stolen knowledge – assuming the hackers even have the information they declare to own – would primarily represent the mass doxing of the readership of a publication that has already been topic to extremist threats (2020) and lethal terror assaults (2015). Lest the allegedly stolen buyer knowledge be dismissed as fabricated, French paper of report Le Monde was capable of confirm “with a number of victims of this leak” the veracity of the pattern doc printed by Holy Souls.
After Holy Souls posted the pattern knowledge on YouTube and a number of hacker boards, the leak was amplified by a concerted operation throughout a number of social media platforms. This amplification effort made use of a selected set of affect ways, methods and procedures (TTPs) DTAC has witnessed earlier than in Iranian hack-and-leak affect operations.
The assault coincided with criticism of the cartoons from the Iranian authorities. On January 4, Iranian Overseas Minister Hossein Amir-Abdollahian tweeted: “The insulting and discourteous motion of the French publication […] in opposition to the non secular and political-spiritual authority won’t be […] left with out a response.” That very same day, the Iranian Overseas Ministry summoned the French Ambassador to Iran over Charlie Hebdo’s “insult.” On January 5, Iran shuttered the French Institute for Analysis in Iran in what the Iranian Overseas Ministry described as a “first step,” and stated it might “severely pursue the case and take the required measures.”
There are a number of parts of the assault that resemble earlier assaults carried out by Iranian nation-state actors together with:
- A hacktivist persona claiming credit score for the cyberattack
- Claims of a profitable web site defacement
- Leaking of personal knowledge on-line
- Using inauthentic social media “sockpuppet” personas – social media accounts utilizing fictitious or stolen identities to obfuscate the account’s actual proprietor for the aim of deception – claiming to be from the nation that the hack focused to advertise the cyberattack utilizing language with errors apparent to native audio system
- Impersonation of authoritative sources
- Contacting information media organizations
Whereas the attribution we’re making at this time relies on a bigger set of intelligence obtainable to Microsoft’s DTAC group, the sample seen right here is typical of Iranian state-sponsored operations. These patterns have additionally been recognized by the FBI’s October 2022 Non-public Business Notification (PIN) as being utilized by Iran-linked actors to run cyber-enabled affect operations.
The marketing campaign focusing on Charlie Hebdo made use of dozens of French-language sockpuppet accounts to amplify the marketing campaign and distribute antagonistic messaging. On January 4, the accounts, lots of which have low follower and following counts and have been not too long ago created, started posting criticisms of the Khamenei cartoons on Twitter. Crucially, earlier than there had been any substantial reporting on the purported cyberattack, these accounts posted equivalent screenshots of a defaced web site that included the French-language message: “Charlie Hebdo a été piraté” (“Charlie Hebdo was hacked”).
A couple of hours after the sockpuppets started tweeting, they have been joined by at the very least two social media accounts impersonating French authority figures – one imitating a tech govt and the opposite a Charlie Hebdo editor. These accounts – each created in December 2022 and with low follower counts – then started posting screenshots of the leaked Charlie Hebdo buyer knowledge from Holy Souls. The accounts have since been suspended by Twitter.

Using such sockpuppet accounts has been noticed in different Iran-linked operations together with an assault claimed by Atlas Group, a companion of Hackers of Savior, which was attributed by the FBI to Iran in 2022. Throughout the 2022 World Cup, Atlas Group claimed to have “penetrated into the infrasrtructures” [sic] and defaced an Israeli sports activities web site. On Twitter, Hebrew-language sockpuppet accounts and an impersonation of a sports activities reporter from a preferred Israeli information channel amplified the assault. The faux reporter account posted that after touring to Qatar, he had concluded that Israelis ought to “not journey to Arab nations.”
Together with screenshots of the leaked knowledge, the sockpuppet accounts posted taunting messages in French together with: “For me, the subsequent topic of Charlie’s cartoons must be French cybersecurity consultants.” These identical accounts have been additionally seen trying to spice up the information of the alleged hack by responding in tweets to publications and journalists, together with Jordanian day by day al-Dustour, Algeria’s Echorouk and Le Figaro reporter Georges Malbrunot. Different sockpuppet accounts claimed that Charlie Hebdo was engaged on behalf of the French authorities and stated that the latter was in search of to divert the general public’s consideration from labor stoppages.
In keeping with the FBI, one objective of Iranian affect operations is to “undermine public confidence within the safety of the sufferer’s community and knowledge, in addition to embarrass sufferer firms and focused nations.” Certainly, the messaging within the assault focusing on Charlie Hebdo resembles that of different Iran-linked campaigns, corresponding to these claimed by the Hackers of Savior, an Iran-affiliated persona that, in April 2022, claimed to infiltrate the cyber infrastructure of main Israeli databases and printed a message warning Israelis, “Don’t belief to your governmental facilities.”
No matter one might consider Charlie Hebdo’s editorial selections, the discharge of personally identifiable details about tens of 1000’s of its prospects constitutes a grave menace. This was underlined on January 10 in a warning of “revenge” in opposition to the publication from Iran’s Islamic Revolutionary Guard Corps commander Hossein Salami, who pointed to the instance of writer Salman Rushdie, who was stabbed in 2022. Added Salami, “Rushdie gained’t be coming again.”
The attribution we’re making at this time relies upon the DTAC Framework for Attribution.
Microsoft invests in monitoring and sharing data on nation-state affect operations in order that prospects and democracies world wide can defend themselves from assaults just like the one in opposition to Charlie Hebdo. We’ll proceed to launch intelligence like this once we see comparable operations from authorities and prison teams world wide.
Affect Operation Attribution Matrix[1]
[1] Tailored from Pamment, James, and Victoria Smith. “Attributing Info Affect Operations: Figuring out These Answerable for Malicious Behaviour On-line.” (2022). https://stratcomcoe.org/pdfjs/?file=/publications/obtain/Nato-Attributing-Info-Affect-Operations-DIGITAL-v4.pdf
