Yesterday @washingtonpost reported that Iran was behind a recent online hit list of officials who have refuted Trump's election fraud, according to the FBI.
One detail stands out. https://www.washingtonpost.com/national-security/iran-election-fraud-violence/2020/12/22/4a28e9ba-44a8-11eb-a277-49a6d1f9dff1_story.html?tid=ss_tw
One detail stands out. https://www.washingtonpost.com/national-security/iran-election-fraud-violence/2020/12/22/4a28e9ba-44a8-11eb-a277-49a6d1f9dff1_story.html?tid=ss_tw
The hit list was published on a website called Enemies of the People. One of the websites associated with it was registered through MonoVM. https://twitter.com/kyleehmke/status/1337415369657610242
This is not the first time MonoVM is spotted in an Iranian information operation.
In a paper yet to be published, we investigate MonoVM's connection to one of the earliest Iran-linked international info ops from mid 2010s (more details on this later).
cc @RidT
In a paper yet to be published, we investigate MonoVM's connection to one of the earliest Iran-linked international info ops from mid 2010s (more details on this later).
cc @RidT
MonoVM is a web hosting company with a questionable past.
It has previously provided infrastructure to Russian hacking ops, accepts crypto currencies for payment, and has been intermittently linked to Iranian individuals.
No surprise that it's resurfaced in this latest event.
It has previously provided infrastructure to Russian hacking ops, accepts crypto currencies for payment, and has been intermittently linked to Iranian individuals.
No surprise that it's resurfaced in this latest event.
More on the Enemies of the People website: https://twitter.com/arawnsley/status/1341548820426072064
and technical details: https://twitter.com/jfslowik/status/1336905268379045888