Skip to content

Project Ainita

Anonymity, security and online freedom

  • About project ainita
  • Taya App
  • Contact

Profiting from the Pandemic: Moderating COVID-19 Lockdown Protest, Scam, and Health Disinformation Websites

Posted on December 3, 2020 - December 3, 2020 by ProjectAinita

Working with the project on computational propaganda at Oxford Internet Institute, have resulted in publishing a paper:

Findings from new study from Yung Au, @pnhoward @oiioxford and @ProjectAinita show firms up and down the technology stack can profit from contentious COVID-19 websites, even after steps such as ad removals or content moderation.https://t.co/BTw0TedoIs 1/3

— Oxford Internet Institute (@oiioxford) December 2, 2020

You can see and download the paper from this link.

New website Theme

Posted on December 5, 2019 - December 6, 2019 by ProjectAinita

Well, ProjectAinita has a new theme for the website. We think this is a minimalistic design, help viewer focus on content.

خب، وقت آن رسیده که برای وب سایت یک پوسته جدید داشته باشیم. این پوسته با طراحی حداقلی، اجازه خواهد داد بیننده بیشتر بر روی مطالب تمرکز کند

Announcing TAYA Secure SMS App

Posted on July 10, 2019 - October 24, 2019 by ProjectAinita

In past year or two, we have witnessed a major move by some government back hackers in the MENA region, to hack activists and journalists email, social media and Internet messenger accounts.

Countering these moves, Project Ainita is announcing the TAYA APP, which is a secure SMS APP for people who need it. Please read here about our latest effort in cyber security for our users, and contact us if you needed more information or if you wanted to apply to get access to this platform.

معرفی اپ تایا

طی چند سال اخیر، ما شاهد فعالیت‌های زیادی در منطقه خاورمیانه، از طرف هکرهای دولتی، برای هک کردن ایمیل‌ها، حساب‌های کاربری پیام‌رسان‌ها و شبکه‌های اجتماعی روزنامه‌نگاران و فعالین بودیم. برای مقابله با این تهدیدها، پروژه آینیتا، اپ تایا را معرفی می‌کند. اپ تایا به شما کمک می‌کند تا با داشتن یک شماره اختصاصی و دریافت اس‌ام‌اس‌های آن، امنیت حساب‌های کاربری خود را افزایش دهید. در این لینک می‌توانید در مورد آخرین تلاش‌های ما در راستای امنیت اطلاعات بخوانید و برای کسب اطلاعات بیشتر
و دسترسی به اپ تایا با ما تماس بگیرید

More evidence of using Iranian mobile infrastructure by IR Gov hackers

Posted on November 28, 2018 - December 5, 2018 by ProjectAinita

Today there has been a new interesting development. A number of Iranians reported they are being informed by Google that “Government-backed attackers may be trying to steal your password”. Below screenshot is sent to me by a friend reporting the same from Canada:

This is a familiar alert for us, but what is interesting is the possible attack vector: users inside Iran aside, the users who got this alert outside the country all had Iranian mobile numbers assigned in their Google accounts as backup / recovery number.

This means as suspected earlier, SMS interception in Iranian mobile operators is being used for resetting the password of Iranian users.

We recommend using TOTP using your mobile, using U2F keys, and not using any Iranian mobile phone number as backup number in your Google profile.

Iranian Gov Hackers, intercept 2FA via SMS to access activist accounts

Posted on October 20, 2018 - December 5, 2019 by ProjectAinita

Iranian government hackers in the recent months, repeatedly managed to hack activists / journalist email and social media accounts protected by Two Factor Authentication. The first major incident reported in the media was Imam Ali charity in Iran, although this was not the first by any means. here are their Tweets (in Persian), informing Gmail, Telegram, LinkedIn, and Facebook accounts of a large number of their colleagues in the organization has been hacked:

اطلاعیه شماره ۲

حمله سایبری سازمان دهی شده از طریق پیامک‌های مخابرات

در صبح روز پنجشنبه ۶ اردیبهشت ۹۷، حمله سایبری به اکانتهای تلگرام، جی‌میل، فیسبوک و لینکدین تعداد زیادی از اعضای جمعیت امام علی شکل گرفت.

— جمعیت امام علی (@imamalisociety) April 26, 2018

And in late September, a lawyer has tweeted the same attacks on her Gmail and Telegram accounts, and also many other woman’s rights activists in Iran:

امروز صبح(ساعت 6.30) حساب تلگرام و حیمیل من هک شد( به رغم دو مرحله‌ای بودن)
تلگرامم رو از نو ساختم و همین الان ایمیلم رو پس گرفتم. کدوم نهاد و مرجع و با چه مجوزی ساعت 6.30 به اطلاعات شخصی من دست پیدا کرده؟
پ.ن: تلاش برای هک عده‌ای از فعالین زنان امروز گسترده بوده، #اطلاع‌رسانی https://t.co/xQ1ANlZOBC

— samin cheraghi (@samincheraghi) September 26, 2018

How this possibly happens:

What happens is Iranian security forces have successfully phished or otherwise gained access to a target’s Gmail password. Then they send a 2FA request, usually in very early mornings when target is sleep, using the victim’s phone number. As they have full access to the country’s mobile operator networks, they intercept the 6 digit code sent by Google:

  • 1: Hacker choose Password Recovery
  • 2: Hacker sees OTP, and clicks on “try another way”
  • 3: Hacker enters the mobile number of the Victim and request a code via SMS
  • 4: Hacker enters the victim’s mobile number, intercept the SMS on operator, and enter the 6 digit code to gain access to the account

In many cases, they don’t even need the password, as they can also request a password reset request (Again!) by entering the phone number in Gmail.

Once they have access to the email of the victim, they start resetting passwords of their social media accounts, i.e. Twitter, Facebook, Linkedin, etc.

Using the same technique, for instant messengers:

As most instant messenger Apps, i.e. Telegram, Whatsapp and others use SMS to authenticate their users, once attacker can intercept the victims SMS, they can simply authenticate a new session for their instant messengers and read their messages. Very few IMs like Telegram, actually offer a second factor for authentication – in case of telegram, a password – but many do not have this function activated, as it is not required by the platform.

Workarounds:

Iranian users are advised to use offline methods only, i.e TOTP for their second factor authentication, and delete their phone numbers from their google records so it can not be used for password recovery or 2FA fallback. As for the instant messengers, they should activate the 2FA for the platforms that support this, and quit the ones they don’t support 2FA.

Project Ainita will be at Rightscon 2018

Posted on March 30, 2018 by ProjectAinita

Project Ainita will participate at RightsCon 2018, thanks to our friends in AccessNow.

Looking forward to meet our friends and colleagues, whom we share this goal and passion of fighting online censorship and surveillance.

Blog updates

Posted on March 30, 2018 by ProjectAinita

Dear Project Ainita users;

It has been some time! Our blog needs some serious posts and updates for you. On behalf of our small team and as project director, I apologize to you. 2017 was an amazing ride, and it came with all sorts of challenges, many new projects, and ended up in a massive sociopolitical unrest in Iran. All of which kept us so busy, blog updates took a back seat.

But you will see a few posts in the coming days, reporting back to you on some stuff we have been busy with, projects like major improvement of our free VPN network, our research work, our response to the late December events in Iran, and other stuff we want to share with you.

دوستان و همراهان گرامی پروژه آی نیتا:

مدت زمان زیادی بود که وبلاگ پروژه نیاز به چند پست خیلی جدی و به روز رسانی برای شما عزیزان داشت. از طرف تیم کوچک پروژه آی نیتا و به عنوان مدیر پروژه، من از شما عذرخواهی میکنم. سال ۲۰۱۷ سال بسیار پرباری بود، و با چالش های زیادی دست و پنجه نرم کردیم از جمله درگیر شدن در تعداد زیادی پروژه های جدید و در نهایت و در پایان سال هم شلوغی های اجتماعی – سیاسی ایران، که همه آنچنان ما رو مشغول نگه داشتند که به روز رسانی این وبلاگ به عقب افتاد.

ولی ظرف چند روز اینده تعدادی پست جدید در راه هستند، که به شما دوستان گزارش های کوتاهی از پروژه هایی که در آن درگیر بودیم خواهیم داد.  به عنوان مثال بهینه سازی اساسی شبکه وی پی ان رایگان ما، کارهای تحقیقاتی که انجام شده، واکنش به مشکلات پیش آمده شبکه در اعتراض های دیماه و بقیه مواردی که ما رو به خودشون سرگرم نگه داشتند.

Project Ainita team at IFF 2017

Posted on March 5, 2017 by ProjectAinita

Like the years before,Project Ainita team is gonna be at the Internet Freedom Festival in Valencia, Spain. If you are participating, tweet us and lets meet. If you are not, just follow @ProjectAinita and #IFF2017 on twitter for updates. 🙂

New Service for Africa is launched

Posted on September 5, 2016 by ProjectAinita

new server settings announcement Africa

Dear friends;

Project Ainita is proud to expand and launch our free services for East Africa. For more information on this new service and connection guides, please visit our service page for East Africa.

Ownership in Iran’s Telecom sector

Posted on September 3, 2016 by ProjectAinita

Tehran based news website eghtesadonline has published a very interesting infograph, showing ownership of major telecom operators in Iran. All of them are one way or another controlled by the government, and 3/4th of them are controlled by the organizations under the supreme leader, Ayatollah Khameneie.

وب سایت خبری اقتصاد آنلاین جدولی جالب منتشر کرده است که نحوه مالکیت شرکتهای مخابراتی مهم ایران را به تصویر میکشد. همه این شرکتها مستقیم یا غیر مستقیم دولتی هستند و سه چهارم این شرکتها نیز مالکیتشان به سازمان ها و نهاد های زیر نظر رهبر ایران, آیت الله خامنه ای برمیگردد

 

IR_Telecom_Ownership_2016-09-03

Posts navigation

Older posts

Archive

Proudly powered by WordPress | Theme: micro, developed by DevriX.