Fxmsp hacking victims identified.
Symantec, McAfee, and Trend Micro are said to be the security firms allegedly breached by the Fxmsp gang. BleepingComputer identified the victims from unredacted Fxmsp chat logs received from Advanced Intelligence. Trend Micro said data from a test lab had been accessed by unauthorized parties, but that no source code or customer information were compromised. Symantec denied being affected, and McAfee says it's investigating. There's no further confirmation of whether the breach is as serious a matter as some have held it to be.
New York-based Advanced Intelligence's youth (the company was founded only in March) elicited skepticism over its report, but the company stands by its work (Computer Business Review).
Disinformation from Tehran: Endless Mayfly.
The University of Toronto's Citizen Lab attributed a multi-year, multilingual influence operation to Iran, with "moderate confidence." The narratives pushed were unsurprising, directed against the United States, Israel, and Saudi Arabia. Citizen Lab called the campaign "Endless Mayfly" because its fake news was ephemeral and soon gone. Endless Mayfly's technique was simple but proven: typosquatting, with fairly convincing landing pages mimicking real publications, including Bloomberg, The Guardian, The Atlantic, and Politico. Thus they squatted at "theatlatnic" for the Atlantic (Citizen Lab). But note the persistence and the linguistic skill, and recall that Tehran’s hackers also began with amateurish-looking techniques, but they learned quickly and got better fast. There's every reason to think that Iran will improve its information operations game as well.