Irans hackers are stepping up their game, according to a new report from security researchers at FireEye. Earlier this year, an Iranian hacking group called Ajax Security Team targeted US defense contractors at an IEEE aerospace convention, using spear phishing emails to plant keylogging malware on unwitting victims computers. If the contractors took the bait, installing the phony \proxy\ program that was actually Ajax malware, the program would log keystrokes, take periodic screenshots, and automatically extract logins and passwords from browsers and chat programs. Ajax also targeted Iranians trying to bypass the countrys oppressive web controls, distributing similar malware bundled with VPN and proxy software like Psiphon and Ultrasurf. As FireEye puts it, \there is a considerable grey area between the cyber espionage capabilities of Iran’s hacker groups and any direct Iranian government or military involvement.\