Anatomy Of The New Iranian APT

  /     /     /  
Publicated : 22/11/2024   Category : security


Anatomy Of The New Iranian APT


Former Iranian hacktivist operation evolves into cyber espionage with Operation Saffron Rose.



A newly unearthed attack campaign out of Iran targeting US defense contractors and Iranian dissidents confirms that Iran has expanded its cyberoffense capability and strategy far beyond its signature politically themed website defacements -- into a full-blown cyber espionage operation.
The so-called Operation Saffron Rose series of attacks detailed today by FireEye demonstrates a more mature and rapidly evolving Iranian threat. The group behind the attacks, the Ajax Security Team, has moved from a defacement-happy operation in the name of political activism to a cyber espionage operation that in its own right has all the earmarks of an advanced persistent threat (APT), according to FireEye.
The Iranian Ajax Security Team, which last defaced a website last December, uses spearphishing attacks that include one purportedly from the IEEEs aerospace conference, as well as spoofed Microsoft Outlook Web Access and VPN login pages aimed at stealing user credentials from defense contractors and other members of the defense industry.
The group is also targeting Iranian dissidents within the nation as well as in other countries, using legitimate anti-censorship software tools as a lure. They laced two popular such tools, Psiphon and Ultrasurf, with malware, and FireEye found information on some 77 resulting victims on one Saffron Rose command-and-control server. FireEye says the Ajax Security Team is likely backed by the Iranian government, and its founders appear to be two members -- HUrr!c4nE! and Cair3x -- who had been involved in the website defacement operations.
The Ajax Security Team today was made up of somewhere between five and 10 individuals, says Darien Kindlund, director of threat research at FireEye. And its not the only such cyber espionage group in Iran: We believe there are others based in Iran, Kindlund says.
But Irans APT operation is not quite as sophisticated as that of China. The Ajax Security Team operates more as a jack of all trades, Kindlund says. In China, you have one group focused on going after aerospace or [defense], one group focusing on going after dissident activity, and another selling this [information] to third parties, he says. But... Ajax Security Team is doing all three.
Thats more a reflection of Iran not having quite as mature a cyberspying operation as China, he says. What we are likely to see over time [is] these groups will become more specialized as they proliferate.
The gang employs private malware tools, but stops short of using exploit code to infect it victims, instead relying on the user to perform certain tasks such as downloading an executable or entering his or her credentials. With the IEEE aerospace conference spearphish, for example, the victim had to log in to register for the conference. Its not like a drive-by exploit while visiting a web page. The victim would have to go through a number of hoops, Kindlund says.
Chinese APTs, meanwhile, automate that process by dropping exploits on the victim without his or her having to take any actions to run the executable file; just downloading a weaponized PDF does the trick for example, according to Kindlund.
Those who were infected [by Saffron Rose] had to jump through a lot of hoops to get there, and that makes it harder for Irans team to infect users, he says.
FireEye was unable to determine if Ajax Security Team is part of a bigger operation, or is a separate group. Members of the gang may be also be moonlighting in cybercrime, the report says.
It [Iran] has certainly evolved. The methods they are using now to conduct their operations are in many ways equivalent to that of a nation-state sponsored group, with the purpose and objective of some sort of espionage activity, Kindlund says.
The gang developed its own custom malware, and encrypts stolen data as it siphons it from its victims. But even its encryption approach is a bit rudimentary: Theyre using symmetrical encryption to do all the exfiltration, where the same key is used to encrypt and decrypt data, he says. The key is hardcoded into all copies of the malware... It seems they dont have a strong grasp of encryption.
FireEye found no evidence of the gangs connection to the Shamoon
data-destruction attacks
two years ago that appear to have been behind attacks on Saudi Aramco and Qatars RasGas.
Shamoon, which security experts say came out of attackers in Iran, was the first big departure for the nations hackers from wreaking havoc with a defacement or DDoS, to full-blown annihilation of information. Shamoon has been unofficially linked to the massive breach at oil giant Saudi Aramco that took down 30,000 of its workstations by deleting and wiping files and overwriting the victims master boot record.
They are improving their capabilities, says Jaime Blasco, director of AlienVault Labs, of the Iranian hackers.
Blasco says he wouldnt be surprised if there was some relation between those attacks and the Ajax Security Team. I can imagine that the Iranian hacker community is not that big, so they are probably related in some way, he says.
We dont have enough evidence to tie them to Shamoon, FireEyes Kindlund says. But like Blasco, he says he wouldnt be shocked to find there was some connection.
[Old-school but painful data-destroying malware attacks in the Middle East a red flag to revisit incident response, recovery. Read The Data-Annihilation Attack Is Back,
here
.]
The Ajax Security Team has roots in Iranian hacker forums, including Ashiyyane and Shabgard.
The full FireEye report is available
here
.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Anatomy Of The New Iranian APT