Iranian Cyber Espionage Group CopyKittens Successful, But Not Skilled

  /     /     /  
Publicated : 22/11/2024   Category : security


Iranian Cyber Espionage Group CopyKittens Successful, But Not Skilled


Despite being only moderately skilled, CopyKittens has exfiltrated large volumes of data since at least 2013.



It doesnt always take a highly skilled adversary to create major problems for organizations. Sometimes, unsophisticated but persistent threat actors can be just as effective at it.
One example is CopyKittens, a cyber espionage group with links to Iran that has been operating since at least 2013. The group,
profiled
in a report this week from Israel-based ClearSky Cyber Security and Trend Micro, so far has displayed little of the sophistication associated with many modern state-sponsored cyber espionage operations.
Yet, it has successfully managed to exfiltrate large volumes of data from targeted military and government organizations, academic institutions, municipal authorities and IT companies in Israel, Turkey, Saudi Arabia, Jordan, and the United States.
In the years it has been around, the group has used dozens of domains, many of them impersonating companies such as Microsoft, Google, Amazon, Facebook, and Oracle, for malware delivery, hosting malicious sites, and for command-and-control.
Despite its apparently limited resources, the group has also managed to breach several online news media outlets and general websites, which were then used in watering hole attacks.
They are in the lower bar of cyber espionage groups, says Eyal Sela, head of threat intelligence at ClearSky. They dont use 0-days and their self-developed tools are inferior in many aspects to those of others.
The groups tactics, techniques and procedures (TTPs) in general have been unremarkable and have included common approaches such as malicious email attachments, phishing, web application attacks, and, starting only late 2016, a few watering hole exploits.
Their continued success highlights how a persistent but relatively unadvanced threat actor can still succeed and reach their objectives, Sela says. Organizations in sectors and countries of interest to Iran are at risk of being targeted, and should make it a point to understand the groups TTPs he cautions.
For example, CopyKittens has a tendency to try and breach an organizations network via weaknesses in the IT supply chain. It also has a tendency to do a lot of DNS-based data exfiltration and command-and-control so organizations that believe they could be targets should monitor their DNS infrastructure. Similarly, social media channels—such as fake Facebook profiles—have often been used to get close to and breach target organizations, Sela said.
This weeks report on CopyKittens marks the third time that ClearSky has published an analysis of the threat group. The new report includes some fresh details on the groups activities, details on newly developed malware and a list of tens of new domains that are currently up and running and being used by CopyKittens for malware delivery and attacks.
Among the newly developed malware samples described in the Clear Sky and Trend Micro report this week is a .NET backdoor that provides attackers with a way to download and execute malware on a target system, and a tool that enables lateral movement in a compromised network using stolen credentials. AV tools in VirusTotal did not detect several of the new tools developed by the group.
Many of the tools that the group has used to exploit networks have legitimate purposes. For example, CopyKittens often has used a trial version of a commercial software tool called Cobalt Strike to search for and penetrate vulnerabilities in target networks. Other similar tools that it has used include Metasploit, Mimikatz, and software like Havij for detecting vulnerable web servers.
It seems that their objective is to gather as much information and data from target organizations as possible, Sela says. They indiscriminately exfiltrate large amounts of documents, spreadsheets, files containing personal data, configuration files, and, databases.
The sheer scope and duration of the campaign suggests that CopyKittens is a nation-state sponsored group, he says. The fact that the threat actor does not appear motivated by financial gain, and its multiple ties to Iran and Iranian interests suggest strong nation-state support, he added.
Related content:
Iranian Hackers Believed Behind Massive Attacks on Israeli Targets
Iran Intensifies Its Cyberattack Activity
Saudi Arabia Issues Alert On Shamoon 2
8 Hot Hacking Tools to Come out of Black Hat USA
 

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Iranian Cyber Espionage Group CopyKittens Successful, But Not Skilled