Iranian Cyberspy Group Targets Aerospace, Energy Firms

  /     /     /  
Publicated : 22/11/2024   Category : security


Iranian Cyberspy Group Targets Aerospace, Energy Firms


APT33 focused on gathering information to bolster Irans aviation industry and military decision-making capability, FireEye says.



An Iranian APT group with the ability to carry out destructive attacks has been waging a sophisticated cyber espionage campaign against organizations in the aerospace and energy sectors in the US, Saudi Arabia, and South Korea.
APT33 has been active since at least 2013 and appears focused on gathering information that could help Iran bolster its capabilities in the aviation and petrochemical industries, FireEye said in an
advisory
Wednesday.
The threat groups particular emphasis on organizations with aviation-related partnerships with Saudi Arabia also suggests that APT33 is gathering information to bolster the Iranian governments strategic and military decision making capabilities with regard to Saudi Arabia, the security vendor said.
FireEye security analyst Jacqueline OLeary says the security vendor has evidence showing that at least six organizations were targeted between May 2016 and August 2017. The targets included a US aerospace company, a Saudi Arabian business conglomerate with interests in the aviation sector, and a South Korean company with stakes in petrochemicals and oil.
It is likely that more organizations were targeted based on additional infrastructure that FireEye identified and attributed to APT33, she says.
In some cases, FireEye observed APT33 related spearphishing activity result in compromise of the target organization. In other cases, the company observed APT33 conduct spearphishing on targets, although it has no evidence whether those campaigns resulted in a compromise.
So far, APT33 does not appear to have carried out any destructive attacks and appears focused only on cyber espionage activity.
But somewhat ominously, one of the droppers used by APT33 — dubbed DROPSHOT — has links to SHAPESHIFT, a destructive Shamoon-like disk-, file-and configuration-erasing tool that has been used in attacks against Saudi Arabian targets.
Shamoon
was malware that was used to brick some 35,000 Windows PCs at Saudi Arabian oil giant Saudi Aramco about five years ago.
FireEye said it has not seen APT33 actually use SHAPESHIFT to carry out any destructive attacks.  At the same time, APT33 is the only group known to be using DROPSHOT, the company cautioned.
Like many other threat groups, APT33 has been using spearphising to try and get an initial foothold in target networks. Its spearphising emails have contained recruitment-themed lures with links to malicious HTML application files with job descriptions and links to legitimate job postings on legitimate employment websites.
Many of the phishing emails have appeared legitimate, and referenced specific job opportunities and salaries and have even included the spoofed companys Equal Opportunity Employer disclosure, FireEye said. However, if a user opens one of these documents, it would silently drop an APT33 custom backdoor on the victims machine.
As part of its spear phishing campaign, APT33 also registered multiple websites that masqueraded as domains for organizations such as Boeing, Alsalam Aircraft Company, and Northrop Grumman Aviation Arabia.
There are multiple pointers to APT33s links to Iran and to the countrys government. Code in the malware used by the group contains artifacts written in Farsi, Irans official language, FireEye said. Many of the publicly available tools and backdoors that APT33 has used in its campaign so far are available on Iranian threat actor websites. The groups targeting of organizations suggests it is aligned with Iranian nation-state interests and the timing of its activities coincides with Irans workweek and working hours, the security vendor noted.
Code in one of the malware samples that the group has used indicates that it may have been developed and deployed by an individual who was previously employed by the government of Iran, FireEye said.
APT33 shares some similarities with other nation-state groups in that they rely on publicly available tools with some use of custom malware development, potentially suggesting the threat actors are a part of a greater capability, says Josiah Kimble, a security analyst with FireEye.
Like most suspected state sponsored actors, APT33s targeting of organizations, most closely aligns with nation-state interests, he says.
Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity
agenda here
.
Related Content:
Why Iran Hacks
Iranian Groups Conducting Sophisticated Surveillance On Middle Eastern Targets
Inside The Aftermath Of The Saudi Aramco Breach
7 Common Reasons Companies Get Hacked
 

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Iranian Cyberspy Group Targets Aerospace, Energy Firms