New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks

  /     /     /  
Publicated : 23/11/2024   Category : security


New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks


The Agrius groups focus appears to be Israel and the Middle East.



A likely Iran-backed advanced persistent threat (APT) group has been observed deploying data wiping malware and ransomware attacks against organizations in Israel since around November 2020.
Researchers from SentinelOne this week attributed the attacks to Agrius, a new threat actor that started off conducting cyber espionage activities but has since focused on more destructive operations.
In many instances, the threat actor has disguised data wiping attacks as ransomware attacks — victims were informed their data was stolen and encrypted even though it was wiped clean.
The operators behind the attacks intentionally masked their activity as a ransomware attack, an uncommon behavior for financially motivated groups, SentinelOne noted in a
blog
.
The Argius groups preferred tactic for initial access is to try and exploit known vulnerabilities in an organizations public-facing Web applications. One favorite appears to be
CVE-2018-13379
, a long-patched path traversal vulnerability in certain versions of Fortinets FortiOS operating system. SentinelOne says its researchers have observed the Agrius group widely exploiting the vulnerability in opportunistic attacks against Israeli targets.
In addition to the FortiOS flaw, Agrius has also been observed exploiting — or attempting to exploit — a variety of so-called n-day vulnerabilities, or flaws that are known and for which a patch is already available or in the works. Security analysts consider
n-day flaws
to be as dangerous, or even more so, than zero-day vulnerabilities because of the information that is publicly available around these flaws for both defenders and attackers. On some occasions, the Argius group has employed SQL injection attacks to try and gain an initial foothold on an organizations network. Most of the attacks that Agrius has launched have been from IPs belonging to popular VPN services such as ProtonVPN, SentinelOne said.
Once Agrius gains access to a network, the threat actor uploads a webshell and uses it to enable capabilities for lateral movement. In many instances, the webshells are variations of ASPXSpy, a script that allows attackers to gain control of a remote system. SentinelOne says it has observed the threat actor deploying IPsec Helper, a custom backdoor written in .NET, for stealing data or deploying additional malware on a compromised network.
Agrius espionage and disruptive activities go hand-in-hand, says J.A. Guerrero-Saade, principal threat researcher at SentinelOne. By the very nature of their attack cycle, espionage comes first – conducting lateral movement, scouting the network, placing backdoors, and deciding what data to exfiltrate.
Once the attackers have what they are after, they move into the disruption phase, Saade says. The use of wipers — or wiper attacks disguised as ransomware — puts Agrius into a relatively small subset of threat actors, he notes. Others include APT33, another Iran-linked threat group, Russia-based Sandworm, and North Koreas Lazarus Group.
For the moment, the Agrius groups focus appears to be the Middle East.
[But] there is nothing limiting their reach other than their intended tasking, Saade says. While we havent observed Agrius targeting U.S. organizations at this time, we wouldnt put it beyond them
Deadwood and Apostle Wipers
SentinelOne says it has observed the Agrius group using two types of wiper malware. One is Deadwood, aka Detbosit — a wiper linked to other Iranian groups, such as APT33 and APT34.
Some security vendors
have associated the malware to destructive attacks on organizations in the oil and gas sector in the Middle East and other regions. In addition to Deadwood, Agrius also uses a wiper not associated with any other group so far. SentinelOne is tracking that wiper as Apostle and believes it was likely developed by the same malware author as the one behind IPSec Helper. Since it was first developed, Apostle has been transformed into a full functioning ransomware tool
According to SentinelOne, Agrius attacks appear to be part of a broader Iranian government strategy of deploying threat groups to carry out destructive attacks against rival nations using ransomware as a cover. Another recent example is Project Signal, an effort linked to Irans Islamic Revolutionary Guard Corps. On the surface, Project Signal also is a financially motivated ransomware operation. On the other hand, its equally likely the group is using ransomware as a cover for more destructive attacks,
Flashpoint
noted recently.
Iran has a history of attempting to use cybercriminal TTPs to blend in with non-state-sponsored malicious cyber activity to avoid attribution and maintain plausible deniability, Flashpoint noted.
Saade says its hard to know for certain what Agrius groups specific intentions might be.
[But] the timing of this activity falls within a period of alleged tit-for-tat exchanges between Israel and Iran – including the claim that Israel wiped an Iranian port facility, while Israeli firms are, in turn, hit with ransomware of purported Iranian origin, he says.

Last News

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks