Attacks/Breaches

9/20/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Iranian Cyberspy Group Targets Aerospace, Energy Firms

APT33 focused on gathering information to bolster Iran's aviation industry and military decision-making capability, FireEye says.

An Iranian APT group with the ability to carry out destructive attacks has been waging a sophisticated cyber espionage campaign against organizations in the aerospace and energy sectors in the US, Saudi Arabia, and South Korea.

APT33 has been active since at least 2013 and appears focused on gathering information that could help Iran bolster its capabilities in the aviation and petrochemical industries, FireEye said in an advisory Wednesday.

The threat group's particular emphasis on organizations with aviation-related partnerships with Saudi Arabia also suggests that APT33 is gathering information to bolster the Iranian government's strategic and military decision making capabilities with regard to Saudi Arabia, the security vendor said.

FireEye security analyst Jacqueline O'Leary says the security vendor has evidence showing that at least six organizations were targeted between May 2016 and August 2017. The targets included a US aerospace company, a Saudi Arabian business conglomerate with interests in the aviation sector, and a South Korean company with stakes in petrochemicals and oil.

It is likely that more organizations were targeted based on additional infrastructure that FireEye identified and attributed to APT33, she says.

In some cases, FireEye observed APT33 related spearphishing activity result in compromise of the target organization. In other cases, the company observed APT33 conduct spearphishing on targets, although it has no evidence whether those campaigns resulted in a compromise.

So far, APT33 does not appear to have carried out any destructive attacks and appears focused only on cyber espionage activity.

But somewhat ominously, one of the droppers used by APT33 — dubbed DROPSHOT — has links to SHAPESHIFT, a destructive Shamoon-like disk-, file-and configuration-erasing tool that has been used in attacks against Saudi Arabian targets. Shamoon was malware that was used to brick some 35,000 Windows PCs at Saudi Arabian oil giant Saudi Aramco about five years ago.

FireEye said it has not seen APT33 actually use SHAPESHIFT to carry out any destructive attacks.  At the same time, APT33 is the only group known to be using DROPSHOT, the company cautioned.

Like many other threat groups, APT33 has been using spearphising to try and get an initial foothold in target networks. Its spearphising emails have contained recruitment-themed lures with links to malicious HTML application files with job descriptions and links to legitimate job postings on legitimate employment websites.

Many of the phishing emails have appeared legitimate, and referenced specific job opportunities and salaries and have even included the spoofed company's Equal Opportunity Employer disclosure, FireEye said. However, if a user opens one of these documents, it would silently drop an APT33 custom backdoor on the victim's machine.

As part of its spear phishing campaign, APT33 also registered multiple websites that masqueraded as domains for organizations such as Boeing, Alsalam Aircraft Company, and Northrop Grumman Aviation Arabia.

There are multiple pointers to APT33's links to Iran and to the country's government. Code in the malware used by the group contains artifacts written in Farsi, Iran's official language, FireEye said. Many of the publicly available tools and backdoors that APT33 has used in its campaign so far are available on Iranian threat actor websites. The group's targeting of organizations suggests it is aligned with Iranian nation-state interests and the timing of its activities coincides with Iran's workweek and working hours, the security vendor noted.

Code in one of the malware samples that the group has used indicates that it may have been developed and deployed by an individual who was previously employed by the government of Iran, FireEye said.

"APT33 shares some similarities with other nation-state groups in that they rely on publicly available tools with some use of custom malware development, potentially suggesting the threat actors are a part of a greater capability," says Josiah Kimble, a security analyst with FireEye.

"Like most suspected state sponsored actors, APT33's targeting of organizations, most closely aligns with nation-state interests," he says.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3965
PUBLISHED: 2019-03-23
Hospira Symbiq Infusion System 3.13 and earlier allows remote authenticated users to trigger "unanticipated operations" by leveraging "elevated privileges" for an unspecified call to an incorrectly exposed function.
CVE-2016-10743
PUBLISHED: 2019-03-23
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2019-9947
PUBLISHED: 2019-03-23
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) follo...
CVE-2019-9948
PUBLISHED: 2019-03-23
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...