Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/25/2018
04:28 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Iranian Hacker Group Waging Widespread Espionage Campaign in Middle East

Unlike other threat actors that have a narrow set of targets, Leafminer has over 800 organizations in its sights, Symantec says.

Leafminer, a threat actor that appears to be operating out of Iran, is conducting a wide-ranging cyber espionage campaign against organizations in the Middle East using a mix of publicly available tools and custom malware.

While the group's technical capabilities are average at best in comparison to other advanced persistent threat (APT) actors, its goals seem far more ambitious, according to Symantec, which has been studying the group.

The security vendor's analysis of Leafminer's activities shows the group has run targeted vulnerability scans against as many as 809 organizations across multiple industries in Saudi Arabia, United Arab Emirates, Egypt, Kuwait, Israel, and other countries in the Middle East.

The group's major focus areas appear to be organizations in the financial, government, and petrochemical sectors, with half of its targest in those industries. Other targets include shipping and transportation, food services, utilities, and construction. Leafminer mostly has gone after email data, files, and database servers.

"[Leafminer's] ambitious goal of targeting at least 800 different organizations across the Middle East is what sets them apart," from other threat actors, says Vikram Thakur, technical director at Symantec. Most APT campaigns are typically focused on a far smaller set of entities with shared geopolitical interests.  

"As a group, Leafminer highlights the need for organizations to better protect their public-facing network infrastructure against known vulnerabilities and attack tools," he says. Thakur estimates that Leafminer has conducted targeted attacks against dozens of organizations from the list of over 800 organizations against which it has run vulnerability scans.

Leafminer is the latest example of the increased cyber activity from Iran in recent years. Earlier this year, security vendor FireEye's Mandiant unit reported a major surge in nation-state sponsored threat activity in the country in 2017. The vendor described Iran as the next China based on the extent of state-backed threat activity in the country last year.

Just this week, Palo Alto Networks issued a report on the OilRig Group, a previously known threat actor that is also based in Iran. Researchers spotted multiple attacks by OilRig between May and June 2018 directed at a technology services provider and a government organization. The attacks delivered a backdoor designed to help the threat actors steal data from the targeted victims.

Leafminer Living Off the Land

At a high-level, Leafminer's tactics, techniques and procedures (TTP) are somewhat similar to the so-called "living-off-the land" approach that many threat actors have begun adopting, Symantec said. In addition to custom tools, the threat actor has shown a proclivity for using tools and techniques that are publicly available or have been used by others.

For instance, one of the tools that Leafminer has been using for collecting credentials is a rebranded version of the well-known Mimikatz post-exploitation tool. The method the attackers have adopted to deploy Mimikatz on compromised systems similarly is a technique known as Process Doppelganging that security vendor enSilo demonstrated at Black Hat Europe last year.

Leafminer has also taken advantage of the NSA's Fuzzbunch toolkit that the Shadow Brokers group leaked last year, to develop exploit payload for delivering custom malware targeted at vulnerabilities in Windows SMB server, Symantec said.

Leafminer's malware toolkit includes at least two custom malware products — a backdoor called Sorgu for enabling remote access to a compromised system and Imecab, a Trojan for establishing a persistent access account on an infected system.

The hacking team has been mainly using three techniques to gain initial access to a targeted network: watering hole attacks via compromised Web servers; scans for vulnerabilities in network services; and dictionary attacks against network service logins. In keeping with the group's habit of borrowing techniques and tactics used by others, the approach that Leafminer has been using in its watering hole attacks are similar to that employed by the Dragonfly APT group, according to Symantec.

The tactics employed by threat groups like Leafminer highlight the need for organizations to pay attention not just to new and emerging threats but to previously known ones as well.

"Enterprises should take note of the fact that a foreign adversary is relying primarily on existing vulnerabilities and publicly available tools to target hundreds of organizations in multiple verticals, with a degree of success," Thakur says.

In many cases, organizations can mitigate most of their exposure to such threats simply by applying known security practices, such as keeping systems updated and properly patched where possible, Thakur says.

Related Content:

 

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
To Narrow the Cyber Skills Gap with Attackers, Cut the Red Tape
James Hadley, CEO at Immersive Labs,  5/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Could you pass the hash, I really have to use the bathroom!
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9892
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbit...
CVE-2019-10066
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6, Community Edition 6.0.x through 6.0.17, and OTRSAppointmentCalendar 5.0.x through 5.0.12. An attacker who is logged into OTRS as an agent with appropriate permissions may create a carefully crafted calendar appointment i...
CVE-2019-10067
PUBLISHED: 2019-05-22
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context...
CVE-2019-6513
PUBLISHED: 2019-05-21
An issue was discovered in WSO2 API Manager 2.6.0. It is possible for a logged-in user to upload, as API documentation, any type of file by changing the extension to an allowed one.
CVE-2019-12270
PUBLISHED: 2019-05-21
OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 configure excessive permissions by default on Windows. During installation, a displaylistcache file share is created on the Windows server with full read and write permissions for the Everyone group at both the NTFS and Share levels. The ...