Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/20/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Iranian Cyberspy Group Targets Aerospace, Energy Firms

APT33 focused on gathering information to bolster Iran's aviation industry and military decision-making capability, FireEye says.

An Iranian APT group with the ability to carry out destructive attacks has been waging a sophisticated cyber espionage campaign against organizations in the aerospace and energy sectors in the US, Saudi Arabia, and South Korea.

APT33 has been active since at least 2013 and appears focused on gathering information that could help Iran bolster its capabilities in the aviation and petrochemical industries, FireEye said in an advisory Wednesday.

The threat group's particular emphasis on organizations with aviation-related partnerships with Saudi Arabia also suggests that APT33 is gathering information to bolster the Iranian government's strategic and military decision making capabilities with regard to Saudi Arabia, the security vendor said.

FireEye security analyst Jacqueline O'Leary says the security vendor has evidence showing that at least six organizations were targeted between May 2016 and August 2017. The targets included a US aerospace company, a Saudi Arabian business conglomerate with interests in the aviation sector, and a South Korean company with stakes in petrochemicals and oil.

It is likely that more organizations were targeted based on additional infrastructure that FireEye identified and attributed to APT33, she says.

In some cases, FireEye observed APT33 related spearphishing activity result in compromise of the target organization. In other cases, the company observed APT33 conduct spearphishing on targets, although it has no evidence whether those campaigns resulted in a compromise.

So far, APT33 does not appear to have carried out any destructive attacks and appears focused only on cyber espionage activity.

But somewhat ominously, one of the droppers used by APT33 — dubbed DROPSHOT — has links to SHAPESHIFT, a destructive Shamoon-like disk-, file-and configuration-erasing tool that has been used in attacks against Saudi Arabian targets. Shamoon was malware that was used to brick some 35,000 Windows PCs at Saudi Arabian oil giant Saudi Aramco about five years ago.

FireEye said it has not seen APT33 actually use SHAPESHIFT to carry out any destructive attacks.  At the same time, APT33 is the only group known to be using DROPSHOT, the company cautioned.

Like many other threat groups, APT33 has been using spearphising to try and get an initial foothold in target networks. Its spearphising emails have contained recruitment-themed lures with links to malicious HTML application files with job descriptions and links to legitimate job postings on legitimate employment websites.

Many of the phishing emails have appeared legitimate, and referenced specific job opportunities and salaries and have even included the spoofed company's Equal Opportunity Employer disclosure, FireEye said. However, if a user opens one of these documents, it would silently drop an APT33 custom backdoor on the victim's machine.

As part of its spear phishing campaign, APT33 also registered multiple websites that masqueraded as domains for organizations such as Boeing, Alsalam Aircraft Company, and Northrop Grumman Aviation Arabia.

There are multiple pointers to APT33's links to Iran and to the country's government. Code in the malware used by the group contains artifacts written in Farsi, Iran's official language, FireEye said. Many of the publicly available tools and backdoors that APT33 has used in its campaign so far are available on Iranian threat actor websites. The group's targeting of organizations suggests it is aligned with Iranian nation-state interests and the timing of its activities coincides with Iran's workweek and working hours, the security vendor noted.

Code in one of the malware samples that the group has used indicates that it may have been developed and deployed by an individual who was previously employed by the government of Iran, FireEye said.

"APT33 shares some similarities with other nation-state groups in that they rely on publicly available tools with some use of custom malware development, potentially suggesting the threat actors are a part of a greater capability," says Josiah Kimble, a security analyst with FireEye.

"Like most suspected state sponsored actors, APT33's targeting of organizations, most closely aligns with nation-state interests," he says.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Related Content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-6154
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
CVE-2019-5594
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
CVE-2019-6695
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
CVE-2019-12400
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
CVE-2019-15092
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.