New APT Pioneer Kitten Linked to Iranian Government
The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.
Pioneer Kitten, an advanced persistent threat (APT) group with suspected ties to the Iranian government, has operated since 2017 with the goal of gaining and maintaining access to entities holding sensitive data "of likely intelligence interest" to Iran, CrowdStrike researchers report.
The researchers who have been watching the threat say its behavior suggests Pioneer Kitten is likely a contract group operating in support of the Iranian government, rather than one operated by Iran itself.
Its attackers' techniques heavily rely on exploits of remote external services on Internet-facing assets, which they use to gain access into a target environment. Pioneer Kitten is interested in exploits related to VPNs and network appliances, in particular CVE-2019-11510, CVE-2019-19781, and CVE-2020-5902. During their operations, they primarily rely on open source tooling.
The group employs an opportunistic model and most attacks have centered on North American and Israeli entities. It seems most interested in the technology, government, defense, and healthcare sectors. However, it has also been seen targeting aviation, media, academia, engineering, consulting and professional services, financial services, manufacturing, and retail.
Read more details here.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024