New APT Pioneer Kitten Linked to Iranian Government

The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.



Pioneer Kitten, an advanced persistent threat (APT) group with suspected ties to the Iranian government, has operated since 2017 with the goal of gaining and maintaining access to entities holding sensitive data "of likely intelligence interest" to Iran, CrowdStrike researchers report.

The researchers who have been watching the threat say its behavior suggests Pioneer Kitten is likely a contract group operating in support of the Iranian government, rather than one operated by Iran itself. 

Related Content:

Is China the World's Greatest Cyber Power?

US Warns of Ongoing BeagleBoyz Bank-Theft Operations

Its attackers' techniques heavily rely on exploits of remote external services on Internet-facing assets, which they use to gain access into a target environment. Pioneer Kitten is interested in exploits related to VPNs and network appliances, in particular CVE-2019-11510, CVE-2019-19781, and CVE-2020-5902. During their operations, they primarily rely on open source tooling. 

The group employs an opportunistic model and most attacks have centered on North American and Israeli entities. It seems most interested in the technology, government, defense, and healthcare sectors. However, it has also been seen targeting aviation, media, academia, engineering, consulting and professional services, financial services, manufacturing, and retail.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2020 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service