Iranian OilRig APT Targets Iraqi Government Networks in Sophisticated Cyber Attack Campaign

A newly uncovered cyber attack campaign has targeted key Iraqi government networks, including the Prime Minister's Office and the Ministry of Foreign Affairs. This operation has been attributed to the Iran state-sponsored threat group OilRig (also known as APT34, Crambus, Cobalt Gypsy, GreenBug, Hazel Sandstorm, and Helix Kitten), according to an analysis by cybersecurity firm Check Point.

OilRig, linked to Iran’s Ministry of Intelligence and Security (MOIS), has been active since at least 2014, frequently conducting phishing attacks across the Middle East. The group is known for using custom backdoors such as Karkoff, Shark, Marlin, Saitama, MrPerfectionManager, PowerExchange, Solar, Mango, and Menorah to steal sensitive information.

The New Malware Campaign: Veaty and Spearal

The latest OilRig campaign introduced two new malware families, Veaty and Spearal, both equipped with sophisticated capabilities for data theft and executing PowerShell commands. These malware variants utilize a combination of advanced techniques, including DNS tunneling for command-and-control (C2) communication and email-based C2 channels that use compromised email accounts within the targeted organization.

OilRig's approach is unique in leveraging compromised email mailboxes as part of its C2 infrastructure, a tactic seen in previous campaigns involving backdoors such as Karkoff and PowerExchange.

Attack Chain and Tactics

The attack chain begins with phishing emails containing malicious files disguised as legitimate documents, such as "Avamer.pdf.exe" or "IraqiDoc.docx.rar." Once the files are opened, they initiate PowerShell or Pyinstaller scripts that drop the malware onto the victim’s machine. These scripts also include XML configuration files containing details about the C2 server.

The Spearal malware, written in .NET, communicates with the C2 server via DNS tunneling. The data exchanged between the malware and the server is encoded using a custom Base32 scheme within DNS queries. Spearal is designed to execute PowerShell commands, read file contents, and transmit encoded data back to the C2 server. It can also retrieve and write data from the C2 server to the infected system.

Similarly, the Veaty malware, also a .NET-based backdoor, relies on compromised email accounts from the gov-iq.net domain to communicate with the C2 server. It downloads and executes files, uploads stolen data, and runs PowerShell scripts based on the commands received through specific mailboxes.

Advanced Tactics: SSH and HTTP Backdoors

Check Point's analysis also uncovered a third backdoor, utilizing SSH tunneling and an HTTP-based backdoor named CacheHttp.dll. This malware targets Microsoft’s Internet Information Services (IIS) servers, monitoring web requests for specific events to trigger malicious commands. The backdoor checks for a "Cookie" header in HTTP requests and uses the F=0/1 parameter to initialize or execute commands based on its configuration.

This IIS module is a continuation of malware previously identified by ESET in 2021, evolving from earlier variants used by OilRig. Its capabilities include file read/write operations and command execution, making it a powerful tool for covert network infiltration.

OilRig’s Evolving Tactics

This recent campaign showcases OilRig’s sustained efforts to target Iraqi government infrastructure using a diverse toolset of backdoors and custom C2 mechanisms. The group’s reliance on DNS tunneling and compromised email accounts for communication highlights its strategic focus on developing specialized methods for controlling compromised networks.

Check Point’s analysis of OilRig’s infrastructure suggests the group’s continual evolution, with new malware families, advanced C2 channels, and effective social engineering tactics making it a persistent threat in the region. The campaign underscores the importance of enhanced cybersecurity measures for governments and organizations facing sophisticated state-sponsored attacks.


Similar Articles
Image Description
Cybercrime Red vs Blue vs Purple vs Orange vs Yellow vs Green vs White Cybersecurity Teams

The Red Team handles offensive testing. They simulate real-world attacks, acting like adversaries to test the system's defenses. Red Tea ...

  • By DragonX Team

  • Updated Jul 03, 2024

A newly uncovered cyber attack campaign has targeted key Iraqi government networks, including the Prime Minister's Office and the Ministry of Foreign Affairs. This operation has been attributed to the Iran state-sponsored threat group OilRig (also known as APT34, Crambus, Cobalt Gypsy, GreenBug, Hazel Sandstorm, and Helix Kitten), according to an analysis by cybersecurity firm Check Point.

OilRig, linked to Iran’s Ministry of Intelligence and Security (MOIS), has been active since at least 2014, frequently conducting phishing attacks across the Middle East. The group is known for using custom backdoors such as Karkoff, Shark, Marlin, Saitama, MrPerfectionManager, PowerExchange, Solar, Mango, and Menorah to steal sensitive information.

The New Malware Campaign: Veaty and Spearal

The latest OilRig campaign introduced two new malware families, Veaty and Spearal, both equipped with sophisticated capabilities for data theft and executing PowerShell commands. These malware variants utilize a combination of advanced techniques, including DNS tunneling for command-and-control (C2) communication and email-based C2 channels that use compromised email accounts within the targeted organization.

OilRig's approach is unique in leveraging compromised email mailboxes as part of its C2 infrastructure, a tactic seen in previous campaigns involving backdoors such as Karkoff and PowerExchange.

Attack Chain and Tactics

The attack chain begins with phishing emails containing malicious files disguised as legitimate documents, such as "Avamer.pdf.exe" or "IraqiDoc.docx.rar." Once the files are opened, they initiate PowerShell or Pyinstaller scripts that drop the malware onto the victim’s machine. These scripts also include XML configuration files containing details about the C2 server.

The Spearal malware, written in .NET, communicates with the C2 server via DNS tunneling. The data exchanged between the malware and the server is encoded using a custom Base32 scheme within DNS queries. Spearal is designed to execute PowerShell commands, read file contents, and transmit encoded data back to the C2 server. It can also retrieve and write data from the C2 server to the infected system.

Similarly, the Veaty malware, also a .NET-based backdoor, relies on compromised email accounts from the gov-iq.net domain to communicate with the C2 server. It downloads and executes files, uploads stolen data, and runs PowerShell scripts based on the commands received through specific mailboxes.

Advanced Tactics: SSH and HTTP Backdoors

Check Point's analysis also uncovered a third backdoor, utilizing SSH tunneling and an HTTP-based backdoor named CacheHttp.dll. This malware targets Microsoft’s Internet Information Services (IIS) servers, monitoring web requests for specific events to trigger malicious commands. The backdoor checks for a "Cookie" header in HTTP requests and uses the F=0/1 parameter to initialize or execute commands based on its configuration.

This IIS module is a continuation of malware previously identified by ESET in 2021, evolving from earlier variants used by OilRig. Its capabilities include file read/write operations and command execution, making it a powerful tool for covert network infiltration.

OilRig’s Evolving Tactics

This recent campaign showcases OilRig’s sustained efforts to target Iraqi government infrastructure using a diverse toolset of backdoors and custom C2 mechanisms. The group’s reliance on DNS tunneling and compromised email accounts for communication highlights its strategic focus on developing specialized methods for controlling compromised networks.

Check Point’s analysis of OilRig’s infrastructure suggests the group’s continual evolution, with new malware families, advanced C2 channels, and effective social engineering tactics making it a persistent threat in the region. The campaign underscores the importance of enhanced cybersecurity measures for governments and organizations facing sophisticated state-sponsored attacks.


Similar Articles
Image Description
Mobile Security A new malware campaign targeting Linux systems is exploiting Oracle WebLogic vulnerabilities to mine cryptocurrency.

One of the key tactics used in this attack is obfuscation. Hackers cleverly disguise their malware to avoid detection by antivirus software a ...

  • By DragonX Team

  • Updated Sep 13, 2024

Cyber Attack

A newly uncovered cyber attack campaign has targeted key Iraqi government networks, including the Prime Minister's Office and the Ministry of Foreign Affairs. This operation has been attributed to the Iran state-sponsored threat group OilRig (also known as APT34, Crambus, Cobalt Gypsy, GreenBug, Hazel Sandstorm, and Helix Kitten), according to an analysis by cybersecurity firm Check Point.

OilRig, linked to Iran’s Ministry of Intelligence and Security (MOIS), has been active since at least 2014, frequently conducting phishing attacks across the Middle East. The group is known for using custom backdoors such as Karkoff, Shark, Marlin, Saitama, MrPerfectionManager, PowerExchange, Solar, Mango, and Menorah to steal sensitive information.

The New Malware Campaign: Veaty and Spearal

The latest OilRig campaign introduced two new malware families, Veaty and Spearal, both equipped with sophisticated capabilities for data theft and executing PowerShell commands. These malware variants utilize a combination of advanced techniques, including DNS tunneling for command-and-control (C2) communication and email-based C2 channels that use compromised email accounts within the targeted organization.

OilRig's approach is unique in leveraging compromised email mailboxes as part of its C2 infrastructure, a tactic seen in previous campaigns involving backdoors such as Karkoff and PowerExchange.

Attack Chain and Tactics

The attack chain begins with phishing emails containing malicious files disguised as legitimate documents, such as "Avamer.pdf.exe" or "IraqiDoc.docx.rar." Once the files are opened, they initiate PowerShell or Pyinstaller scripts that drop the malware onto the victim’s machine. These scripts also include XML configuration files containing details about the C2 server.

The Spearal malware, written in .NET, communicates with the C2 server via DNS tunneling. The data exchanged between the malware and the server is encoded using a custom Base32 scheme within DNS queries. Spearal is designed to execute PowerShell commands, read file contents, and transmit encoded data back to the C2 server. It can also retrieve and write data from the C2 server to the infected system.

Similarly, the Veaty malware, also a .NET-based backdoor, relies on compromised email accounts from the gov-iq.net domain to communicate with the C2 server. It downloads and executes files, uploads stolen data, and runs PowerShell scripts based on the commands received through specific mailboxes.

Advanced Tactics: SSH and HTTP Backdoors

Check Point's analysis also uncovered a third backdoor, utilizing SSH tunneling and an HTTP-based backdoor named CacheHttp.dll. This malware targets Microsoft’s Internet Information Services (IIS) servers, monitoring web requests for specific events to trigger malicious commands. The backdoor checks for a "Cookie" header in HTTP requests and uses the F=0/1 parameter to initialize or execute commands based on its configuration.

This IIS module is a continuation of malware previously identified by ESET in 2021, evolving from earlier variants used by OilRig. Its capabilities include file read/write operations and command execution, making it a powerful tool for covert network infiltration.

OilRig’s Evolving Tactics

This recent campaign showcases OilRig’s sustained efforts to target Iraqi government infrastructure using a diverse toolset of backdoors and custom C2 mechanisms. The group’s reliance on DNS tunneling and compromised email accounts for communication highlights its strategic focus on developing specialized methods for controlling compromised networks.

Check Point’s analysis of OilRig’s infrastructure suggests the group’s continual evolution, with new malware families, advanced C2 channels, and effective social engineering tactics making it a persistent threat in the region. The campaign underscores the importance of enhanced cybersecurity measures for governments and organizations facing sophisticated state-sponsored attacks.


Similar Articles
Image Description
Cyber Attack Telegram Agrees to Share User Data With Authorities for Criminal Investigations

Telegram has announced a major policy shift, agreeing to share users' IP addresses and phone numbers with a ...

  • By DragonX Team

  • Updated Sep 24, 2024



Latest News and Updates

Latest News

  • Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware

    1

    Posted Date Nov 11, 2024

    Cybercriminals Use Excel...

    Cybersecurity researchers have discovered a...
  • The ROI of Security Investments: How Cybersecurity Leaders Prove It

    2

    Posted Date Nov 11, 2024

    The ROI of...

    Cyber threats are intensifying, and...
  • AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services

    3

    Posted Date Nov 09, 2024

    AndroxGh0st Malware Integrates...

    The threat actors behind the...
  • Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

    4

    Posted Date Nov 09, 2024

    Palo Alto Advises...

    Palo Alto Networks on Friday...
  • A Sherlock Holmes Approach to Cybersecurity: Eliminate the Impossible with Exposure Validation

    5

    Posted Date Nov 08, 2024

    A Sherlock Holmes...

    Sherlock Holmes is famous for...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns