Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Iran-Linked Cyberspy Group APT33 Continues Attacks on Saudi Arabia, U.S.

An Iran-linked cyberespionage group tracked as Elfin and APT33 continues targeting organizations in Saudi Arabia and the United States, Symantec reported on Wednesday.

An Iran-linked cyberespionage group tracked as Elfin and APT33 continues targeting organizations in Saudi Arabia and the United States, Symantec reported on Wednesday.

Experts believe APT33 has been active since as early as late 2015. Since the beginning of 2016, when Symantec started monitoring its attacks, the group has targeted government, research, chemical, engineering, consulting, finance, manufacturing and telecoms organizations in the Middle East and other parts of the world.

Of all the attacks observed by Symantec, 42% targeted Saudi Arabia, followed by the United States with 34%.

According to the cybersecurity firm, a total of 18 US-based organizations have been targeted over the past three years, including Fortune 500 companies. The list of US targets includes engineering, research, chemical, energy consultancy, IT, finance and healthcare organizations.

APT33 targets

“Some of these U.S. organizations may have been targeted by Elfin for the purpose of mounting supply chain attacks. In one instance, a large U.S. company was attacked in the same month a Middle Eastern company it co-owns was also compromised,” Symantec researchers explained.

APT33 has used both off-the-shelf and custom-built malware in its attacks. The custom malware includes Notestuk (aka TURNEDUP), Stonedrill, and a backdoor written in the AutoIt language. The list of commodity malware includes Remcos, DarkComet, Quasar RAT, Pupy RAT, NanoCore, and NetWeird. The group has also used several publicly available hacking tools, such as Mimikatz, SniffPass, LaZagne, and Gpppassword.

Attacks launched by APT33 last month involved CVE-2018-20250, a recently disclosed WinRAR vulnerability that can be exploited to silently extract malicious files to arbitrary locations from an apparently-harmless archive file. The flaw can be exploited to extract a piece of malware to the Windows Startup folder, which helps attackers not only plant malware but also execute it.

This flaw was exploited by the threat actor in an attack aimed at a chemicals organization in Saudi Arabia. Other APT groups are also said to have leveraged the WinRAR vulnerability in their attacks.

Advertisement. Scroll to continue reading.

In December 2018, researchers reported finding links between Shamoon 3, which had been used in attacks targeting the energy sector, and APT33/Elfin. At the time, Symantec reported that a Saudi Arabian organization hit by Shamoon had also been targeted by APT33, and McAfee suspected that this threat actor or someone impersonating it was likely behind the Shamoon 3 attacks.

“Because the Elfin and the Shamoon attacks against this organization occurred so close together, there has been speculation that the two groups may be linked. However, Symantec has found no further evidence to suggest Elfin was responsible for these Shamoon attacks to date,” Symantec said on Wednesday.

Related: Shamoon 3 Attacks Targeted Several Sectors

Related: Iranian Hackers Target Aerospace, Energy Companies

Related: Recently Patched WinRAR Flaw Exploited in APT Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.