www.clearskysec.com
Open in
urlscan Pro
107.154.146.1
Public Scan
URL:
https://www.clearskysec.com/fox-kitten/
Submission: On December 05 via manual from US — Scanned from US
Submission: On December 05 via manual from US — Scanned from US
Form analysis
1 forms found in the DOMGET https://www.clearskysec.com/
<form role="search" method="get" action="https://www.clearskysec.com/">
<div class="input-group theme-form-group">
<input type="text" name="s" id="s" class="form-control input-lg" value="" placeholder="Search">
<span class="input-group-btn">
<button type="submit" class="btn btn-primary btn-sm">
<i class="fa fa-search fa-2x"></i>
</button>
</span>
</div>
</form>
Text Content
Skip to content Open navigation ClearSky Cyber Security Close navigation * Solutions * Threat Intelligence * Pay per report – APT Group research * Free Targeted Attacks Research * Cyber strategy * Cyber architecture * Cyber Tabletop Exercise * Blog * Company * About * Team * Leadership * Careers * Partners * Contact us BLOG FOX KITTEN – WIDESPREAD IRANIAN ESPIONAGE-OFFENSIVE CAMPAIGN Posted on February 16, 2020 by ClearSky Research Team During the last quarter of 2019, ClearSky research team has uncovered a widespread Iranian offensive campaign which we call “Fox Kitten Campaign”; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Read the full Report: Fox Kitten – Widespread Iranian Espionage-Offensive Campaign Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT, Telecommunication, Oil and Gas, Aviation, Government, and Security sectors around the world. We estimate the campaign revealed in this report to be among Iran’s most continuous and comprehensive campaigns revealed until now. Aside from malware, the campaign enfolds an entire infrastructure dedicated to ensuring the long-lasting capability to control and fully access the targets chosen by the Iranians. The revealed campaign was used as a reconnaissance infrastructure; however, it can also be used as a platform for spreading and activating destructive malware such as ZeroCleare and Dustman, tied to APT34. During our analysis, we have found an overlap, with medium-high probability, between this campaign’s infrastructure and the activity of an Iranian offensive group APT34-OilRig. Additionally, we have identified, with medium probability, a connection between this campaign and the APT33-Elfin and APT39-Chafer groups. The campaign was first revealed by Dragos, named “Parisite” and attributed to APT33; we call the comprehensive campaign revealed in this report “Fox Kitten”. We assess with a medium probability that the Iranian offensive groups (APT34 and APT33) have been working together since 2017, though the infrastructure that we reveal, vis-à-vis a large number of companies in Israel and around the world. The campaign infrastructure was used to: * Develop and maintain access routes to the targeted organizations * Steal valuable information from the targeted organizations * Maintain a long-lasting foothold at the targeted organizations * Breach additional companies through supply-chain attacks The campaign was conducted by using a variety of offensive tools, most of which open-source code-based and some – self-developed. OUR MAIN INSIGHTS: * The Iranian APT groups have succeeded to penetrate and steal information from dozens of companies around the world in the past three years. * The most successful and significant attack vector used by the Iranian APT groups in the last three years has been the exploitation of known vulnerabilities in systems with unpatched VPN and RDP services, in order to infiltrate and take control over critical corporate information storages. * This attack vector is not used exclusively by the Iranian APT groups; it became the main attack vector for cybercrime groups, ransomware attacks, and other state-sponsored offensive groups. * We assess this attack vector to be significant also in 2020 apparently by exploiting new vulnerabilities in VPNs and other remote systems (such as the latest one existing in Citrix). * Iranian APT groups have developed good technical offensive capabilities and are able to exploit 1-day vulnerabilities in relatively short periods of time, starting from several hours to a week or two. * Since 2017, we identify Iranian APT groups focusing on IT companies that provide a wide range of services to thousands of companies. Breaching those IT companies is especially valuable because through them one can reach the networks of additional companies. * After breaching the organizations, the attackers usually maintain a foothold and operational redundancy by installing and creating several more access points to the core corporate network. As a result, identifying and closing one access point does not necessarily deny the capability to carry on operations inside the network. * We assess with a medium-high probability that Iranian APT groups (APT34 and APT33) share attack infrastructures. Furthermore, it can be one group that was artificially marked in recent years as two or three separate APT groups. * The time needed to identify an attacker on a compromised network is long and varies between months to not at all. The existing monitoring capability for organizations to identify and block an attacker that entered through remote communication tools is difficult to impossible. We would like to thank researchers from Dragos who found the first signs of the campaign (which they call “Parisite”) and shared with us valuable information that helped us reveal the whole Fox Kitten campaign presented in this report. Posted in: Campaigns, cat2, cyber attack Tagged: APT33, APT34, Cyber, OilRig CATEGORIES * Campaigns * cat2 * Crypto * cyber attack * Cyber-Crime * Disinformation * General * Incidents * Threat actors * Uncategorized ARCHIVE * June 2022 * April 2022 * August 2021 * May 2021 * February 2021 * January 2021 * December 2020 * October 2020 * August 2020 * June 2020 * April 2020 * February 2020 * January 2020 * October 2019 * September 2019 * August 2019 * July 2019 * June 2019 * May 2019 * April 2019 * February 2019 * November 2018 * July 2018 * February 2018 * January 2018 * December 2017 * November 2017 * October 2017 * August 2017 * July 2017 * May 2017 * April 2017 * March 2017 * January 2017 * November 2016 * October 2016 * June 2016 * January 2016 * November 2015 * September 2015 * June 2015 * May 2015 * September 2014 CYBER SOLUTIONS * Threat Intelligence * Cyber strategy * Cyber architecture * Pay per report – APT Group research * Cyber Tabletop Exercise CONTACT US Head office: Yosef Karo St 13 Tel Aviv-Yafo Phone: +972 586 277684 Email: info [at] clearskysec.com UK branch: 1010 Cambourne Business Park, Cambridge CB23 6DP UK Phone: +44 1223 976370 Email: info [at] clearskysec.com Sitemap xml | Copyright 2022 © ClearSky Cyber Security