RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

APT34 (hacker grouping)

Company

Content

APT34 (it is also known under the names Oilrig and HelixKitten) is hacker grouping which according to numerous information security experts and based on journalistic investigations, is supported by the Iranian government. It is supposed that the authorities use tools for cyber espionage of APT34.

History

2019: Source codes of cyberespionage tools were included in Telegram

In April, 2019 it became known that source codes of tools for cyber espionage of APT34 were published in one of Telegram channels. In particular, it is about the following hacker programs:

  • Glimpse (the new version of the PowerShell-trojan which Palo Alto Networks calls BondUpdater)
  • PoisonFrog (older version of BondUpdater)
  • HyperShell (web shell which Palo Alto Networks calls TwoFace)
  • HighShell (one more web shell)
  • Fox Panel (set for a phishing)
  • Webmask (the tool for DNS-tunneling).

These materials were published by the person or a group of persons who disappear under the alias Lab Dookhtegan. Besides, the data stolen at the victims of APT34 grouping were laid out. Generally it is the logins and passwords received through phishing pages. Information on internal servers and the IP addresses is in certain cases also specified.

Source codes of instruments of cyber espionage which the government of Iran uses were included in Telegram

Information concerns 66 victims of cyber attacks of APT34. Generally the companies and the organizations from the countries of the Middle East, Africa, East Asia and Europe went to this list. Two largest names among victims are Etihad Airways and Emirates National Oil companies

According to the ZDNet edition, experts in security from several companies on cyber security analyze leakage of tools and documents.  They believe that the cybergrouping connected with the government of Iran will probably change the tool kit that it could not be recognized easily. However old methods of cracking should be prevented by the updated cybersecurity software from leading manufacturers.[1]

See Also





Notes