APT33 hacking group might be working with Iranian government: FireEye

Image
IANS San Francisco
Last Updated : Sep 21 2017 | 1:57 PM IST

Revealing the operations of Iranian hacking group APT33, US-based cyber security firm FireEye said on Thursday the cybercriminals, who have targeted the energy and aviation sectors, are likely to have worked with the Iranian government.

APT33 has carried out cyber espionage operations since at least 2013 and has targeted organisations headquartered in the US, Saudi Arabia and South Korea.

APT33's targeting of organisations aligns with nation-state interests, implying that the threat actor is most likely government sponsored.

This, coupled with the timing of operations which coincides with Iranian working hours and the use of multiple Iranian hacker tools and name servers, bolsters the assessment that APT33 is likely to have operated on behalf of the Iranian government.

"Iran has repeatedly demonstrated a willingness to globally leverage its cyber espionage capabilities. Its aggressive use of this tool, combined with shifting geopolitics, underscore the danger that APT33 poses to governments and commercial interests in the Middle East and throughout the world," John Hultquist, Director of Cyber Espionage Analysis at FireEye, said in a statement.

"Identifying this group and its destructive capability presents an opportunity for organizations to detect and deal with related threats proactively," added Hultquist.

According to the report, the group has shown particular interest in organisations in the aviation sector involved in both military and commercial capacities, as well as organisations in the energy sector with ties to petrochemical production.

The group sent spear phishing emails to employees whose jobs related to the aviation industry. These emails included recruitment themed lures and contained links to malicious HTML application files.

From mid-2016 through early 2017, APT33 compromised a US organisation in the aviation sector and targeted a business conglomerate located in Saudi Arabia with aviation holdings.

During the same time period, the group also targeted a South Korean company involved in oil refining and petrochemicals.

In May 2017, APT33 appeared to target a Saudi Arabian organization and a South Korean business conglomerate using a malicious file that attempted to entice victims with job vacancies for a Saudi Arabian petrochemical company.

--IANS

sku/na

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Sep 21 2017 | 1:50 PM IST

Next Story