Revealing the operations of Iranian hacking group APT33, US-based cyber security firm FireEye said on Thursday the cybercriminals, who have targeted the energy and aviation sectors, are likely to have worked with the Iranian government.
APT33 has carried out cyber espionage operations since at least 2013 and has targeted organisations headquartered in the US, Saudi Arabia and South Korea.
APT33's targeting of organisations aligns with nation-state interests, implying that the threat actor is most likely government sponsored.
This, coupled with the timing of operations which coincides with Iranian working hours and the use of multiple Iranian hacker tools and name servers, bolsters the assessment that APT33 is likely to have operated on behalf of the Iranian government.
"Iran has repeatedly demonstrated a willingness to globally leverage its cyber espionage capabilities. Its aggressive use of this tool, combined with shifting geopolitics, underscore the danger that APT33 poses to governments and commercial interests in the Middle East and throughout the world," John Hultquist, Director of Cyber Espionage Analysis at FireEye, said in a statement.
"Identifying this group and its destructive capability presents an opportunity for organizations to detect and deal with related threats proactively," added Hultquist.
According to the report, the group has shown particular interest in organisations in the aviation sector involved in both military and commercial capacities, as well as organisations in the energy sector with ties to petrochemical production.
The group sent spear phishing emails to employees whose jobs related to the aviation industry. These emails included recruitment themed lures and contained links to malicious HTML application files.
From mid-2016 through early 2017, APT33 compromised a US organisation in the aviation sector and targeted a business conglomerate located in Saudi Arabia with aviation holdings.
During the same time period, the group also targeted a South Korean company involved in oil refining and petrochemicals.
In May 2017, APT33 appeared to target a Saudi Arabian organization and a South Korean business conglomerate using a malicious file that attempted to entice victims with job vacancies for a Saudi Arabian petrochemical company.
--IANS
sku/na
Disclaimer: No Business Standard Journalist was involved in creation of this content
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
