OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and advanced infiltration techniques. This group conducts a multitude of cyber attacks against various sectors, and among them, the most executed ones are intelligence gathering, surveillance, and high-profile cyberattacks. Besides this, cybersecurity […]
The post OilRig Hackers Attacking Individuals And Organizations In The Middle East appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and advanced infiltration techniques.
This group conducts a multitude of cyber attacks against various sectors, and among them, the most executed ones are intelligence gathering, surveillance, and high-profile cyberattacks.
Besides this, cybersecurity researchers at Cyble recently identified that OilRig hackers have been actively attacking Middle Eastern entities and organizations related to Iranian interests.
The group continually evolves its tools to evade detection and has expanded its operations to include disruptive attacks like ransomware and data-wiping.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
OilRig Hackers Attacking Individuals
OilRig targets over 20 countries across various regions:-
It attacks diverse sectors including:-
- Aerospace & Defense
- BFSI
- Chemicals
- Education
- Energy & Utilities
- Government & LEA
- Hospitality
- IT & ITES
- Technology
- Telecommunication
The group employs customizable attack vectors, often starting with spear-phishing or exploiting public-facing applications to deliver malware for data exfiltration.
OilRig is suspected to have links with Greenbug and is known for exploiting unpatched SharePoint servers. Its extensive reach and adaptable tactics make it a significant threat in the cyber espionage landscape.
The group OilRig made use of LinkedIn-based phishing masquerading as Cambridge University Members and exploited already known vulnerabilities like CVE-2019-0604 and CVE-2017-11882.
For persistence, OilRig uses malicious loaders, VBScript, or scheduled tasks. Their arsenal also includes various RATs like Alma Communicator and BONDUPDATER, among others.
The group also employs living-off-the-land tactics to attack public-facing applications in their operations, as the Cyble report reads.
They do so by linking IPs and domains from previous attacks, which helps them illuminate the group’s development as a continuous threat touching many sectors.
Here below we have mentioned all the tools used:-
- Alma Communicator
- BONDUPDATER
- Clayslide
- DistTrack
- DNSExfitrator
- DNSpionage
- Dustman
- Fox Panel
- Helminth
- ISMAgent
- ISMDoor
- ISMInjector
- Karkoff
- Mimikatz
- LaZagne
- LIONTAIL
- LONGWATCH
- SideTwist
- Neuron
- Nautilus
- PICKPOCKET
- Plink
- PsList
- RDAT
- Saitama
- SpyNote RAT
- TONEDEAF
OilRig is a group of elite hackers who are experts in cyber espionage. They specialize in secret C&C communication using various methods.
They have developed targeted exchange servers, HTPSnoop implants, HTTP and DNS queries, and protocol tunneling for stealthy network communications.
Recommendations
Here below we have mentioned all the recommendations:-
- Regular software patching
- Enhanced email security
- Robust network monitoring
- Advanced endpoint protection
- Strict access control
- Comprehensive incident response plan
- Utilize threat intelligence
- Ongoing employee cybersecurity training
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
The post OilRig Hackers Attacking Individuals And Organizations In The Middle East appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Source: gbHackers
Source Link: https://gbhackers.com/oilrig-hackers-middle-east-attacks/