fbpx
Wikipedia

Elfin Team

Advanced Persistent Threat 33 (APT33) is a hacker group identified by FireEye as being supported by the government of Iran.[1][2] The group has also been called Elfin Team, Refined Kitten (by Crowdstrike), Magnallium (by Dragos), Peach Sandstorm,[3] and Holmium (by Microsoft).[4][5][6]

History edit

FireEye believes that the group was formed no later than 2013.[1]

Targets edit

APT33 has reportedly targeted aerospace, defense and petrochemical industry targets in the United States, South Korea, and Saudi Arabia.[1][2]

Modus operandi edit

APT33 reportedly uses a dropper program designated DropShot, which can deploy a wiper called ShapeShift, or install a backdoor called TurnedUp.[1] The group is reported to use the ALFASHELL tool to send spear-phishing emails loaded with malicious HTML Application files to its targets.[1][2]

APT33 registered domains impersonating many commercial entities, including Boeing, Alsalam Aircraft Company, Northrop Grumman and Vinnell.[2]

Identification edit

FireEye and Kaspersky Lab noted similarities between the ShapeShift and Shamoon, another virus linked to Iran.[1] APT33 also used Farsi in ShapeShift and DropShot, and was most active during Iran Standard Time business hours, remaining inactive on the Iranian weekend.[1][2]

One hacker known by the pseudonym of xman_1365_x was linked to both the TurnedUp tool code and the Iranian Nasr Institute, which has been connected to the Iranian Cyber Army.[7][1][2][8] xman_1365_x has accounts on Iranian hacker forums, including Shabgard and Ashiyane.[7]

See also edit

References edit

  1. ^ a b c d e f g h Greenberg, Andy (September 20, 2017). "New Group of Iranian Hackers Linked to Destructive Malware". Wired.
  2. ^ a b c d e f O'Leary, Jacqueline; Kimble, Josiah; Vanderlee, Kelli; Fraser, Nalani (September 20, 2017). "Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware". FireEye.
  3. ^ "Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets". Microsoft. 14 September 2023.
  4. ^ "Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S."
  5. ^ "MAGNALLIUM | Dragos". 30 May 2020.
  6. ^ "Microsoft says Iran-linked hackers targeted businesses". Associated Press. 6 March 2019.
  7. ^ a b Cox, Joseph (20 September 2017). . The Daily Beast. Archived from the original on September 21, 2017. Included in a piece of non-public malware APT33 uses called TURNEDUP is the username "xman_1365_x." xman has accounts on a selection of Iranian hacking forums, such as Shabgard and Ashiyane, although FireEye says it did not find any evidence to suggest xman was formally part of those site's hacktivist groups. In its report, FireEye links xman to the "Nasr Institute," a hacking group allegedly controlled by the Iranian government.
  8. ^ Auchard, Eric; Wagstaff, Jeremy; Sharafedin, Bozorgmehr (September 20, 2017). Heinrich, Mark (ed.). "Once 'kittens' in cyber spy world, Iran gaining hacking prowess: security experts". Reuters. FireEye found some ties between APT33 and the Nasr Institute - which other experts have connected to the Iranian Cyber Army, an offshoot of the Revolutionary Guards - but it has yet to find any links to a specific government agency, Hultquist said.

elfin, team, advanced, persistent, threat, apt33, hacker, group, identified, fireeye, being, supported, government, iran, group, also, been, called, refined, kitten, crowdstrike, magnallium, dragos, peach, sandstorm, holmium, microsoft, contents, history, targ. Advanced Persistent Threat 33 APT33 is a hacker group identified by FireEye as being supported by the government of Iran 1 2 The group has also been called Elfin Team Refined Kitten by Crowdstrike Magnallium by Dragos Peach Sandstorm 3 and Holmium by Microsoft 4 5 6 Contents 1 History 2 Targets 3 Modus operandi 4 Identification 5 See also 6 ReferencesHistory editFireEye believes that the group was formed no later than 2013 1 Targets editAPT33 has reportedly targeted aerospace defense and petrochemical industry targets in the United States South Korea and Saudi Arabia 1 2 Modus operandi editAPT33 reportedly uses a dropper program designated DropShot which can deploy a wiper called ShapeShift or install a backdoor called TurnedUp 1 The group is reported to use the ALFASHELL tool to send spear phishing emails loaded with malicious HTML Application files to its targets 1 2 APT33 registered domains impersonating many commercial entities including Boeing Alsalam Aircraft Company Northrop Grumman and Vinnell 2 Identification editFireEye and Kaspersky Lab noted similarities between the ShapeShift and Shamoon another virus linked to Iran 1 APT33 also used Farsi in ShapeShift and DropShot and was most active during Iran Standard Time business hours remaining inactive on the Iranian weekend 1 2 One hacker known by the pseudonym of xman 1365 x was linked to both the TurnedUp tool code and the Iranian Nasr Institute which has been connected to the Iranian Cyber Army 7 1 2 8 xman 1365 x has accounts on Iranian hacker forums including Shabgard and Ashiyane 7 See also editCharming KittenReferences edit a b c d e f g h Greenberg Andy September 20 2017 New Group of Iranian Hackers Linked to Destructive Malware Wired a b c d e f O Leary Jacqueline Kimble Josiah Vanderlee Kelli Fraser Nalani September 20 2017 Insights into Iranian Cyber Espionage APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware FireEye Peach Sandstorm password spray campaigns enable intelligence collection at high value targets Microsoft 14 September 2023 Elfin Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U S MAGNALLIUM Dragos 30 May 2020 Microsoft says Iran linked hackers targeted businesses Associated Press 6 March 2019 a b Cox Joseph 20 September 2017 Suspected Iranian Hackers Targeted U S Aerospace Sector The Daily Beast Archived from the original on September 21 2017 Included in a piece of non public malware APT33 uses called TURNEDUP is the username xman 1365 x xman has accounts on a selection of Iranian hacking forums such as Shabgard and Ashiyane although FireEye says it did not find any evidence to suggest xman was formally part of those site s hacktivist groups In its report FireEye links xman to the Nasr Institute a hacking group allegedly controlled by the Iranian government Auchard Eric Wagstaff Jeremy Sharafedin Bozorgmehr September 20 2017 Heinrich Mark ed Once kittens in cyber spy world Iran gaining hacking prowess security experts Reuters FireEye found some ties between APT33 and the Nasr Institute which other experts have connected to the Iranian Cyber Army an offshoot of the Revolutionary Guards but it has yet to find any links to a specific government agency Hultquist said Retrieved from https en wikipedia org w index php title Elfin Team amp oldid 1210223213, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.