Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Elfin Team

From Wikipedia, the free encyclopedia
Iranian hacker group

Advanced Persistent Threat 33 (APT33) is a hacker group identified byFireEye as being supported by thegovernment of Iran.[1][2] The group has also been calledElfin Team,Refined Kitten (byCrowdstrike),Magnallium (by Dragos),Peach Sandstorm,[3] andHolmium (byMicrosoft).[4][5][6]

History

[edit]

FireEye believes that the group was formed no later than 2013.[1]

Targets

[edit]

APT33 has reportedly targetedaerospace,defense andpetrochemical industry targets in theUnited States,South Korea, andSaudi Arabia.[1][2]

Modus operandi

[edit]

APT33 reportedly uses adropper program designated DropShot, which can deploy awiper called ShapeShift, or install abackdoor called TurnedUp.[1] The group is reported to use the ALFASHELL tool to sendspear-phishing emails loaded with maliciousHTML Application files to its targets.[1][2]

APT33 registered domains impersonating many commercial entities, includingBoeing, Alsalam Aircraft Company,Northrop Grumman andVinnell.[2]

Identification

[edit]

FireEye andKaspersky Lab noted similarities between the ShapeShift andShamoon, anothervirus linked to Iran.[1] APT33 also usedFarsi in ShapeShift and DropShot, and was most active duringIran Standard Time business hours, remaining inactive on the Iranian weekend.[1][2]

One hacker known by thepseudonym of xman_1365_x was linked to both the TurnedUp tool code and the Iranian Nasr Institute, which has been connected to theIranian Cyber Army.[7][1][2][8] xman_1365_x has accounts on Iranian hacker forums, including Shabgard and Ashiyane.[7]

See also

[edit]

References

[edit]
  1. ^abcdefghGreenberg, Andy (September 20, 2017)."New Group of Iranian Hackers Linked to Destructive Malware".Wired.
  2. ^abcdefO'Leary, Jacqueline; Kimble, Josiah; Vanderlee, Kelli; Fraser, Nalani (September 20, 2017)."Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware".FireEye.
  3. ^"Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets".Microsoft. 14 September 2023.
  4. ^"Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S."
  5. ^"MAGNALLIUM | Dragos". 30 May 2020.
  6. ^"Microsoft says Iran-linked hackers targeted businesses".Associated Press. 6 March 2019.
  7. ^abCox, Joseph (20 September 2017)."Suspected Iranian Hackers Targeted U.S. Aerospace Sector".The Daily Beast. Archived fromthe original on September 21, 2017.Included in a piece of non-public malware APT33 uses called TURNEDUP is the username "xman_1365_x." xman has accounts on a selection of Iranian hacking forums, such as Shabgard and Ashiyane, although FireEye says it did not find any evidence to suggest xman was formally part of those site's hacktivist groups. In its report, FireEye links xman to the "Nasr Institute," a hacking group allegedly controlled by the Iranian government.
  8. ^Auchard, Eric; Wagstaff, Jeremy; Sharafedin, Bozorgmehr (September 20, 2017). Heinrich, Mark (ed.)."Once 'kittens' in cyber spy world, Iran gaining hacking prowess: security experts".Reuters.FireEye found some ties between APT33 and the Nasr Institute - which other experts have connected to the Iranian Cyber Army, an offshoot of the Revolutionary Guards - but it has yet to find any links to a specific government agency, Hultquist said.
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Advanced
persistent threats
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=Elfin_Team&oldid=1267643801"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp