G0064 APT33
APT33 is a suspected Iranian threat group that has carried out operations since at least 2013. The group has targeted organizations across multiple industries in the United States, Saudi Arabia, and South Korea, with a particular interest in the aviation and energy sectors. 3 1
Item | Value |
---|---|
ID | G0064 |
Associated Names | HOLMIUM, Elfin |
Version | 1.4 |
Created | 18 April 2018 |
Last Modified | 08 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
HOLMIUM | 2 |
Elfin | 4 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | APT33 has used HTTP for command and control.4 |
enterprise | T1560 | Archive Collected Data | - |
enterprise | T1560.001 | Archive via Utility | APT33 has used WinRAR to compress data prior to exfil.4 |
enterprise | T1547 | Boot or Logon Autostart Execution | - |
enterprise | T1547.001 | Registry Run Keys / Startup Folder | APT33 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence.42 |
enterprise | T1110 | Brute Force | - |
enterprise | T1110.003 | Password Spraying | APT33 has used password spraying to gain access to target systems.52 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | APT33 has utilized PowerShell to download files from the C2 server and run various scripts. 42 |
enterprise | T1059.005 | Visual Basic | APT33 has used VBScript to initiate the delivery of payloads.2 |
enterprise | T1555 | Credentials from Password Stores | APT33 has used a variety of publicly available tools like LaZagne to gather credentials.45 |
enterprise | T1555.003 | Credentials from Web Browsers | APT33 has used a variety of publicly available tools like LaZagne to gather credentials.45 |
enterprise | T1132 | Data Encoding | - |
enterprise | T1132.001 | Standard Encoding | APT33 has used base64 to encode command and control traffic.5 |
enterprise | T1573 | Encrypted Channel | - |
enterprise | T1573.001 | Symmetric Cryptography | APT33 has used AES for encryption of command and control traffic.5 |
enterprise | T1546 | Event Triggered Execution | - |
enterprise | T1546.003 | Windows Management Instrumentation Event Subscription | APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.2 |
enterprise | T1048 | Exfiltration Over Alternative Protocol | - |
enterprise | T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | APT33 has used FTP to exfiltrate files (separately from the C2 channel).4 |
enterprise | T1203 | Exploitation for Client Execution | APT33 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774).42 |
enterprise | T1068 | Exploitation for Privilege Escalation | APT33 has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.5 |
enterprise | T1105 | Ingress Tool Transfer | APT33 has downloaded additional files and programs from its C2 server.42 |
enterprise | T1040 | Network Sniffing | APT33 has used SniffPass to collect credentials by sniffing network traffic.4 |
enterprise | T1571 | Non-Standard Port | APT33 has used HTTP over TCP ports 808 and 880 for command and control.4 |
enterprise | T1027 | Obfuscated Files or Information | APT33 has used base64 to encode payloads.5 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | APT33 has obtained and leveraged publicly-available tools for early intrusion activities.54 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.001 | LSASS Memory | APT33 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials.45 |
enterprise | T1003.004 | LSA Secrets | APT33 has used a variety of publicly available tools like LaZagne to gather credentials.45 |
enterprise | T1003.005 | Cached Domain Credentials | APT33 has used a variety of publicly available tools like LaZagne to gather credentials.45 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | APT33 has sent spearphishing e-mails with archive attachments.2 |
enterprise | T1566.002 | Spearphishing Link | APT33 has sent spearphishing emails containing links to .hta files.34 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | APT33 has created a scheduled task to execute a .vbe file multiple times a day.4 |
enterprise | T1552 | Unsecured Credentials | - |
enterprise | T1552.001 | Credentials In Files | APT33 has used a variety of publicly available tools like LaZagne to gather credentials.45 |
enterprise | T1552.006 | Group Policy Preferences | APT33 has used a variety of publicly available tools like Gpppassword to gather credentials.45 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.001 | Malicious Link | APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.34 |
enterprise | T1204.002 | Malicious File | APT33 has used malicious e-mail attachments to lure victims into executing malware.2 |
enterprise | T1078 | Valid Accounts | APT33 has used valid accounts for initial access and privilege escalation.15 |
enterprise | T1078.004 | Cloud Accounts | APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints.2 |
ics | T0852 | Screen Capture | APT33 utilize backdoors capable of capturing screenshots once installed on a system. 67 |
ics | T0853 | Scripting | APT33 utilized PowerShell scripts to establish command and control and install files for execution. 10 9 |
ics | T0865 | Spearphishing Attachment | APT33 sent spear phishing emails containing links to HTML application files, which were embedded with malicious code. 6 APT33 has conducted targeted spear phishing campaigns against U.S. government agencies and private sector companies. 8 |
Software
References
-
Davis, S. and Carr, N. (2017, September 21). APT33: New Insights into Iranian Cyber Espionage Group. Retrieved February 15, 2018. ↩↩↩↩↩
-
Microsoft Threat Protection Intelligence Team. (2020, June 18). Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint. Retrieved June 22, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩
-
O’Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018. ↩↩↩↩↩↩
-
Security Response attack Investigation Team. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved April 10, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Ackerman, G., et al. (2018, December 21). OVERRULED: Containing a Potentially Destructive Adversary. Retrieved January 17, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Jacqueline O’Leary et al. 2017, September 20 Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware Retrieved. 2019/12/02 ↩↩
-
Junnosuke Yagi 2017, March 07 Trojan.Stonedrill Retrieved. 2019/12/05 ↩
-
Andy Greenburg 2019, June 20 Iranian Hackers Launch a New US-Targeted Campaign as Tensions Mount Retrieved. 2020/01/03 ↩
-
Dragos Symantec 2019, March 27 Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. Retrieved. 2019/12/02 Magnallium Retrieved. 2019/10/27 ↩
-
Symantec 2019, March 27 Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. Retrieved. 2019/12/02 ↩