APT33, the Iran-linked APT group, has been using multiple layers of obfuscation to run a dozen live C2 servers involved in extremely targeted malware attacks.
The targeted malware campaigns aimed at organizations in the Middle East, the U.S., and Asia.
The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation industry and energy companies with connections to petrochemical production. Most of the targets were in the Middle East, others were in the U.S., South Korean, and Europe.
The nation-state actors are using small botnets composed of up to a dozen infected computers to gain persistence within the target networks.
“The malware is rather basic, and has limited capabilities that include downloading and running additional malware.” reads the analysis published by Trend Micro. “Among active infections in 2019 are two separate locations of a private American company that offers services related to national security, from a university and a college in the U.S., a victim most likely related to the U.S. , and several victims in the Middle East and Asia.”
According to a report published by the experts from Recorder Future in July, Iran-linked cyberespionage group APT33 has updated its infrastructure after the publication of a report detailing its activities.
The APT group recently targeted organizations in the oil and aviation industries, a private American company that offers services related to national security, victims connected to a university and a college in the US, a victim most likely related to the US military, and several entities in the Middle East and Asia.
While investigating the attacks, the experts from Trend Micro collected useful information to understand how APT33 manages its hacking infrastructure.
The command and control infrastructure was layered and isolated to remain under the radar and make harder investigation and
The above scheme shows that the APT group leverage a VPN layer build with a custom-built network of VPN nodes, APT33 was operating its own private VPN network.
“Threat actors often use commercial VPN services to hide their whereabouts when administering C&C servers and doing reconnaissance. But besides using VPN services that are available for any user, we also regularly see actors using private VPN networks that they set up for themselves.” continues the post. “APT33 likely uses its VPN exit nodes exclusively. We have been tracking some of the group’s private VPN exit nodes for more than a year and we have listed known associated IP addresses in the table below. “
Trend Micro has been tracking some of the group’s private VPN exit nodes for more than a year, below the list of IP addresses associated with the group’s activity
|IP address||First seen||Last seen|
The private VPN exit nodes were used to send
“APT33 also has a clear interest in websites that specialize in the recruitment of employees in the oil and gas industry,” concludes Trend Micro. “We recommend companies in the oil and gas industry to cross-relate their security log files with the IP addresses listed above.”
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.