67% found this document useful (3 votes)
262 views17 pages

Final Project

OilRig is an Iranian government-backed advanced persistent threat (APT) group known by various aliases like Cobalt Gypsy and APT34. They have conducted cyber espionage operations targeting private industries outside of Iran to support Iran's geopolitical goals. OilRig employs tactics like creating fake websites impersonating universities to distribute malware and steal data from victims in order to gain intelligence for Iran.

Uploaded by

DX DX
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
67% found this document useful (3 votes)
262 views17 pages

Final Project

OilRig is an Iranian government-backed advanced persistent threat (APT) group known by various aliases like Cobalt Gypsy and APT34. They have conducted cyber espionage operations targeting private industries outside of Iran to support Iran's geopolitical goals. OilRig employs tactics like creating fake websites impersonating universities to distribute malware and steal data from victims in order to gain intelligence for Iran.

Uploaded by

DX DX
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

1

Hackers are not all the same; they range in skill, resources, and capability and often go by different names. How
would you classify this threat actor? Do they go by any aliases? Where are they from? How would you rate the
skill level and resources available to this threat actor?


 OilRig is an Iranian government backed group that is classified as an
Advanced Persistent Threat (APT) mainly because of their numerous
attacks with varying degrees of success. They are also known by different
names such Cobalt Gypsy, IRN2, Helix Kitten, Twisted Kitten and APT34.
In a Forbes report, the Counter Threat Unit of the cyber intelligence firm
SecureWorks is certain that OilRig is working for the Iranian government
while the Israeli IT firm ClearSky traced the group back to Iran. Most of
their operations are within Middle East but they also had success outside
the region and while most Iranian threat actors target government agencies
and dissidents, OilRig focuses on private industries outside of Iran. Since
OilRig is working with/for (Islamic Republic of) Iran, they are sure to have
enough resource to conduct any operation that is expected to be beneficial
for Iran. Like the Mabna Institute case, where an Iranian organization
(Mabna Institute) was subcontracted by the Islamic Revolutionary Guard
Corps to conduct a massive spear phishing campaign that resulted to a
total stolen value of $3.4 billion worth of Intellectual Property (IP) and 31.5
terabytes of academic data.

2
Hackers are motivated to act for specific reasons. What are the motivations of your threat actor? What is the
specific geo-political context they are operating in and what insight does that give you for why they are
operating in this manner?



According to Council on Foreign Relations, OilRig targets private-sector and
government entities for the purpose of espionage. Merriam-Webster defines
Espionage as the practice of spying or using spies to obtain information about the
plans and activities especially of a foreign government or a competing company. The
Cambridge Business English Dictionary define it as the activity of secretly collecting
and reporting information, especially secret political, military, business, or industrial
information. In a geo-political context, Iran has always disagreed with their
neighbors in the region and Western countries because of many reasons and
according to the Middle East Institute (MEI) “because of the Iranian Revolution of
1979, many countries stopped business with Iran and so stealing academic and
corporate information from around the globe allows it to renew infrastructure and
build technologies that it simply cannot purchase abroad, ranging from weaponry to
airplane parts.” Iran’s effort to tell their side of the story on issues is also not that
popular and because Iran is suffering from economic sanctions imposed on them,
they rely on what described by many as “soft war” (less regulated and low-level
conflict for extended periods of time) in the cyber space with public and private
sectors in rival countries as their target. MEI also assessed that Iran-linked actors are
likely to focus on two cyber operations in the medium and long term: foreign election
meddling and widespread theft of intellectual property (IP).

3
Description of the range of efforts used by OilRig to engage in the hacking process


 Reconnaissance :Research  Command & Control : Outside
identification and selection of targets server communicates with the weapons
providing “hands on keyboard
 Weaponization :Pairing remote access”inside the target’s network
access malware with exploit into a
deliverable playload  Action on Objective :OilRig
works to achieve the objective of the
 Delivery :Transmission of weapon to target’s intrusion , which can include
target exfiltration or destruction of data ,or
 Exploitation: Once delivered the intrusion of another target.
weapon’s code is triggered , exploiting
vulnerable applications or systems
 Installation :The weapon installs a
hackdoor on da target’s system allowing
persistent access

4
Sample Cases of OilRig attacks: The Hacking Process tactics on their targets and the Primary, Secondary and
Second Order Effects


 Case 1 - OilRig attack using AI Squared software
 Case 2 - OilRig attack impersonating Oxford
University
 Case 3 - OilRig attack on Al Elm and Samba
Financial Group
 Case 4 - OilRig attack on Job Hunters
 Case 5 - OilRig attack on Israeli IT vendors

5
Case 1 - OilRig attack using AI Squared software



A small, mission-driven tech firm AI Squared based in Vermont developed a software that
alters
 websites to help the visually impaired use the internet.
 Forbes reported
 that, AI Squared received a warning from security giant Symantec that certificates
 for technology that are designed to guarantee its authenticity had been compromised,
suggesting
 that a threat actor (OilRig) got hold of AI
 Squared's
 signing key and certificates which they used to
 disguise their own malware.
 The goal was to make use of the software for the visually impaired as their surveillance tool
and
 make it appear legitimate to security systems of their many targets across the Middle East,
Europe
 and the U.S.
 As a result
 , on an AI Squared website notification in 2017 says that their certificate has been
 revoked because the digital certificate used to certify newer ZoomText, and Window-Eyes
software
 products has been compromised.

6
Case 1 - OilRig attack using AI Squared software



Reconnaissance – The group has a wide range of Primary Effect - Exploitation of End Host
target on the Middle East, Europe, and the US and OilRig has infected a software for the visually
OilRig thought that AI Squared tech firm has the impaired with their malware for surveillance
software to help them reach their victims with purposes
ease.  Secondary Effects on Revenue, Reputation and
 Weaponization - OilRig is assumed to already have Macroeconomics
control over AI Squared’s signing key and Revenue - Since the software is infected with
certificate and used the legitimate software as their OilRig's surveillance malware purchase would
own malware. now be lower than expected
 Delivery - Because of human compassion on Reputation - Customers would then find a
assisting visually impaired to access the internet, different software that offers the same kind of
most have considered to use the (already service
compromised) software by AI Squared.
 Macroeconomics - Because of the software getting
 Exploitation and Installation - People are bound to infected, there could be change of personnel who
install and use the software on their computers to work on the software
see if it is effective.
 Second Order Effect on Information / Perception
 Command & Control - The victims who use the
software (malware) are unknowingly feeding Everybody who already has access to the
information to the OilRig group which can then software might think that the company is a front
help them gain access to bigger networks. for spying purposes

7
Case 2 - OilRig attack impersonating Oxford University


 ClearSky
 reports
 that the OilRig group has created and registered two (2)
 fake Oxford University pages in November 2016, one claims to offer a job
 inside the institution, and the other is a conference sign-up website.
 Both pages encouraged the visitors to download files. One file is a
 requirement to complete a registration for the fake event and the other file
 is an Oxford University CV creator. Once clicked, victims are unknowingly
 feeding information to the
 OilRig's
 malware, named Helminth, allowing
 them to control the PC and steal data.

8
Case 2 - OilRig attack impersonating Oxford University


 Reconnaissance - OilRig is interested in hitting websites, OilRig now have collected their
many targets at one operation and so they victim’s basic information and gained access to
created fake Oxford University websites for their the computers infected with Helminth malware.
plan  Primary Effect - Exploitation of End Host
 Weaponization - OilRig created 2 fake Oxford  • OilRig thought of collecting personal
University websites; one claiming to offer jobs information through the fake Oxford Website
and the other is a registration site for a they created.
conference.  Secondary Effect on Reputation • Reputation -
 Delivery - People who are interested in working Oxford University's reputation is sure to be
for or attending a conference hosted by Oxford affected because their name and identifiers are
are sure to follow the bogus page requirements used in the fake website
 Exploitation and Installation - The victims, once  Second Order Effect on Information /
on the fake website/s are encouraged to fill-up Perception
what seem to be a normal registration form and  • It is an unfortunate event but everybody who
download files that are infected by OilRig’s sent personal information and registered in the
surveillance malware. fake Oxford websites would now pick different
 Command & Control - Because people have universities to be associated with.
registered and downloaded files from the fake

9
Case 3 - OilRig attack on Al Elm and Samba Financial Group


 According to a Forbes report on 2017, phishing attempts
were launched by the group on May 2016 from servers
within Saudi Arabian contractor and IT security Al-Elm.
The email was injected into a thread between Al-Elm and
one of Saudi Arabia’s lender, Samba Financial Group. The
email contained a version of OilRig’s Helminth
surveillance kit, which would launch as soon as a
recipient opened an attached document, in this case an
Excel file called “notes.xls.” In the case of Al-Elm, analysis
of the headers of the phishing emails indicated they
originated from within the sender’s organization and "the
threat actor previously compromised those
organizations," according to SecureWorks intelligence
analyst Allison Wikoff.
10
Case 3 - OilRig attack on Al Elm and Samba Financial Group



Reconnaissance - The target here is the Samba  Primary Effect - Exploitation of End Host
Financial Group which has reported $290 Through phishing attempts, OilRig has sent
million profit from last quarter of the previous an email with Helminth surveillance kit to Al-
year Elm Security and Samba Financial Group
 Weaponization - The OilRig group chose to Secondary Effects on Remediation /
use the “previously compromised” network of Reputation
Al-Elm to establish a connection with Samba  Remediation - The infected devices from both
Financial Group ends would now be scanned, cleaned and
 Delivery - An email with the OilRig’s possibly replaced depending on how much it
Helminth surveillance kit was injected into a got affected
thread of email between Al-Elm and Samba  Reputation - The reputation of the IT security
Financial Group firm is to be affected because they are
 Exploitation and Installation - Once the email supposed prevent threat actors from getting in
has been sent, people who open the attached between them and their clients
excel file named “notes.xls” will have their  Second Order Effect on Information /
computer infected with the Helminth Perception
surveillance kit.  Because of the phishing emails sent, both
 Command & Control - Everything might seem companies would now be very cautious in
normal after opening the email but once the doing future business partnership.
surveillance kit has been installed, OilRig has
now gained access to that computer and
possibly the company’s network.

11
Case 4 - OilRig attack on Job Hunters


 From the same report from previous case, cyber
intelligence firm SecureWorks who calls the OilRig crew
Cobalt Gypsy said that the group has been sending out
messages loaded with malware from legitimate email
addresses belonging to one of Saudi Arabia's biggest IT
suppliers, the National Technology Group, and an
Egyptian IT services firm, ITWorx. From those email
accounts, an unnamed Middle East entity was targeted
with messages promising links to job offers. Hidden in
the attachments was PupyRAT, an open-source remote
access trojan (RAT) that works across Android, Linux and
Windows platforms.
12
Case 4 - OilRig attack on Job Hunters

 Reconnaissance - The OilRig’s target is an


 which is infected with an open-source remote
unnamed entity but they chose to launch the access trojan
attack on the Middle East  Secondary Effect on Reputation Reputation -
 Weaponization - OilRig group chose to use The job offers might be legitimate, but the job
Saudi Arabia’s IT supplier, National hunters would now think twice on joining the
Technology Group and Egypt’s IT service firm IT firms because they would trace the source
ITWorx to send an email loaded with of the PupyRAT to their devices from links
malware. inside the email.
 Delivery - OilRig used email addresses  Second Order Effect on Information /
belonging to the IT firms to send enticing job Perception
offer to their victims.  The firms might get the reputation of spying
 Exploitation and Installation – When receivers on their current and future employees and
open the email, hidden in the email link customers
attachments was an opensource remote access
trojan.
 Command & Control - Once the link has been
accessed, the malware would then begin the
process of collecting credentials from the user
and the computer.
 Primary Effect - Exploitation of End Host
 OilRig has sent emails from legitimate IT
firms to various targets with links to job offers

13
Case 5 - OilRig attack on Israeli IT vendors


 According to the ClearSky research team, OilRig has
sent emails to several targeted Israeli IT Vendors
using a compromised account. It is a basic email
requesting help with details of the supposed
customer and when logging in with the credentials
the victim is asked to install a legitimate Juniper
VPN software bundled with Helminth; a malware
commonly used by the group for surveillance
purposes.

14
Case 5 - OilRig attack on Israeli IT vendors



Reconnaissance - The OilRig’s target is Israel Israeli networks, and so they disguised
and they think that attacking IT vendors could themselves as customers who need assistance
help them infiltrate important networks  Secondary Effect on Remediation
 Weaponization - It is assumed that OilRig  Remediation - Because it is their job to keep
already has access to compromised customer customers satisfied, some employees of the
accounts from various Israeli IT vendors. firms might have followed the threat actor's
 Delivery - The group sends an email to the instructions. As a result, firms may have to
vendors disguising themselves as legitimate check, clean and/or replace their devices
customers asking for help.  Second Order Effect on Information /
 Exploitation and Installation - When the Perception
victims try to access the user’s account with  Because the malware Helminth is attached to
their provided credentials, the victim is then a legitimate Juniper VPN, people who use the
asked to download a Juniper VPN to proceed. VPN might be worried that their devices are
The legitimate Juniper VPN they provide is infected with the surveillance malware too.
bundled with their surveillance malware
Helminth.
 Command & Control - When successfully
installed, OilRig would then have access to the
device and many other client/customer emails
that use their services.
 Primary Effect - Exploitation of End Host
 OilRig would be interested in infiltrating

15
Not all hackers represent a strategic problem for policy makers. How would you characterize your threat actor,
are they chiefly a private problem for businesses or a public concern for policy makers? How should policy
makers respond?


 OilRig is clearly an Advanced Persistent Threat (APT) because of the range of their targets.
Their main activity is espionage, they do not engage in destroying, wiping, or altering
whatever they get an access to, but instead they just sit back and relax while their Helminth
malware does its job. Most of their espionage activities have resulted in stolen information
using compromised email. OilRig is interested in targeting private industries and their
tactics are very subtle, mostly through phishing. They are a clear threat to businesses but
because these companies have connections with private citizens, public and other types of
institutions, one email could be their way into a government office or a corporate giant,
making them both a private problem and a public concern for policy makers. Since OilRig
has been identified as a threat actor from Iran, imposing more economic sanctions would
be the appropriate response. One country could only do so much to try and get Iran to pay
for any harm done through cyber espionage. It is possible but might be a really long
process and when any secrets are compromised, it could never be replaced. Policy makers
could also make a collective effort to punish and discourage threat actors through treaties,
it could be with Iran if they accept or with countries that also have an issue with threat
actors from Iran. If a group of countries want to make a different version of the Iran
Nuclear Deal in the future, it should not include any monetary incentives but instead, there
should be clear punishments for any cyber related activities like espionage coming from
any group that could be traced back or is sponsored by Iran.
16
RESOURCES

 https://attack.mitre.org/groups/G0049/
https://www.forbes.com/sites/thomasbrewster/2017/02/15/
oilrig-iran-hackers-cyberespionage-usturkey-saudi-
arabia/?sh=4c88925f468a
https://www.justice.gov/opa/pr/nine-iranians-charged-
conducting-massive-cyber-theft-campaignbehalf-islamic-
revolutionary https://microsites-live-
backend.cfr.org/interactive/cyber-operations/oilrig
https://www.merriam-webster.com/dictionary/espionage
https://dictionary.cambridge.org/us/dictionary/english/espi
onage https://www.mei.edu/publications/irans-cyber-future
https://www.clearskysec.com/oilrig/
https://www.cfr.org/backgrounder/what-iran-nuclear-deal

17

You might also like