APT34     , also known as Cobalt Gypsy   , Hazel Sandstorm , Helix Kitten  , and OilRig  , is an Iranian threat actor that has recently been linked to a new phishing attack  .
APT34 has a history of targeting sectors such as telecommunications, government    , defense     , oil    , and financial services in the Middle East since 2014    . They are known for their advanced attack technology and ability to design different intrusion methods for different targets , including supply chain attacks . A key characteristic of APT34 is its ability to create new and updated tools to avoid detection and maintain control over compromised hosts for extended periods .
In addition to the phishing attack involving SideTwist, APT34 has also been linked to spear-phishing lures that lead to the deployment of various backdoors. These lures have been used since 2014 and target sectors such as telecommunications, government    , defense     , oil    , and financial services in the Middle East    . APT34 is highly skilled and capable of designing different intrusion methods for various targets . They have also been known to utilize supply chain attacks.
Furthermore, APT34 used the identity of a marketing services company called Ganjavi Global Marketing Services (GGMS) in a phishing attack . They targeted enterprises using a variant of the SideTwist Trojan , which allowed them to gain control over victim hosts . The attack involved a decoy file named “GGMS Overview.doc” that contained a malicious macrocode . This macrocode extracted the Trojan and created an activation switch . The Trojan communicated with a CnC server at IP address 184.108.40.206:443 . The SideTwist variant exhibited differences in compilation but shared similarities with previous versions . It checked for the presence of an “update.xml” file and collected victim host information . The CnC communication involved encrypted instructions decoded using a multi-byte XOR key . The CnC IP address used in the attack belonged to the United States Department of Defense Network Information Center , suggesting APT34 may have used it for testing . This attack demonstrates APT34’s consistent methodology and adaptability .
Another phishing campaign has been discovered , which involves the deployment of a new variant of Agent Tesla. This campaign utilizes a specially crafted Excel document that exploits a six-year-old memory corruption vulnerability in Microsoft Office . It is worth noting that this vulnerability remains popular among threat actors.
Furthermore, a phishing attack has been identified that utilizes ISO image file lures to launch various malware strains, including Agent Tesla, LimeRAT , and Remcos RAT . This demonstrates the versatility and adaptability of threat actors in their attempts to compromise systems and gain unauthorized access.
The activities of APT34 highlight the ongoing threat posed by sophisticated threat actors. Organizations in sectors such as telecommunications , government    , defense     , oil    , and financial services in the Middle East should remain vigilant and implement robust security measures to mitigate the risk of attacks. Additionally, the discovery of new phishing campaigns and the continued exploitation of old vulnerabilities emphasize the need for regular security updates and employee awareness training. As threat actors continue to evolve their tactics, organizations must adapt and enhance their cybersecurity strategies to protect sensitive information and maintain the integrity of their systems.