Several companies have been targeted as part of the widespread Iran-linked Fox Kitten offensive campaign. The campaign, which has been running for at least three years, has been orchestrated against companies from the IT, telecoms, old & gas, aviation, government, and security sectors globally.
Which threat actor groups are involved?
A new report published by Israeli cybersecurity firm ClearSky has revealed that the purpose of the hacker groups involved in the campaign is to infiltrate and take control of critical corporate information. In the last three years, they have managed to do so by exploiting known vulnerabilities in systems with unpatched VPN and RDP services.
Researchers claim it to the be work of at least three Iranian groups - namely APT33 (Elfin, Shamoon), APT34 (Oilrig), and APT39 (Chafer).
The campaign infrastructure was used for the following purposes:
What’s new about the ongoing campaign?
Currently, the purpose of these attacks appears to perform reconnaissance and plant backdoors for surveillance operations. Researchers fear that access to all of these infected enterprise networks could also be weaponized in the future to deploy data-wiping malware.
Additionally, the groups have developed good technical offensive capabilities and are now able to exploit 1-day vulnerabilities in relatively short periods of time, starting from several hours to a week or two.
Types of hacking tools used in the campaign
The list of privilege escalation tools used by hackers includes ‘Juicy Potato,’ Procdump, Mimikatz, and Sticky Keys.
The threat actors also leveraged legitimate sysadmin software like Putty, Plink, Ngrok, Serveo or FRP to infiltrate corporate networks.
ClearSky’s further investigation also found tools like:
How widespread is the campaign?
Researchers claim that the campaign will be more significant in 2020 as there will be a discovery of new vulnerabilities in VPNs and other remote systems. This means that Iranian hackers will most likely target SonicWall SRA and SMA VPN servers in the future as these products are impacted by six vulnerabilities.
Publisher