Today I’d like to share a comparative analysis of
1. group_a: from 2016 to August 2017
2. group_b: from August 2017 to January 2018
3. group_c: from January 2018 to February 2018
4. group_d: from March 2019 to August 2019
The evaluation process would take care of the following Techniques: Delivery, Exploit, Install and Command. In order to better understand those technique definitions I would add official MITRE reference codes.
OilRig Description:
According to MITRE, OilRig is a threat group with suspected Iranian origins that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of industries, including financial, government, energy, chemical, and telecommunications, and has largely focused its operations within the Middle East. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. FireEye assesses that the group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests. This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity.
Delivery:
The main question to try to answer on the delivery stage is: “How does OilRig evolve in threat delivery over time ?” According to reports it looks like the attacker group made a nice direction change between group_a and group_b time frames. Indeed during the group_a, the main observed delivery techniques where about Phishing (rif.T1193) and Valid Accounts (rif.T1078). A Valid Account in this era (group_a) could be defined as the super-set of default credentials to exposed infrastructures or real user accounts found through alternative channels (such as: darknets, humint, etc.). From group_b to group_d time frame OilRig started a more sophisticated Spear Phishing (rif.T1193) campaigns within malicious attachments as their main threat delivery activity. The following image shows the threat delivery phases over timeline as described.
EThe main question to try to answer on the exploit section would be: “How does OilRig evolve in Exploit techniques over time ?”. According to reports it looks like the attack group made a quite big change from group_a to group_b time frames. Indeed on group_a the attacker mostly used to exploit Exposed Infrastructure (rif. T1388) , from group_b to group_d time frames OilRig used real Compromised User Accountsextracted by Malware (rif. T1386) and spread over spear phishing campaigns as shown on delivery section. The following image shows the evolution of the exploit phases over time.
Install:
The main question to try to answer on the Install section would be: “How does OilRig evolve in Installing their artifacts over the victim machines ?”. According to reports It looks like we have four differences between the four time frame groups. Maybe this technique is one of the most group characterizing technique and it could be used for post identification if you wish. The time frame group_a is definitely the most creative one in terms of used technique. Many techniques have been used since August 2017 such as: Command Line Interface (rif. T1059), ObfuscatedFiles (rif. T1027), WebShell (rif. T1100) and Timestomp (rif. T1099) in order to install Malicious actors.The time frame group_b focused its activities mainly on: process Hollowing (rif. T1093) and Scheduled Tasks (rif. T1053). On time frame group_c OilRig moved its attention on Scheduled Tasks (rif. T1053) while on time frame group_dit re-introduced the Command Line Interface (rif. T1059).The following image shows the evolution of the four classified time frames over time.
Command:
The most interesting historical evolution happened on Install and Control techniques. Indeed the group made huge improvements in Control techniques by building up layers of security in their objective. The group looks very harmonious on this stage, actually they developed layered software in order to improve what was already developed without apparently forking too much dissipating efforts. They begun development by introducing crafted communication protocol over DNS and later they added, to such a layer, encoding and encryption self build protocols. On the Installation phase the group followed the general trends even if the process Hollowing technique used on group_b is quite interesting and personally never seen, but according to reports (mostly from Unit42) they used such a technique even if it is generally attributed to Gorgon Group (which is another story..).
The original post and other interesting analysis are published on the Marco Ramilli’s blog:
https://marcoramilli.com/2019/08/07/oilrig-the-techniques-evolution-over-time/
About the author: Marco Ramilli, Founder of Yoroi
I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. During my PhD program I worked for US Government (@ National Institute of Standards and Technology, Security Division) where I did intensive researches in Malware evasion techniques and penetration testing of electronic voting systems.
I do have experience on security testing since I have been performing penetration testing on several US electronic voting systems. I’ve also been encharged of testing uVote voting system from the Italian Minister of homeland security. I met Palantir Technologies where I was introduced to the Intelligence Ecosystem. I decided to amplify my cybersecurity experiences by diving into SCADA security issues with some of the biggest industrial aglomerates in Italy. I finally decided to found Yoroi: an innovative Managed Cyber Security Service Provider developing some of the most amazing cybersecurity defence center I’ve ever experienced! Now I technically lead Yoroi defending our customers strongly believing in: Defence Belongs To Humans
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]