APT

Tracking Iran-linked APT33 group via its own VPN networks

APT33, the Iran-linked APT group, has been using multiple layers of obfuscation to run a dozen live C2 servers for extremely targeted attacks.

APT33, the Iran-linked APT group, has been using multiple layers of obfuscation to run a dozen live C2 servers involved in extremely targeted malware attacks.

The targeted malware campaigns aimed at organizations in the Middle East, the U.S., and Asia.

The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation industry and energy companies with connections to petrochemical production. Most of the targets were in the Middle East, others were in the U.S., South Korean, and Europe. 

The nation-state actors are using small botnets composed of up to a dozen infected computers to gain persistence within the target networks.

“The malware is rather basic, and has limited capabilities that include downloading and running additional malware.” reads the analysis published by Trend Micro. “Among active infections in 2019 are two separate locations of a private American company that offers services related to national security, from a university and a college in the U.S., a victim most likely related to the U.S. , and several victims in the Middle East and Asia.”

According to a report published by the experts from Recorder Future in July, Iran-linked cyberespionage group APT33 has updated its infrastructure after the publication of a report detailing its activities.

The APT group recently targeted organizations in the oil and aviation industries, a private American company that offers services related to national security, victims connected to a university and a college in the US, a victim most likely related to the US military, and several entities in the Middle East and Asia.

While investigating the attacks, the experts from Trend Micro collected useful information to understand how APT33 manages its hacking infrastructure.

The command and control infrastructure was layered and isolated to remain under the radar and make harder investigation and takedown from security firms and law enforcement agencies.

The above scheme shows that the APT group leverage a VPN layer build with a custom-built network of VPN nodes, APT33 was operating its own private VPN network.

“Threat actors often use commercial VPN services to hide their whereabouts when administering C&C servers and doing reconnaissance. But besides using VPN services that are available for any user, we also regularly see actors using private VPN networks that they set up for themselves.” continues the post. “APT33 likely uses its VPN exit nodes exclusively. We have been tracking some of the group’s private VPN exit nodes for more than a year and we have listed known associated IP addresses in the table below. “

Trend Micro has been tracking some of the group’s private VPN exit nodes for more than a year, below the list of IP addresses associated with the group’s activity.

IP addressFirst seenLast seen
5.135.120.5712/4/181/24/19
5.135.199.253/3/193/3/19
31.7.62.489/26/189/29/18
51.77.11.467/1/197/2/19
54.36.73.1087/22/1910/05/19
54.37.48.17210/22/1911/05/19
54.38.124.15010/28/1811/17/18
88.150.221.1079/26/1911/07/19
91.134.203.599/26/1812/4/18
109.169.89.10312/2/1812/14/18
109.200.24.11411/19/1812/25/18
137.74.80.2209/29/1810/23/18
137.74.157.8412/18/1810/21/19
185.122.56.2329/29/1811/4/18
185.125.204.5710/25/181/14/19
185.175.138.1731/19/191/22/19
188.165.119.13810/8/1811/19/18
193.70.71.1123/7/193/17/19
195.154.41.721/13/191/20/19
213.32.113.1596/30/199/16/19
216.244.93.13712/10/1812/21/18

The private VPN exit nodes were used to send command to the malware as well as for reconnaissance of networks that are relevant to the supply chain of the oil industry and military hospitals in the Middle East.

“APT33 also has a clear interest in websites that specialize in the recruitment of employees in the oil and gas industry,” concludes Trend Micro. “We recommend companies in the oil and gas industry to cross-relate their security log files with the IP addresses listed above.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – APT33, VPN)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

7 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

8 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

18 hours ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

1 day ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

1 day ago

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

Japan's CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads…

1 day ago

This website uses cookies.