Iranian Cyberespionage Group OilRig Exploits Windows Kernel Vulnerability to Target Gulf Governments
Iranian cyberespionage group OilRig, also known as APT34 or Helix Kitten, is ramping up its attacks on government entities in the Gulf region, according to a recent report by cybersecurity firm Trend Micro. This group has been linked to several operations aligned with Iranian state interests, with a focus on critical infrastructure, especially in energy sectors.
Table of Contents
Escalating Cyberattacks in the Gulf Region
OilRig’s operations have become more aggressive in recent months. Their recent targets include government sectors in the United Arab Emirates (UAE) and other Gulf nations. A hallmark of these operations is the deployment of a sophisticated backdoor through vulnerable Microsoft Exchange servers.
This backdoor enables OilRig to exfiltrate credentials and maintain persistence within the targeted systems. One of the techniques they use includes exploiting CVE-2024-30088, a Windows kernel elevation of privilege vulnerability that Microsoft patched in June 2024.
New Techniques in Cyber Espionage
OilRig has refined its approach by taking advantage of newly discovered vulnerabilities and advanced tools. Among their tactics:
- Dropped password filter policy: OilRig extracts clean-text passwords, making it easier to steal credentials.
- Ngrok for tunneling: This remote monitoring tool allows the group to maintain persistent access to compromised networks.
- Exploiting CVE-2024-30088: OilRig uses this vulnerability to elevate privileges within the system, increasing their control.
One of the primary entry points for these attacks is a vulnerable web server, which the group uses to upload a web shell. This allows them to execute PowerShell commands, enabling file downloads and uploads to and from the server.
Compromising Critical Systems
Once inside the network, OilRig uses Ngrok for lateral movement, ultimately compromising the Domain Controller. By doing so, they gain access to key systems, including Microsoft Exchange Servers, where they harvest credentials. These credentials are then exfiltrated via email, with attackers using compromised domain accounts to route the stolen data through government servers.
Supply Chain Attacks: A Growing Threat
OilRig’s attack strategies do not stop at single organizations. The group has been known to leverage compromised accounts to launch supply chain attacks. This tactic allows them to use infected systems to launch phishing campaigns against other targets. The potential ripple effect could extend beyond the Gulf region, impacting a broader array of sectors.
OilRig’s increasingly sophisticated tactics, combined with their focus on exploiting unpatched vulnerabilities like CVE-2024-30088, represent a significant threat to governments and critical infrastructure. As cyberattacks become more advanced, it is crucial for organizations to stay vigilant, applying security patches promptly and reinforcing cybersecurity measures to defend against these evolving threats.
The Iranian group’s ability to evolve and refine their strategies highlights the growing complexity of cyber warfare, and the importance of international cooperation to address these persistent threats.








