Iranian Cyberespionage Group OilRig Exploits Windows Kernel Vulnerability to Target Gulf Governments

Iranian cyberespionage group OilRig, also known as APT34 or Helix Kitten, is ramping up its attacks on government entities in the Gulf region, according to a recent report by cybersecurity firm Trend Micro. This group has been linked to several operations aligned with Iranian state interests, with a focus on critical infrastructure, especially in energy sectors.

Escalating Cyberattacks in the Gulf Region

OilRig’s operations have become more aggressive in recent months. Their recent targets include government sectors in the United Arab Emirates (UAE) and other Gulf nations. A hallmark of these operations is the deployment of a sophisticated backdoor through vulnerable Microsoft Exchange servers.

This backdoor enables OilRig to exfiltrate credentials and maintain persistence within the targeted systems. One of the techniques they use includes exploiting CVE-2024-30088, a Windows kernel elevation of privilege vulnerability that Microsoft patched in June 2024.

New Techniques in Cyber Espionage

OilRig has refined its approach by taking advantage of newly discovered vulnerabilities and advanced tools. Among their tactics:

  • Dropped password filter policy: OilRig extracts clean-text passwords, making it easier to steal credentials.
  • Ngrok for tunneling: This remote monitoring tool allows the group to maintain persistent access to compromised networks.
  • Exploiting CVE-2024-30088: OilRig uses this vulnerability to elevate privileges within the system, increasing their control.

One of the primary entry points for these attacks is a vulnerable web server, which the group uses to upload a web shell. This allows them to execute PowerShell commands, enabling file downloads and uploads to and from the server.

Compromising Critical Systems

Once inside the network, OilRig uses Ngrok for lateral movement, ultimately compromising the Domain Controller. By doing so, they gain access to key systems, including Microsoft Exchange Servers, where they harvest credentials. These credentials are then exfiltrated via email, with attackers using compromised domain accounts to route the stolen data through government servers.

Supply Chain Attacks: A Growing Threat

OilRig’s attack strategies do not stop at single organizations. The group has been known to leverage compromised accounts to launch supply chain attacks. This tactic allows them to use infected systems to launch phishing campaigns against other targets. The potential ripple effect could extend beyond the Gulf region, impacting a broader array of sectors.

OilRig’s increasingly sophisticated tactics, combined with their focus on exploiting unpatched vulnerabilities like CVE-2024-30088, represent a significant threat to governments and critical infrastructure. As cyberattacks become more advanced, it is crucial for organizations to stay vigilant, applying security patches promptly and reinforcing cybersecurity measures to defend against these evolving threats.

The Iranian group’s ability to evolve and refine their strategies highlights the growing complexity of cyber warfare, and the importance of international cooperation to address these persistent threats.

October 14, 2024
Loading...

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.