Iranian Group OilRig Targets Iraqi Government
Iraqi government networks have become targets of an elaborate cyber attack campaign orchestrated by the Iranian state-sponsored threat actor, OilRig. This group, also known as APT34, has been operational since at least 2014, specializing in phishing attacks and custom malware for information theft in the Middle East.
Key Targets and Malware Used
The latest attack focuses on prominent Iraqi organizations, including the Prime Minister's Office and the Ministry of Foreign Affairs. According to cybersecurity company Check Point, OilRig has deployed new malware families, Veaty and Spearal, specifically designed for this campaign.
Veaty and Spearal Capabilities
- Veaty: Using email for command-and-control (C2) communications, Veaty can download files and execute commands via compromised mailboxes in the gov-iq.net domain.
- Spearal: A .NET backdoor leveraging DNS tunneling for C2, allows execution of PowerShell commands, data retrieval, and file manipulation.
Attack Methodology
The attack begins with deceptive files disguised as harmless documents like "Avamer.pdf.exe" or "IraqiDoc.docx.rar." These files, when executed, initiate the deployment of Veaty and Spearal through intermediate scripts. This infection pathway likely involves social engineering tactics, tricking individuals into opening malicious files.
Unique C2 Mechanisms
OilRig's toolset includes unique C2 mechanisms, such as:
- Custom DNS tunneling protocol: Encodes data in DNS queries using a Base32 scheme.
- Email-based C2 channel: Utilizes compromised accounts within targeted organizations to exfiltrate data and issue commands, a tactic previously seen with OilRig's other backdoors like Karkoff and PowerExchange.
Check Point also uncovered an HTTP-based backdoor, CacheHttp.dll, which targets Microsoft's Internet Information Services (IIS) servers, executing commands upon specific web request events.
Intentions and Implications
This campaign underscores the sustained focus of Iranian threat actors on regional cyber espionage. By developing specialized C2 mechanisms, OilRig demonstrates deliberate efforts to maintain robust and covert operations within targeted networks. The use of compromised email accounts and sophisticated tunneling protocols signifies the group's intent to conduct long-term espionage and data theft.
Understanding the Terminology
- Social Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security. Example: An email pretending to be from a trusted source urging you to open an attachment.
- Phishing Attacks: Fraudulent attempts to obtain sensitive information by disguising as a trustworthy source in electronic communications. Example: An email that looks like it's from your bank asking for account details.
- DNS Tunneling: A method of using the Domain Name System (DNS) protocol to encode data and send information discreetly. Imagine sending secret messages hidden in normal web traffic.
This analysis highlights the continued evolution and threat of state-sponsored cyber groups targeting geopolitical adversaries, illustrating the need for robust cybersecurity defenses and awareness.