Helix Kitten
بچه گربه هلیکس
Formationc. 2004–2007
TypeAdvanced persistent threat
PurposeCyberespionage, cyberwarfare
MethodsZero-days, spearphishing, malware
Official language
Persian
AffiliationsAPT33
Formerly called
APT34

Helix (also known as APT34 by FireEye, OILRIG, Crambus, Cobalt Gypsy, Hazel Sandstorm (formerly EUROPIUM)[1]) is a hacker group identified by CrowdStrike as Iranian.[2][3]

History

The group has reportedly been active since at least 2014.[2] It has targeted many of the same organizations as Advanced Persistent Threat 33, according to John Hultquist.[2]

In April 2019, APT34's cyber-espionage tools' source code was leaked through Telegram.[4][5]

Targets

The group has reportedly targeted organizations in the financial, energy, telecommunications, and chemical industries, as well as critical infrastructure systems.[2]

Techniques

APT34 reportedly uses Microsoft Excel macros, PowerShell-based exploits and social engineering to gain access to its targets.[2]

References

  1. https://thehackernews.com/2023/12/iranian-state-sponsored-oilrig-group.html?m=1
  2. 1 2 3 4 5 Newman, Lily Hay (December 7, 2017). "APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure". Wired. Archived from the original on December 10, 2017.
  3. Sardiwal, Manish; Londhe, Yogesh; Fraser, Nalani; Fraser, Nicholas; O'Leary, Jaqueline; Cannon, Vincent (December 7, 2017). "New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit". FireEye. Archived from the original on December 10, 2017.
  4. Catalin Cimpanu (April 17, 2019). "Source code of Iranian cyber-espionage tools leaked on Telegram; APT34 hacking tools and victim data leaked on a secretive Telegram channel since last month". ZDNet. Retrieved April 24, 2019.
  5. "How companies – and the hackers themselves – could respond to the OilRig leak". 18 April 2019.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.