Iran-Based Cyber Actors Enabling Ransomware Attacks on US Organizations

Iran-based cyber actors are believed to be affiliated with the Government of Iran (GOI), have been conducting cyber intrusions targeting US organizations.

Iran-Based Cyber Actors Enabling Ransomware Attacks on US Organizations
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 28, 2024, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) issued a joint Cybersecurity Advisory (CSA) warning about ongoing malicious activities by Iran-based cyber actors. These actors, believed to be affiliated with the Government of Iran (GOI), have been conducting cyber intrusions targeting US organizations across multiple sectors, including education, finance, healthcare, and defence. Their activities are primarily aimed at obtaining and maintaining access to networks, which are then leveraged by ransomware affiliates to deploy encryption attacks.

Report Overview

The Iran-based cyber actors, known by names such as Pioneer Kitten, Fox Kitten, and UNC757, have been active since 2017. Their operations have consistently targeted organizations in the United States and other countries like Israel, Azerbaijan, and the United Arab Emirates. The FBI’s analysis indicates that a significant portion of these operations is focused on providing network access to ransomware affiliates, facilitating encryption operations in exchange for a share of ransom payments.

The actors employ a variety of tactics, techniques, and procedures (TTPs) to gain initial access, persist, and evade detection on victim networks. They frequently exploit vulnerabilities in internet-facing devices, such as Citrix Netscaler, F5 BIG-IP, and Palo Alto Networks GlobalProtect VPN devices. Once inside, they deploy webshells, capture credentials, and create malicious accounts to establish long-term access.

The group’s recent activities have included mass scanning for vulnerabilities in Check Point Security Gateways and Palo Alto Networks’ devices. They have been observed leveraging the Shodan search engine to identify targets and deploying tools like NGROK and Ligolo for tunnelling and maintaining command and control (C2) over compromised systems. The FBI has also reported the group’s use of open-source tools like Meshcentral and AnyDesk for remote access.

The consequences of these intrusions are severe. Victim organizations face the threat of ransomware attacks, data theft, and prolonged unauthorized access to their networks. The ransomware affiliates, including groups like NoEscape, Ransomhouse, and ALPHV (aka BlackCat), collaborate closely with the Iranian actors to execute encryption operations, lock networks, and extort victims for payments. These activities pose a significant risk to the affected sectors, potentially disrupting critical services and exposing sensitive data.

Insights and Analysis

The advisory underscores that the group’s ransomware activities are independent of the Iranian government’s directives. However, their actions are aligned with Iranian state interests, mainly when targeting defence sectors and organizations in the Middle East. The group’s affiliation with the GOI is evident in their non-ransomware activities, which focus on stealing sensitive technical data from targeted networks.

Organizations are urged to apply patches for known vulnerabilities, particularly those in Citrix Netscaler, F5 BIG-IP, and Palo Alto Networks devices. Additionally, network defenders should review logs for indicators of compromise (IOCs) provided in the advisory and validate their security controls against the TTPs outlined by the FBI and CISA.

The joint advisory from the FBI, CISA, and DC3 highlights the ongoing threat posed by Iran-based cyber actors who collaborate with ransomware affiliates to target US organizations. By following the recommended mitigations and remaining vigilant, organizations can better defend against these malicious activities and protect their critical assets.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
138.68.90[.]19IP AddressObserved in use by the actors from January 2024 to August 2024.
167.99.202[.]130IP AddressObserved in use by the actors from January 2024 to August 2024.
78.141.238[.]182IP AddressObserved in use by the actors from July 2024 to August 2024.
51.16.51[.]81IP AddressObserved in use by the actors from January 2024 to August 2024.
api.gupdate[.]netDomainObserved in use by the actors from September 2022 to August 2024.
githubapp[.]netDomainObserved in use by the actors from February 2024 to August 2024.

MITRE ATT&CK Tactics and Techniques

TacticTechniqueIDDescription
ReconnaissanceSearch Open Technical DatabasesT1596The actors used Shodan to identify internet infrastructure vulnerabilities.
Initial AccessExploit Public-Facing ApplicationT1190Exploitation of Citrix Netscaler, F5 BIG-IP, and other devices.
PersistenceServer Software Component: Web ShellT1505.003Webshells deployed on compromised Netscaler devices.
Credential AccessInput CaptureT1056Capturing login credentials using webshells on compromised devices.
Command and ControlRemote Access SoftwareT1219Deployment of Meshcentral and AnyDesk for remote access.
Defense EvasionImpair Defenses: Disable or Modify ToolsT1562.001Disabling antivirus and security software using admin credentials.
DiscoveryQuery RegistryT1012Exporting registry hives and network firewall configurations.
ImpactData Encrypted for ImpactT1486Collaboration with ransomware affiliates to lock victim networks.

References

Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations | CISA

https://www.ic3.gov/Media/News/2024/240828.pdf