Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » MOIS-Linked Iranian APT UNC1860 Facilitates Middle East Cyber ​​Infiltrations
Global Security

MOIS-Linked Iranian APT UNC1860 Facilitates Middle East Cyber ​​Infiltrations

AdminBy AdminSeptember 20, 2024No Comments5 Mins Read
Iranian APT UNC1860
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Iranian APT UNC1860

An Iranian Advanced Persistent Threat (APT) threat actor believed to be affiliated with the Ministry of Intelligence and Security (MOIS) is now acting as an initial access broker providing remote access to targeted networks.

Google-owned Mandiant tracks a cluster of pseudonymous activity UNC1860which he says has similarities to intrusion kits tracked by Microsoft, Cisco Talos and Check Point as Storm-0861 (formerly DEV-0861), Shrouded Snooperand Scarred Manticorerespectively.

“A key feature of the UNC1860 is its set of specialized tools and passive backdoors, which (…) support several purposes, including its role as a likely initial access provider and its ability to gain persistent access to high-priority networks such as those in government and telecommunications space throughout the Middle East,” the company said.

The group was first born in July 2022 in connection with devastating cyberattacks targeting Albania, with a ransomware strain called ROADSWEEP, the CHIMNEYSWEEP backdoor and a ZEROCLEAR wiper variant (aka Cl Wiper), with subsequent invasions in Albania and Israel using new wipers called No-Justice and BiBi (aka BABYWIPER).

Mandiant described UNC1860 as a “robust threat” that maintains an arsenal of passive backdoors designed to infiltrate victims’ networks and establish long-term access without attracting attention.

Among the tools are two GUI malware controllers tracked as TEMPLEPLAY and VIROGREEN, which are said to allow other MOIS-related threat actors to remotely access the victim’s environment via Remote Desktop Protocol (RDP).

In particular, these controllers are designed to provide third-party operators with an interface that offers instructions on how a custom payload can be deployed and how post-operational activities such as internal scanning can be performed on the target network.

Cyber ​​security

Mandiant said it found similarities between UNC1860 and APT34 (aka Hazel Sandstorm, Helix Kitten and OilRig) in that organizations compromised by the latter in 2019 and 2020 were previously penetrated by UNC1860, and vice versa. In addition, both clusters were recently seen turning to facilities based in Iraq highlighted through Check Point.

Attack chains include using the initial access gained through opportunistic exploitation of vulnerable Internet servers to drop webshells and droppers such as STAYSHANTE and SASHEYAWAY, the latter leading to the execution of implants such as TEMPLEDOOR, FACEFACE and SPARKLOAD embedded within it .

“VIROGREEN is a custom framework used to exploit vulnerable SharePoint servers CVE-2019-0604“, the researchers said, adding that it controls STAYSHANTE along with a backdoor called BASEWALK.

“The framework provides post-exploitation capabilities including (…) post-exploitation payload control, backdoors (including the STAYSHANTE webshell and the BASEWALK backdoor) and tasks; control of a compatible agent regardless of how the agent was implanted; and command execution and file upload/download.

TEMPLEPLAY (the internal name of Client Http), for its part, serves as a .NET-based controller for TEMPLEDOOR. It supports backdoor instructions to execute commands via cmd.exe, upload/download files to and from the infected host, and proxy connections to the target server.

Iranian APT UNC1860

The adversary is assumed to have at his disposal a diverse collection of passive tools and mainstage backdoors that meet his objectives of initial access, lateral movement, and intelligence gathering.

Some of the other noteworthy tools documented by Mandiant are listed below –

  • OATBOAT, a loader that loads and executes shellcode payloads
  • TOFUDRV, a malicious Windows driver that intersects with WINTAPIX
  • TOFULOAD, a passive implant that uses undocumented input/output control (IOCTL) commands for communication.
  • TEMPLEDROP, a modified version of Iranian anti-virus software, a Windows file system filter driver called Sheed AV used to protect the files it deploys from being modified
  • TEMPLELOCK, a .NET security evasion utility capable of stopping the Windows Event Log service
  • TUNNELBOI, a network controller capable of establishing a connection to a remote host and managing RDP connections

“As tensions continue to ebb and flow in the Middle East, we believe this actor’s agility in gaining initial access to target environments is a valuable asset to Iran’s cyber ecosystem that can be leveraged to meet challenges that evolve as needs change “, – researcher Stav Shulman, said Matan Mimran, Sarah Bock and Mark Lehtik.

Iranian APT UNC1860

This event happened after the US government disclosed the Iranian threats ongoing attempts to influence and undermine the upcoming US election by stealing non-public campaign materials of former President Donald Trump.

“Iranian attackers in late June and early July sent unsolicited emails to individuals associated with President Biden’s campaign at the time that contained excerpts of stolen, non-public materials from former President Trump’s campaign as the body of the emails,” the government said. said.

Cyber ​​security

“There is currently no information on whether these recipients have responded. In addition, Iranian hackers have continued their efforts since June to send stolen non-public materials related to former President Trump’s campaign to the US media.”

Iran’s ramping up of its cyber operations against perceived adversaries also comes at a time when the country is becoming increasingly active in the Middle East.

Late last month, the US Cybersecurity and Infrastructure Security Agency (CISA) warned that the Iranian APT Lemon Sandstorm (aka Fox Kitten) carried out ransomware attacks in secret with the groups NoEscape, RansomHouse and BlackCat (aka ALPHV).

Censys analysis of the hacker group’s attack infrastructure has since identified other, currently active hosts that are likely part of it based on commonalities based on geolocation, Autonomous System Numbers (ASNs), and identical port patterns and digital certificates.

“Despite attempts at obfuscation, distraction and randomness, people still need to build, manage and decommission digital infrastructure,” Matt Lambright of Censys said.

“These people, even if they rely on technology to generate randomization, will almost always follow some pattern, whether it’s similar autonomous systems, geolocation, hosting providers, software, port allocation, or certificate specifications.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025

CISA adds 3 flaws to KEV directory, affecting AMI Megarac, D-Link, Fortinet

June 26, 2025

WhatsApp adds resumes that run on AI, for faster preview chat

June 26, 2025

Noauth vulnerability by -still affects 9% Microsoft Entra Saas applications two years after opening

June 25, 2025

Citrix releases emergency patches for actively exploited CVE-2025-6543 in ADC NetsCale

June 25, 2025

Citrix bleeding 2 defects provides tokens theft; Disadvantages SAP GUI Risk sensitive to data, impact of data

June 25, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Why is built -in protection insufficient for modern data sustainability

June 26, 2025

Iranian APT35 hackers are oriented

June 26, 2025

Cyber-Cyber ​​Use open source tools to compromise financial institutions across Africa

June 26, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.