OilRig is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. The group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.[1][2][3][4][5][6][7]
| Name | Description |
|---|---|
| COBALT GYPSY | |
| IRN2 | |
| APT34 |
This group was previously tracked under two distinct groups, APT34 and OilRig, but was combined due to additional reporting giving higher confidence about the overlap of the activity.[7][1][10] |
| Helix Kitten | |
| Evasive Serpens | |
| Hazel Sandstorm | |
| EUROPIUM | |
| ITG13 | |
| Earth Simnavaz | |
| Crambus | |
| TA452 |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 | ||
| Enterprise | T1555 | 从密码存储中获取凭证 |
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] |
|
| .003 | Credentials from Web Browsers |
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] OilRig has also used tool named PICKPOCKET to dump passwords from web browsers.[18] |
||
| .004 | Windows Credential Manager |
OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.[18] |
||
| Enterprise | T1036 | 伪装 |
OilRig has used .doc file extensions to mask malicious executables.[10] |
|
| Enterprise | T1137 | .004 | 办公应用启动: Outlook Home Page |
OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse.[19] |
| Enterprise | T1573 | .002 | 加密通道: Asymmetric Cryptography |
OilRig used the Plink utility and other tools to create tunnels to C2 servers.[16] |
| Enterprise | T1572 | 协议隧道 |
OilRig has used the Plink utility and other tools to create tunnels to C2 servers.[6][16][18] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
A OilRig macro has run a PowerShell command to decode file contents. OilRig has also used certutil to decode base64-encoded files on victims.[1][20][21][22] |
|
| Enterprise | T1059 | 命令与脚本解释器 |
OilRig has used various types of scripting for execution.[1][23][21][7][24] |
|
| .001 | PowerShell |
OilRig has used PowerShell scripts for execution, including use of a macro to run a PowerShell command to decode file contents.[1][20][9] |
||
| .003 | Windows Command Shell |
OilRig has used macros to deliver malware such as QUADAGENT and OopsIE.[1][23][21][7][24] OilRig has used batch scripts.[1][23][21][7][24] |
||
| .005 | Visual Basic |
OilRig has used VBScript macros for execution on compromised hosts.[10] |
||
| Enterprise | T1008 | 回退信道 |
OilRig malware ISMAgent falls back to its DNS tunneling mechanism if it is unable to reach the C2 server over HTTP.[23] |
|
| Enterprise | T1120 | 外围设备发现 |
OilRig has used tools to identify if a mouse is connected to a targeted system.[10] |
|
| Enterprise | T1133 | 外部远程服务 |
OilRig uses remote services such as VPN, Citrix, or OWA to persist in an environment.[16] |
|
| Enterprise | T1201 | 密码策略发现 |
OilRig has used net.exe in a script with |
|
| Enterprise | T1113 | 屏幕捕获 |
OilRig has a tool called CANDYKING to capture a screenshot of user's desktop.[16] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS |
OilRig has used DNS for C2 including the publicly available |
||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] |
| .004 | 操作系统凭证转储: LSA Secrets |
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] |
||
| .005 | 操作系统凭证转储: Cached Domain Credentials |
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] |
||
| Enterprise | T1110 | 暴力破解 |
OilRig has used brute force techniques to obtain credentials.[16][12] |
|
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
OilRig has exfiltrated data over FTP separately from its primary C2 channel over DNS.[5] |
| Enterprise | T1078 | 有效账户 |
OilRig has used compromised credentials to access other systems on a victim network.[6][16][22][12] |
|
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
OilRig has used web shells, often to maintain access to a victim network.[6][16][22] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files |
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.[6][16][17][18] |
| Enterprise | T1069 | .001 | 权限组发现: Local Groups |
OilRig has used |
| .002 | 权限组发现: Domain Groups |
OilRig has used |
||
| Enterprise | T1012 | 查询注册表 |
OilRig has used |
|
| Enterprise | T1027 | .005 | 混淆文件或信息: Indicator Removal from Tools |
OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion.[2][24] |
| .013 | 混淆文件或信息: Encrypted/Encoded File |
OilRig has encrypted and encoded data in its malware, including by using base64.[1][7][6][9][24] |
||
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
OilRig has delivered malicious links to achieve execution on the target system.[21][7][9] |
| .002 | 用户执行: Malicious File |
OilRig has delivered macro-enabled documents that required targets to click the "enable content" button to execute the payload on the system.[21][7][9][10] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
OilRig has deleted files associated with their payload after execution.[1][21] |
| Enterprise | T1218 | .001 | 系统二进制代理执行: Compiled HTML File |
OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim.[4] |
| Enterprise | T1082 | 系统信息发现 |
OilRig has run |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1007 | 系统服务发现 |
OilRig has used |
|
| Enterprise | T1049 | 系统网络连接发现 |
OilRig has used |
|
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1046 | 网络服务发现 |
OilRig has used the publicly available tool SoftPerfect Network Scanner as well as a custom tool called GOLDIRONY to conduct network scanning.[16] |
|
| Enterprise | T1119 | 自动化收集 | ||
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
OilRig has used macros to verify if a mouse is connected to a compromised machine.[10] |
| Enterprise | T1087 | .001 | 账号发现: Local Account |
OilRig has run |
| .002 | 账号发现: Domain Account |
OilRig has run |
||
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
OilRig has used keylogging tools called KEYPUNCH and LONGWATCH.[16][18] |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment.[6][16][22] |
| .004 | 远程服务: SSH | |||
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts.[21][7][9] |
| .002 | 钓鱼: Spearphishing Link |
OilRig has sent spearphising emails with malicious links to potential victims.[21] |
||
| .003 | 钓鱼: Spearphishing via Service | |||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines.[21][7][18][10] |
| ICS | T0817 | Drive-by Compromise |
OilRig has been seen utilizing watering hole attacks to collect credentials which could be used to gain access into ICS networks. [26] |
|
| ICS | T0853 | Scripting |
OilRig has embedded a macro within spearphishing attachments that has been made up of both a VBScript and a PowerShell script.[27] |
|
| ICS | T0865 | Spearphishing Attachment |
OilRig used spearphishing emails with malicious Microsoft Excel spreadsheet attachments. [27] |
|
| ICS | T0869 | Standard Application Layer Protocol |
OilRig communicated with its command and control using HTTP requests. [27] |
|
| ICS | T0859 | Valid Accounts |
OilRig utilized stolen credentials to gain access to victim machines.[28] |
|