APT 33, Elfin, Magnallium

Description

(FireEye) When discussing suspected Middle Eastern hacker groups with destructive capabilities, many automatically think of the suspected Iranian group that previously used SHAMOON – aka Disttrack – to target organizations in the Persian Gulf. However, over the past few years, we have been tracking a separate, less widely known suspected Iranian group with potential destructive capabilities, whom we call APT33. Our analysis reveals that APT33 is a capable group that has carried out cyber espionage operations since at least 2013. We assess APT33 works at the behest of the Iranian government.

APT33 has targeted organizations – spanning multiple industries – headquartered in the United States, Saudi Arabia and South Korea. APT33 has shown particular interest in organizations in the aviation sector involved in both military and commercial capacities, as well as organizations in the energy sector with ties to petrochemical production.

APT 33 seems to be closely related to OilRig, APT 34, Helix Kitten, Chrysene since at least 2017.

Names

NameName-Giver
APT 33Mandiant
ElfinSymantec
MagnalliumDragos
HolmiumMicrosoft
ATK 35Thales
Refined KittenCrowdStrike
TA451Proofpoint
Cobalt TrinitySecureWorks
Peach SandstormMicrosoft
Yellow OrcPWC
Curious SerpensPalo Alto

Country

State-sponsored, Iranian Islamic Revolutionary Guard Corps (IRGC)

Motivation

  • Information theft and espionage
  • Sabotage and destruction

First Seen

2013

Observed Sectors

Observed Countries

Tools

Operations

Information

Mitre Attack

Playbook

Other Information

Uuid

958e1f46-a2b6-4beb-8cb0-ddc90c08368e

Last Card Change

2024-10-23