Greenbug, Volatile Kitten

Description

A subgroup of OilRig, APT 34, Helix Kitten, Chrysene.

(Symantec) Symantec discovered the Greenbug cyberespionage group during its investigation into previous attacks involving W32.Disttrack.B (aka Shamoon). Shamoon (W32.Disttrack) first made headlines in 2012 when it was used in attacks against energy companies in Saudi Arabia. It recently resurfaced in November 2016 (W32.Disttrack.B), again attacking targets in Saudi Arabia. While these attacks were covered extensively in the media, how the attackers stole these credentials and introduced W32.Disttrack on targeted organizations’ networks remains a mystery.

Could Greenbug be responsible for getting Shamoon those stolen credentials?

Although there is no definitive link between Greenbug and Shamoon, the group compromised at least one administrator computer within a Shamoon-targeted organization’s network prior to W32.Disttrack.B being deployed on November 17, 2016.

Names

NameName-Giver
GreenbugSymantec
Volatile KittenCrowdStrike

Country

State-sponsored, Ministry of Intelligence and Security (MOIS)

Motivation

  • Information theft and espionage

First Seen

2016

Operations

Other Information

Uuid

1839228a-7fb6-4d8b-a7cd-486e728ba9b1

Last Card Change

2024-06-18