Tortoiseshell, Imperial Kitten

Description

(Symantec) A previously undocumented attack group is using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers.

The group, which we are calling Tortoiseshell, has been active since at least July 2018. Symantec has identified a total of 11 organizations hit by the group, the majority of which are based in Saudi Arabia. In at least two organizations, evidence suggests that the attackers gained domain admin-level access.

Overlap has been found with Magic Hound’s Subgroup: TA455, Smoke Sandstorm.

Names

NameName-Giver
TortoiseshellSymantec
Imperial KittenCrowdStrike
TA456Proofpoint
CuriumMicrosoft
Marcella Floresself given
Houseblend?
Crimson SandstormMicrosoft
Cuboid SandstormMicrosoft
Yellow LidercPWC
Devious SerpensPalo Alto
Cobalt FiresideSecureWorks

Country

State-sponsored, Islamic Revolutionary Guard Corps (IRGC)

Motivation

  • Information theft and espionage

First Seen

2018

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Other Information

Uuid

8e5c68c0-c16a-4d8f-8829-14d27ab8cd32

Last Card Change

2025-06-28