Helix Kitten: Difference between revisions
Appearance
Content deleted Content added
No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
| parent_organization = |
| parent_organization = |
||
| affiliations = |
| affiliations = |
||
| formerly = APT34 |
| formerly = APT34<br>COBALT GYPSY<br>Threat Group-2889<br> |
||
| website = |
| website = |
||
| remarks = |
| remarks = |
Revision as of 19:32, 28 July 2019
بچه گربه هلیکس | |
Formation | c. 2004–2007[1] |
---|---|
Type | Advanced persistent threat |
Purpose | Cyberespionage, cyberwarfare |
Region | Persia |
Methods | Zero-days, spearphishing, malware |
Official language | Persian |
Formerly called | APT34 COBALT GYPSY Threat Group-2889 |
Helix is a hacker group identified by FireEye as Iranian.[1][2] Helix Kitten was given other names including APT34 (by Fireeye), COBALT GYPSY and TG-2889 (by SecureWorks).
History
The group has reportedly been active since at least 2014.[1] It has targeted many of the same organizations as Advanced Persistent Threat 33, according to John Hultquist.[1]
In April 2019, APT34's cyber-espionage tools' source code was leaked through Telegram.[3]
Targets
The group has reportedly targeted organizations in the financial, energy, telecommunications, and chemical industries, as well as critical infrastructure systems.[1]
Techniques
APT34 reportedly uses Microsoft Excel macros, PowerShell-based exploits and social engineering to gain access to its targets.[1]
References
- ^ a b c d e Newman, Lily Hay (December 7, 2017). "APT 34 Is an Iran-Linked Hacking Group That Probes Critical Infrastructure". Wired. Archived from the original on December 10, 2017.
{{cite news}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ Sardiwal, Manish; Londhe, Yogesh; Fraser, Nalani; Fraser, Nicholas; O'Leary, Jaqueline; Cannon, Vincent (December 7, 2017). "New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit". FireEye. Archived from the original on December 10, 2017.
- ^ Catalin Cimpanu (April 17, 2019). "Source code of Iranian cyber-espionage tools leaked on Telegram; APT34 hacking tools and victim data leaked on a secretive Telegram channel since last month". Retrieved April 24, 2019.