APT34
   HOME





APT34
Helix Kitten (also known as APT34 by FireEye, OILRIG, Crambus, Cobalt Gypsy, Hazel Sandstorm, or EUROPIUM) is a hacker group identified by CrowdStrike as Iranian. History The group has reportedly been active since at least 2014. It has targeted many of the same organizations as Advanced Persistent Threat 33, according to John Hultquist. In April 2019, APT34's cyber-espionage tools' source code was leaked through Telegram. Targets The group has reportedly targeted organizations in the financial, energy, telecommunications, and chemical industries, as well as critical infrastructure systems. Techniques APT34 reportedly uses Microsoft Excel macros, PowerShell PowerShell is a shell program developed by Microsoft for task automation and configuration management. As is typical for a shell, it provides a command-line interpreter for interactive use and a script interpreter for automation via a langu ...-based exploits and social engineering to gain access to its targets. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Advanced Persistent Threat
An advanced persistent threat (APT) is a stealthy threat actor, typically a State (polity), state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political or economic. Every major business sector has recorded instances of cyberattacks by advanced actors with specific goals, whether to steal, spy, or disrupt. These targeted sectors include government, Arms industry, defense, financial services, Practice of law, legal services, Manufacturing, industrial, Telecommunication, telecoms, Final good, consumer goods and many more. Some groups utilize traditional espionage vectors, including Social engineering (security), social engineering, Human intelligence (intelligence gathering), human intelligence and Infiltration tactics, infil ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Wired (magazine)
''Wired'' is a bi-monthly American magazine that focuses on how emerging technologies affect culture, the economy, and politics. It is published in both print and Online magazine, online editions by Condé Nast. The magazine has been in publication since its launch in January 1993. Its editorial office is based in San Francisco, California, with its business headquarters located in New York City. ''Wired'' quickly became recognized as the voice of the emerging digital economy and culture and a pace setter in print design and web design. From 1998 until 2006, the magazine and its website, ''Wired.com'', experienced separate ownership before being fully consolidated under Condé Nast in 2006. It has won multiple National Magazine Awards and has been credited with shaping discourse around the digital revolution. The magazine also coined the term Crowdsourcing, ''crowdsourcing'', as well as its annual tradition of handing out Vaporware Awards. ''Wired'' has launched several in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

PowerShell
PowerShell is a shell program developed by Microsoft for task automation and configuration management. As is typical for a shell, it provides a command-line interpreter for interactive use and a script interpreter for automation via a language defined for it. Originally only for Windows, known as Windows PowerShell, it was made open-source and cross-platform on August 18, 2016, with the introduction of PowerShell Core. The former is built on the .NET Framework; the latter on .NET (previously .NET Core). PowerShell is bundled with current versions of Windows and can be installed on macOS and Linux. Since Windows 10 build 14971, PowerShell replaced Command Prompt as the default command shell exposed by File Explorer. In PowerShell, administrative tasks are generally performed via ''cmdlets'' (pronounced ''command-lets''), which are specialized .NET classes implementing a particular operation. These work by accessing data in different data stores, like the file system ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Macro (computer Science)
In computer programming, a macro (short for "macro instruction"; ) is a rule or pattern that specifies how a certain input should be mapped to a replacement output. Applying a macro to an input is known as macro expansion. The input and output may be a sequence of lexical tokens or characters, or a syntax tree. Character macros are supported in software applications to make it easy to invoke common command sequences. Token and tree macros are supported in some programming languages to enable code reuse or to extend the language, sometimes for domain-specific languages. Macros are used to make a sequence of computing instructions available to the programmer as a single program statement, making the programming task less tedious and less error-prone. Thus, they are called "macros" because a "big" block of code can be expanded from a "small" sequence of characters. Macros often allow positional or keyword parameters that dictate what the conditional assembler program gen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Microsoft Excel
Microsoft Excel is a spreadsheet editor developed by Microsoft for Microsoft Windows, Windows, macOS, Android (operating system), Android, iOS and iPadOS. It features calculation or computation capabilities, graphing tools, pivot tables, and a macro (computer science), macro programming language called Visual Basic for Applications (VBA). Excel forms part of the Microsoft 365 and Microsoft Office suites of software and has been developed since 1985. Features Basic operation Microsoft Excel has the basic features of all spreadsheets, using a grid of ''cells'' arranged in numbered ''rows'' and letter-named ''columns'' to organize data manipulations like arithmetic operations. It has a battery of supplied functions to answer statistical, engineering, and financial needs. In addition, it can display data as line graphs, histograms and charts, and with a very limited three-dimensional graphical display. It allows sectioning of data to view its dependencies on various factors ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Critical Infrastructure
Critical infrastructure, or critical national infrastructure (CNI) in the UK, describes infrastructure considered essential by governments for the functioning of a society and economy and deserving of special protection for national security. Critical infrastructure has traditionally been viewed as under the scope of government due to its strategic importance, yet there is an observable trend towards its privatization, raising discussions about how the private sector can contribute to these essential services. Items Most commonly associated with the term are assets and facilities for: * Shelter; Heating (e.g. natural gas, fuel oil, district heating); * Agriculture, food production and distribution; * Education, skills development and technology transfer / basic subsistence and unemployment rate statistics; * Water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes and sluices)); * Public health (hospitals, ambulances); * Transportation systems ( ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Telegram (software)
Telegram, also known as Telegram Messenger, is a Cloud computing, cloud-based, Cross-platform software, cross-platform, social media and instant messaging (IM) service. It was originally launched for iOS on 14 August 2013 and Android on 20 October 2013. It allows users to exchange messages, share media and files, and hold private and group voice or Videotelephony, video calls as well as public Live streaming, livestreams. It is available for Android (operating system), Android, iOS, Microsoft Windows, Windows, macOS, Linux, and web browsers. Telegram offers end-to-end encryption in voice and video calls, and optionally in private chats if both participants use a Mobile_device, mobile device. Telegram also has social networking features, allowing users to post Story (social media), stories, create large public groups with up to 200,000 members, or share one-way updates to unlimited audiences in so-called channels. Telegram was founded in 2013 by Nikolai Durov, Nikolai and Pavel ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Advanced Persistent Threat 33
Advanced Persistent Threat 33 (APT33) is a hacker group identified by FireEye as being supported by the government of Iran. The group has also been called Elfin Team, Refined Kitten (by Crowdstrike), Magnallium (by Dragos), Peach Sandstorm, and Holmium (by Microsoft). It is categorzied as an Advanced persistent threat. History FireEye believes that the group was formed no later than 2013. Targets APT33 has reportedly targeted aerospace, defense and petrochemical industry targets in the United States, South Korea, and Saudi Arabia. Modus operandi APT33 reportedly uses a dropper program designated DropShot, which can deploy a wiper called ShapeShift, or install a backdoor called TurnedUp. The group is reported to use the ALFASHELL tool to send spear-phishing emails loaded with malicious HTML Application files to its targets. APT33 registered domains impersonating many commercial entities, including Boeing, Alsalam Aircraft Company, Northrop Grumman and Vinnell. Identification ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE