top of page

Parisite, Fox Kitten, Pioneer Kitten

Mitre

Alias

Rubidium, Lemon Sandstorm, Pioneer Kitten, Cobalt Foxglove, Unc757, Parisite, Fox Kitten

Country

Iran

Sponsor

Nil

Motivation

Information Theft And Espionage

First Seen

2017

Description

�This group has operated since at least 2017 based on infrastructure Dragos identified,� the report explained. �Parisite serves as the initial access group and enables further operations for {{APT 33, Elfin, Magnallium}}.�

(ClearSky) During the last quarter of 2019, ClearSky research team has uncovered a widespread Iranian offensive campaign which we call �Fox Kitten Campaign�; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT,Telecommunication,Oil and Gas, Aviation, Government, and Security sectors around the world.

During our analysis, we have found an overlap, with medium-high probability, between this campaign�s infrastructure and the activity of an Iranian offensive group {{OilRig, APT 34, Helix Kitten, Chrysene}}. Additionally, we have identified, with medium probability, a connection between this campaign and the {{APT 33, Elfin, Magnallium}} and {{Chafer, APT 39}} groups.The campaign was first revealed by Dragos, named �Parisite�and attributed to APT33; we call the comprehensive campaign revealed in this report �Fox Kitten�.

The initial breach of the targeted organizations was performed, in most cases, by exploiting 1-day vulnerabilities in different VPN services such as: Pulse Secure VPN, Fortinet VPN, and Global Protect by Palo Alto Networks. Upon gaining foothold at the target, the attackers tried to maintain the access to the networks by opening a variety of communication tools, including opening RDP links over SSH tunneling, in order to camouflage and encrypt the communication with the targets. At the final stage, after successfully infiltrating the organization, the attackers have performed a routine process of identification, examination, and filtering of sensitive, valuable information from every targeted organization.The valuable information was sent back to the attackers for reconnaissance, espionage, or further infection of connected networks.

Targeted
Industries

Government, Defense, It, Energy, Chemical, Oil And Gas, Financial, Retail, Media, Manufacturing, Telecommunications, Healthcare, Aviation, Engineering

Targeted
Countries

Usa, Kuwait, Saudi Arabia, Finland, Germany, Italy, Malaysia, France, Uae, Poland, Hungary, Lebanon, Israel, Australia, Austria

Tools

Stsrcheck
Serveo
Frp
Putty
Invoke
Sshminion
Juicypotato
Plink
Invoke The Hash
Pay2key
Port.exe
Powsshnet
Ngrok

TTP

Nil

Operations
Performed

[2019 Late] �fox Kitten� Campaign (https://www.clearskysec.com/wp-content/uploads/2020/02/clearsky-fox-kitten-campaign-v1.pdf)

[2020-07] in Late July 2020, An Actor Assessed To Be Associated With Pioneer Kitten Was Identified As Advertising To Sell Access To Compromised Networks On An Underground Forum. (https://www.crowdstrike.com/blog/who-is-pioneer-kitten/)

[2020-09] this Threat Actor Has Been Observed Exploiting Several Publicly Known Common Vulnerabilities And Exposures (cves) Dealing With Pulse Secure Virtual Private Network (vpn), Citrix Netscaler, And F5 Vulnerabilities. (https://us-cert.cisa.gov/ncas/alerts/aa20-259a)

[2020-11] pay2kitten � Fox Kitten 2 (https://www.clearskysec.com/wp-content/uploads/2020/12/pay2kitten.pdf

Counter
Operations

Nil

Information

bottom of page