top of page
Mitre
Alias
Rubidium, Lemon Sandstorm, Pioneer Kitten, Cobalt Foxglove, Unc757, Parisite, Fox Kitten
Country
Iran
Sponsor
Nil
Motivation
Information Theft And Espionage
First Seen
2017
Description
�This group has operated since at least 2017 based on infrastructure Dragos identified,� the report explained. �Parisite serves as the initial access group and enables further operations for {{APT 33, Elfin, Magnallium}}.�
(ClearSky) During the last quarter of 2019, ClearSky research team has uncovered a widespread Iranian offensive campaign which we call �Fox Kitten Campaign�; this campaign is being conducted in the last three years against dozens of companies and organizations in Israel and around the world. Though the campaign, the attackers succeeded in gaining access and persistent foothold in the networks of numerous companies and organizations from the IT,Telecommunication,Oil and Gas, Aviation, Government, and Security sectors around the world.
During our analysis, we have found an overlap, with medium-high probability, between this campaign�s infrastructure and the activity of an Iranian offensive group {{OilRig, APT 34, Helix Kitten, Chrysene}}. Additionally, we have identified, with medium probability, a connection between this campaign and the {{APT 33, Elfin, Magnallium}} and {{Chafer, APT 39}} groups.The campaign was first revealed by Dragos, named �Parisite�and attributed to APT33; we call the comprehensive campaign revealed in this report �Fox Kitten�.
The initial breach of the targeted organizations was performed, in most cases, by exploiting 1-day vulnerabilities in different VPN services such as: Pulse Secure VPN, Fortinet VPN, and Global Protect by Palo Alto Networks. Upon gaining foothold at the target, the attackers tried to maintain the access to the networks by opening a variety of communication tools, including opening RDP links over SSH tunneling, in order to camouflage and encrypt the communication with the targets. At the final stage, after successfully infiltrating the organization, the attackers have performed a routine process of identification, examination, and filtering of sensitive, valuable information from every targeted organization.The valuable information was sent back to the attackers for reconnaissance, espionage, or further infection of connected networks.
Targeted
Industries
Government, Defense, It, Energy, Chemical, Oil And Gas, Financial, Retail, Media, Manufacturing, Telecommunications, Healthcare, Aviation, Engineering
Targeted
Countries
Usa, Kuwait, Saudi Arabia, Finland, Germany, Italy, Malaysia, France, Uae, Poland, Hungary, Lebanon, Israel, Australia, Austria
Tools
Stsrcheck
Serveo
Frp
Putty
Invoke
Sshminion
Juicypotato
Plink
Invoke The Hash
Pay2key
Port.exe
Powsshnet
Ngrok
TTP
Nil
Operations
Performed
[2019 Late] �fox Kitten� Campaign (https://www.clearskysec.com/wp-content/uploads/2020/02/clearsky-fox-kitten-campaign-v1.pdf)
[2020-07] in Late July 2020, An Actor Assessed To Be Associated With Pioneer Kitten Was Identified As Advertising To Sell Access To Compromised Networks On An Underground Forum. (https://www.crowdstrike.com/blog/who-is-pioneer-kitten/)
[2020-09] this Threat Actor Has Been Observed Exploiting Several Publicly Known Common Vulnerabilities And Exposures (cves) Dealing With Pulse Secure Virtual Private Network (vpn), Citrix Netscaler, And F5 Vulnerabilities. (https://us-cert.cisa.gov/ncas/alerts/aa20-259a)
[2020-11] pay2kitten � Fox Kitten 2 (https://www.clearskysec.com/wp-content/uploads/2020/12/pay2kitten.pdf
Counter
Operations
Nil
Information
https://dragos.com/blog/industry-news/the-state-of-threats-to-electric-entities-in-north-america/
https://threatpost.com/oil-and-gas-specialist-apt-pivots-to-u-s-power-plants/151699/
https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign-v1.pdf
https://www.crowdstrike.com/blog/who-is-pioneer-kitten/
bottom of page