APT34, also known by aliases such as OilRig, Helix Kitten, Earth Simnavaz, and Crambus, is a sophisticated, state-sponsored cyber espionage group with strong ties to the Iranian government, specifically the Ministry of Intelligence and Security (MOIS). The group has been active since at least 2012, with its first public operations identified in 2016. It is widely recognized for targeting organizations across critical sectors, including financial, energy, government, chemical, telecommunications, aviation, and defense.

Origins and Objectives

APT34 is believed to operate on behalf of Iranian state interests, focusing on intelligence gathering and cyber operations that support Iran’s geopolitical and national security objectives. Its campaigns have primarily targeted the Middle East—especially the Persian Gulf region—but the group has also conducted operations in Africa, Asia, Europe, and North America.

Techniques and Tools

• Spear phishing and social engineering: Frequently uses phishing emails with malicious attachments or links, often impersonating legitimate service providers or government agencies to lure victims.
• Custom malware and backdoors: Employs a range of custom-developed malware such as Helminth, POWBAT, POWRUNER, BONDUPDATER, QUADAGENT, ISMAgent, and more. These tools are designed for stealth, persistence, and data exfiltration.
• Exploitation of vulnerabilities: Actively exploits both known and zero-day vulnerabilities, such as CVE-2024-30088, to gain initial access or escalate privileges within targeted environments.
• Supply chain and credential theft: Targets supply chain relationships and leverages compromised Microsoft Exchange servers for credential theft and lateral movement.
Obfuscation and evasion: Uses PowerShell scripts, .NET tools, and custom IIS-based malware to blend malicious activity with legitimate network traffic, making detection difficult.
Command and Control (C2): Utilizes sophisticated C2 mechanisms, including custom DNS tunneling protocols and email-based channels, to maintain persistence and exfiltrate data.

Notable Campaigns and Impact

• Attacks on financial and technology organizations in Saudi Arabia using the Helminth backdoor and spear phishing tactics.
• Recent campaigns targeting Iraqi governmental networks and telecommunications companies in Africa, marking the group’s expanding operational footprint.
• Deployment of new and customized malware variants almost annually, reflecting a commitment to innovation and adaptation in response to evolving defenses.

Affiliations and Overlaps

APT34 is closely associated with other Iranian cyber groups such as Karkoff, Saitama, IIS Group2, Greenbug, Volatile Kitten, and FOX Kitten, often sharing infrastructure, malware, and attack methodologies. This interconnectedness is typical of Iranian state-sponsored cyber operations, where resources and strategies are coordinated to achieve unified national objectives.

Synonyms:
OilRig, Helix Kitten, Earth Simnavaz, Crambus