RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
September 16, 2022

Iran-backed APT actors utilize CVEs to carry out cyber attacks on critical infrastructure

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
log4j shell vulnerability graphic

An advisory co-authored by the U.S., U.K., Canada and Australia warns of an Iran-backed APT group utilizing known vulnerabilities to carry out attacks. 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) shared the new Joint Cybersecurity Advisory, co-authored with the National Security Agency (NSA),  Department of Justice (DOJ), U.S. Cyber Command, and Department of the Treasury (DOT), yesterday. The advisory was also written in collaboration with the Australian, Canadian, and British cybersecurity agencies.

In the advisory, the co-authors warn of APT actors based in Iran that are affiliated with the state’s Islamic Revolutionary Guard Corps (IRGC). These actors have been utilizing common vulnerabilities and exposures (CVEs) such as Log4j to carry out malicious cyber activities since early 2021. 

Here's what your security teams needs to know. 

An APT evolves

This new advisory builds off of a November 2021 advisory warning of these same APT actors utilizing Microsoft, Fortinet and ProxyShell vulnerabilities specifically. One of the major developments to come with the new advisory is the co-authors’ firm belief that these same APT actors are backed by the IRGC. This affirmation from these government agencies elevated these APT actors from being just a cybercriminal operation, to them now being a nation-state operation that attacks entities on behalf of the state of Iran. 

Another development cited in the advisory is the increased knowledge of the APT group’s attack methods. It was previously known that these actors were utilizing Fortinet FortiOS and Microsoft Exchange server vulnerabilities to “gain initial access to a broad range of targeted entities in furtherance of malicious activities,” according to the advisory. Also on the government’s radar previously were the group’s use of ProxyShell vulnerabilities. 

Log4j added to the mix

Now, the co-authors assert that in addition to these prior vulnerabilities used, the infamous Log4j vulnerability has now been added to the list of attack methods in this group’s tool box. 

The co-authors believe that the APT group is utilizing all of these vulnerabilities to gain initial access to target environments. After gaining access, the threat actors will then choose a course of action dependent on how they perceive the target’s environment and data. Oftentimes the APT group will use the initial access to carry out malicious activity, such as disk encryption and data extortion that supports ransom operations. 

The APT group has been known to function similarly to a ransomware operation. They will either sell a target’s data, or use double-extortion to both encrypt and steal a target’s data. The APT group then pressures its targets to pay a ransom in order for their data to be decrypted and secured. The advisory does cite several instances in which the APT group utilized BitLocker to move laterally through a target’s network in order to encrypt their data. 

The target: Critical infrastructure

The joint advisory’s co-authors believe that this Iranian-backed APT group has targeted a broad range of victims. The advisory names critical infrastructure entities based in the U.S., U.K, Canada and Australia as a category of the group’s known victims. The advisory does note however that the APT actors are specifically exploiting vulnerabilities on “unprotected networks” instead of targeting specific entities or sectors.  

Four attacks carried out by the APT group are listed in the new advisory. Two of them occurred in December 2021 and utilized PowerShell vulnerabilities on a Microsoft Exchange server to attack a U.S. police department and a U.S. transportation company. The other attacks, which occurred in February 2022, exploited the Log4j vulnerability to gain access to a U.S. municipal government and an American aerospace company. 

The group’s motivations, other than being backed by the IRGC, were not mentioned in the new advisory. All that is known about the APT actors is that they pose as technology companies based in Karaj and Yazd, two Iranian cities. 

The co-authors of this advisory urge organizations, and “especially critical infrastructure organizations,” to utilize the joint advisory’s mitigations list to minimize any risk of compromise by this APT group.

Tags:NewsAdvanced Persistent Threats

More Blog Posts

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu