Tuesday, May 28, 2024

Imperial Kitten Attacking Tech Firms with SQLi & Scanning Tools

Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on transportation, logistics, and technology firms.

The adversary, who has been operating since at least 2017, has been reported to have ties to the Islamic Revolutionary Guard Corps (IRGC) and fulfill Iran’s needs for strategic intelligence related to IRGC activities.

Its operation is distinguished by the use of social engineering, namely job recruitment-themed content, to distribute custom .NET-based implants.

Previously, IMPERIAL KITTEN has targeted the energy, maritime, defense, technology, consulting, and professional services sectors.

Tactics, Techniques, and Procedures Employed

CrowdStrike claims that IMPERIAL KITTEN intrusion chains employ the following tactics, techniques, and procedures:

  • Using one-day exploits, public scanning tools, SQL injection, and compromised VPN credentials to gain initial access.
  • Use of scanning tools, PAExec, and credential theft.
  • Data exfiltration by leveraging custom and open-source malware to target Middle Eastern entities.

“In a SWC, the adversary attempts to compromise victims based on their shared interest by luring them to an adversary-controlled website”, CrowdStrike said in a report shared with Cyber Security News.

As of now, compromised (mostly Israeli) websites can be redirected to the adversary-controlled domains, which are also the locations where data gathered to create visitor profiles is sent.

According to the researchers, SWC domains employed the Matomo analytics service1 in early 2022 to profile visitors who visited the hijacked Israeli websites. 

Later, SWC domain iterations employ a custom script to profile visitors by collecting browser information and IP addresses, which are then delivered to a hardcoded domain.

According to CrowdStrike intelligence Collection reporting, the final payload of the SWC activities is a malware family known as IMAPLoader.

Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Reports mention that the adversary may occasionally serve malware to SWC victims directly. There is some evidence that IMPERIAL KITTEN targets companies, such as upstream IT service providers, in order to locate and obtain access to targets that are of major interest for data exfiltration.

Additionally, malicious Microsoft Excel documents are allegedly used in IMPERIAL KITTEN’s phishing operations.

“IMPERIAL KITTEN achieves lateral movement through the use of PAExec (the open-source PsExec alternative) and NetScan, and uses ProcDump to dump the LSASS process memory for credential harvesting”, researchers said.

It is possible that IMPERIAL KITTEN uses open-source tools like MeshAgent3 or deploys custom malware to exfiltrate data.

It is stated that IMPERIAL KITTEN operations use a variety of tools, such as custom implants, a remote access tool (RAT) that uses Discord for C2, IMAPLoader, and StandardKeyboard, which both use email for C2.  

Notably, in May 2023, a sophisticated watering hole attack was detected by ClearSky and connected to Imperial Kitten. The attack was also aimed at multiple Israeli websites.

Targeting Israeli transportation, maritime, and technology groups is consistent with Imperial Kitten’s prior actions in this instance as well.

Patch Manager Plus, the one-stop solution for automated updates of over 850 third-party applications: Try Free Trial.


Latest articles

Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes.The...

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles