Tuesday, May 13, 2025
HomeCyber AttackOilRig Hackers Attacking Individuals And Organizations In The Middle East

OilRig Hackers Attacking Individuals And Organizations In The Middle East

Published on

SIEM as a Service

Follow Us on Google News

OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and advanced infiltration techniques. 

This group conducts a multitude of cyber attacks against various sectors, and among them, the most executed ones are intelligence gathering, surveillance, and high-profile cyberattacks.

Besides this, cybersecurity researchers at Cyble recently identified that OilRig hackers have been actively attacking Middle Eastern entities and organizations related to Iranian interests. 

- Advertisement - Google News

The group continually evolves its tools to evade detection and has expanded its operations to include disruptive attacks like ransomware and data-wiping.

Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot

OilRig Hackers Attacking Individuals

OilRig targets over 20 countries across various regions:-

Origin and Targeted Countries (Source – Cyble)

It attacks diverse sectors including:-

  • Aerospace & Defense 
  • BFSI 
  • Chemicals 
  • Education 
  • Energy & Utilities 
  • Government & LEA 
  • Hospitality 
  • IT & ITES 
  • Technology 
  • Telecommunication 

The group employs customizable attack vectors, often starting with spear-phishing or exploiting public-facing applications to deliver malware for data exfiltration. 

OilRig is suspected to have links with Greenbug and is known for exploiting unpatched SharePoint servers. Its extensive reach and adaptable tactics make it a significant threat in the cyber espionage landscape.

The group OilRig made use of LinkedIn-based phishing masquerading as Cambridge University Members and exploited already known vulnerabilities like CVE-2019-0604 and CVE-2017-11882.

LinkedIn Message Asking to Download File (Source – Cyble)

For persistence, OilRig uses malicious loaders, VBScript, or scheduled tasks. Their arsenal also includes various RATs like Alma Communicator and BONDUPDATER, among others.

The group also employs living-off-the-land tactics to attack public-facing applications in their operations, as the Cyble report reads.

They do so by linking IPs and domains from previous attacks, which helps them illuminate the group’s development as a continuous threat touching many sectors.

Here below we have mentioned all the tools used:-

  • Alma Communicator
  • BONDUPDATER
  • Clayslide
  • DistTrack
  • DNSExfitrator
  • DNSpionage
  • Dustman
  • Fox Panel
  • Helminth
  • ISMAgent
  • ISMDoor
  • ISMInjector
  • Karkoff
  • Mimikatz
  • LaZagne
  • LIONTAIL
  • LONGWATCH
  • SideTwist
  • Neuron
  • Nautilus
  • PICKPOCKET
  • Plink
  • PsList
  • RDAT
  • Saitama
  • SpyNote RAT
  • TONEDEAF

OilRig is a group of elite hackers who are experts in cyber espionage. They specialize in secret C&C communication using various methods.

They have developed targeted exchange servers, HTPSnoop implants, HTTP and DNS queries, and protocol tunneling for stealthy network communications.

Recommendations

Here below we have mentioned all the recommendations:-

  • Regular software patching
  • Enhanced email security
  • Robust network monitoring
  • Advanced endpoint protection
  • Strict access control
  • Comprehensive incident response plan
  • Utilize threat intelligence
  • Ongoing employee cybersecurity training

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

INE Security Alert: Top 5 Takeaways from RSAC 2025

Comprehensive Training Platform Delivers Solutions for AI Security, Cloud Management, and Incident Response Readiness. Fresh...

CISA Flags Hidden Functionality Flaw in TeleMessage TM SGNL on KEV List

Cybersecurity and Infrastructure Security Agency (CISA) has escalated its advisory for TeleMessage TM SGNL,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

CISA Flags Hidden Functionality Flaw in TeleMessage TM SGNL on KEV List

Cybersecurity and Infrastructure Security Agency (CISA) has escalated its advisory for TeleMessage TM SGNL,...