OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its sophisticated spear-phishing campaigns and advanced infiltration techniques.
This group conducts a multitude of cyber attacks against various sectors, and among them, the most executed ones are intelligence gathering, surveillance, and high-profile cyberattacks.
Besides this, cybersecurity researchers at Cyble recently identified that OilRig hackers have been actively attacking Middle Eastern entities and organizations related to Iranian interests.
The group continually evolves its tools to evade detection and has expanded its operations to include disruptive attacks like ransomware and data-wiping.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot
OilRig targets over 20 countries across various regions:-
It attacks diverse sectors including:-
The group employs customizable attack vectors, often starting with spear-phishing or exploiting public-facing applications to deliver malware for data exfiltration.
OilRig is suspected to have links with Greenbug and is known for exploiting unpatched SharePoint servers. Its extensive reach and adaptable tactics make it a significant threat in the cyber espionage landscape.
The group OilRig made use of LinkedIn-based phishing masquerading as Cambridge University Members and exploited already known vulnerabilities like CVE-2019-0604 and CVE-2017-11882.
For persistence, OilRig uses malicious loaders, VBScript, or scheduled tasks. Their arsenal also includes various RATs like Alma Communicator and BONDUPDATER, among others.
The group also employs living-off-the-land tactics to attack public-facing applications in their operations, as the Cyble report reads.
They do so by linking IPs and domains from previous attacks, which helps them illuminate the group’s development as a continuous threat touching many sectors.
Here below we have mentioned all the tools used:-
OilRig is a group of elite hackers who are experts in cyber espionage. They specialize in secret C&C communication using various methods.
They have developed targeted exchange servers, HTPSnoop implants, HTTP and DNS queries, and protocol tunneling for stealthy network communications.
Here below we have mentioned all the recommendations:-
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…
Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…
Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…
A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…
A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…
A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…