APT33

APT33 is a suspected Iranian state-sponsored threat group active since at least 2013, known for targeting aerospace, energy, and defense sectors through cyber espionage and potentially destructive operations.

Is Your Organization Safe from APT33's Attacks?

The origin of APT33

PT33, also known as HOLMIUM, COBALT TRINITY, Elfin, Refined Kitten, and Peach Sandstorm, is a state-sponsored Iranian threat group that has been active since at least 2013. The group is suspected to be linked to Iran’s Islamic Revolutionary Guard Corps (IRGC) and is believed to support Iranian strategic objectives by conducting cyber espionage and possibly destructive operations. APT33 is particularly known for its use of spearphishing, custom malware, and public offensive security tools, often leveraging Microsoft technologies to gain access to target environments.

Countries targeted by APT33

APT33 operations have primarily targeted the United States, Saudi Arabia, United Arab Emirates, and South Korea. These countries are politically and economically significant in the Middle East, and often represent opposition to Iranian foreign policy. Cyber activities may also be designed to collect intelligence on critical infrastructure and technological advances.

Industries targeted by APT33

APT33 has focused extensively on organizations in the aerospace, energy, defense, engineering, and industrial sectors. Their interest aligns with Iran’s economic and military objectives, especially around oil and gas infrastructure and defense capabilities of regional adversaries and global competitors.

APT33's victims

Notably, APT33 has targeted U.S. engineering and aerospace firms, Saudi oil and energy conglomerates, and UAE-based critical infrastructure entities. Their operations included both cyber espionage and preparation for potential destructive attacks, such as those linked to the Shamoon malware campaigns, although attribution to APT33 is circumstantial in some cases.

Attack Method

APT33's attack method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

APT33 primarily uses spearphishing emails with malicious .hta links, malicious files, or archive attachments. They have also compromised valid accounts, including Office 365 cloud accounts, sometimes via password spraying.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

Exploits like CVE-2017-0213 have been used for local escalation. Additionally, they use valid administrative credentials obtained via dumping tools.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

Persistence is maintained through registry run keys, startup folder deployments, scheduled tasks, and WMI event subscriptions. APT33 uses encoded payloads (base64), encrypted C2 channels (AES), PowerShell obfuscation, and custom malware frameworks to bypass detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Credential harvesting is achieved through tools like LaZagne, Mimikatz, and SniffPass, targeting browser credentials, LSASS memory, GPP passwords, and cached domain credentials.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

They use common scripts and tools to enumerate systems, network topology, and account privileges for lateral movement.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Movement between systems is facilitated using harvested credentials, remote desktop protocols, and valid account access.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

Sensitive files are archived using tools like WinRAR and may also include screen captures using backdoor implants.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

They execute malicious payloads through PowerShell, VBScript, or by tricking users into launching malicious attachments. They’ve also leveraged exploitation of software vulnerabilities such as CVE-2017-11774 and CVE-2018-20250.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Data is exfiltrated via unencrypted FTP, HTTP, and HTTPS channels, sometimes over non-standard ports (808/880) with encoded payloads.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

Primarily geared toward espionage, APT33 has the capability for destructive operations, evidenced by links to Shamoon-like behavior, although not conclusively proven.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

APT33 primarily uses spearphishing emails with malicious .hta links, malicious files, or archive attachments. They have also compromised valid accounts, including Office 365 cloud accounts, sometimes via password spraying.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

Exploits like CVE-2017-0213 have been used for local escalation. Additionally, they use valid administrative credentials obtained via dumping tools.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

Persistence is maintained through registry run keys, startup folder deployments, scheduled tasks, and WMI event subscriptions. APT33 uses encoded payloads (base64), encrypted C2 channels (AES), PowerShell obfuscation, and custom malware frameworks to bypass detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Credential harvesting is achieved through tools like LaZagne, Mimikatz, and SniffPass, targeting browser credentials, LSASS memory, GPP passwords, and cached domain credentials.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

They use common scripts and tools to enumerate systems, network topology, and account privileges for lateral movement.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Movement between systems is facilitated using harvested credentials, remote desktop protocols, and valid account access.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

Sensitive files are archived using tools like WinRAR and may also include screen captures using backdoor implants.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

They execute malicious payloads through PowerShell, VBScript, or by tricking users into launching malicious attachments. They’ve also leveraged exploitation of software vulnerabilities such as CVE-2017-11774 and CVE-2018-20250.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Data is exfiltrated via unencrypted FTP, HTTP, and HTTPS channels, sometimes over non-standard ports (808/880) with encoded payloads.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

Primarily geared toward espionage, APT33 has the capability for destructive operations, evidenced by links to Shamoon-like behavior, although not conclusively proven.

MITRE ATT&CK Mapping

TTPs used by APT33

TA0001: Initial Access
T1566
Phishing
T1078
Valid Accounts
TA0002: Execution
T1204
User Execution
T1203
Exploitation for Client Execution
T1059
Command and Scripting Interpreter
TA0003: Persistence
T1547
Boot or Logon Autostart Execution
T1546
Event Triggered Execution
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0004: Privilege Escalation
T1068
Exploitation for Privilege Escalation
T1547
Boot or Logon Autostart Execution
T1546
Event Triggered Execution
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0005: Defense Evasion
T1140
Deobfuscate/Decode Files or Information
T1027
Obfuscated Files or Information
T1078
Valid Accounts
TA0006: Credential Access
T1555
Credentials from Password Stores
T1552
Unsecured Credentials
T1040
Network Sniffing
T1003
OS Credential Dumping
TA0007: Discovery
T1040
Network Sniffing
TA0008: Lateral Movement
No items found.
TA0009: Collection
T1560
Archive Collected Data
T1113
Screen Capture
TA0011: Command and Control
T1573
Encrypted Channel
T1571
Non-Standard Port
T1132
Data Encoding
T1105
Ingress Tool Transfer
T1071
Application Layer Protocol
TA0010: Exfiltration
T1048
Exfiltration Over Alternative Protocol
TA0040: Impact
T1485
Data Destruction
Platform Detections

How to Detect APT33 with Vectra AI

List of the Detections available in the Vectra AI Platform that would indicate a ransomware attack.

FAQs

What is APT33's origin?

What industries are targeted by APT33?

Which countries are most affected?

How does APT33 gain initial access?

What malware or tools are associated with APT33?

Are they linked to any destructive attacks?

How do they maintain persistence?

How can organizations detect APT33 activity?

What mitigations are effective against APT33?

What is the group’s strategic objective?