APT34

APT34, also known as OilRig or HELIX KITTEN, is an Iranian state-sponsored cyber-espionage group active since at least 2014, known for targeting organizations across the Middle East and beyond using sophisticated spear-phishing campaigns and custom malware.

Is Your Organization Safe from APT34's Attacks?

The origin of APT34

APT34 (also known as OilRig, HELIX KITTEN, CHRYSENE, and COBALT GYPSY) is an Iranian state-sponsored Advanced Persistent Threat (APT) group active since at least 2014. The group is assessed to operate on behalf of the Iranian Ministry of Intelligence and Security (MOIS). APT34 is primarily focused on fulfilling Iranian geopolitical intelligence objectives across the Middle East, North Africa (MENA), and parts of Eurasia. Known for its sophisticated custom toolsets, DNS hijacking capabilities, and strategic spear-phishing campaigns, APT34 often leverages social engineering and publicly available tools to access and persist in targeted networks.

Countries targeted by APT34

APT34 operations primarily focus on countries in the Middle East and Eastern Eurasia, including Saudi Arabia, UAE, Israel, Jordan, Lebanon, Iraq, Bahrain, Kuwait, Yemen, Syria, and Qatar. Their reach also extends to South Africa, Turkey, Azerbaijan, and Mauritius, indicating a broadening regional interest and an effort to gather intelligence beyond the immediate neighborhood.

Industries targeted by APT34

APT34 targets a wide range of sectors, especially those that align with national interest intelligence collection. These include academic institutions, energy (especially oil and gas), manufacturing, financial services, telecommunications, and government entities. Additionally, organizations within the technology, military, media, law enforcement, and chemical industries are frequently targeted, often as part of broader surveillance or disruption campaigns.

APT34's victims

Notable operations have included the compromise of Israeli human resources and job portals to establish Command and Control (C2) infrastructure, and reconnaissance activities targeting organizations in Jordan and Syria using open-source vulnerability scanners. The group has a history of supply chain compromises, abusing trust relationships to pivot into higher-value targets within government or critical infrastructure sectors.

Attack Method

APT34's attack method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

APT34 typically uses spear-phishing emails (sometimes from compromised accounts) as well as LinkedIn messages to deliver payloads. They also set up fake VPN or job-related websites to lure victims.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

They exploit vulnerabilities like CVE-2024-30088 and use credential dumping tools (e.g., Mimikatz) to gain SYSTEM or domain-level access.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

APT34 evades detection through obfuscation, use of signed malware, disabling of system firewalls, and indicator removal techniques.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

Tools such as LaZagne, PICKPOCKET, and VALUEVAULT are used to dump credentials from browsers, LSASS memory, and Windows Credential Manager.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

They perform extensive reconnaissance using tools like SoftPerfect Network Scanner, WMI, and various scripts to query registry, user accounts, and services.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

Using valid accounts, RDP, VPN, Plink, and SSH, they pivot across systems and move through networks undetected.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

APT34 uses keyloggers, clipboard data stealers, browser data extractors, and automated tools to collect credentials and sensitive files.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

Payloads are executed via PowerShell, VBScript macros, batch files, WMI, and HTML Help (CHM) files.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Data is exfiltrated using HTTP, DNS tunneling, FTP, and even via compromised email accounts.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

The primary objective is data theft rather than destruction. Their impact is strategic, focusing on intelligence collection rather than sabotage.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

APT34 typically uses spear-phishing emails (sometimes from compromised accounts) as well as LinkedIn messages to deliver payloads. They also set up fake VPN or job-related websites to lure victims.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

They exploit vulnerabilities like CVE-2024-30088 and use credential dumping tools (e.g., Mimikatz) to gain SYSTEM or domain-level access.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

APT34 evades detection through obfuscation, use of signed malware, disabling of system firewalls, and indicator removal techniques.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

Tools such as LaZagne, PICKPOCKET, and VALUEVAULT are used to dump credentials from browsers, LSASS memory, and Windows Credential Manager.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

They perform extensive reconnaissance using tools like SoftPerfect Network Scanner, WMI, and various scripts to query registry, user accounts, and services.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

Using valid accounts, RDP, VPN, Plink, and SSH, they pivot across systems and move through networks undetected.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

APT34 uses keyloggers, clipboard data stealers, browser data extractors, and automated tools to collect credentials and sensitive files.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

Payloads are executed via PowerShell, VBScript macros, batch files, WMI, and HTML Help (CHM) files.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Data is exfiltrated using HTTP, DNS tunneling, FTP, and even via compromised email accounts.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

The primary objective is data theft rather than destruction. Their impact is strategic, focusing on intelligence collection rather than sabotage.

MITRE ATT&CK Mapping

TTPs used by APT34

TA0001: Initial Access
T1566
Phishing
T1078
Valid Accounts
TA0002: Execution
T1204
User Execution
T1059
Command and Scripting Interpreter
TA0003: Persistence
T1547
Boot or Logon Autostart Execution
T1137
Office Application Startup
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0004: Privilege Escalation
T1068
Exploitation for Privilege Escalation
T1547
Boot or Logon Autostart Execution
T1078
Valid Accounts
T1053
Scheduled Task/Job
TA0005: Defense Evasion
T1553
Subvert Trust Controls
T1140
Deobfuscate/Decode Files or Information
T1027
Obfuscated Files or Information
T1070
Indicator Removal
T1078
Valid Accounts
TA0006: Credential Access
T1557
Adversary-in-the-Middle
T1555
Credentials from Password Stores
T1552
Unsecured Credentials
T1056
Input Capture
T1003
OS Credential Dumping
TA0007: Discovery
T1087
Account Discovery
T1046
Network Service Discovery
TA0008: Lateral Movement
T1021
Remote Services
TA0009: Collection
T1557
Adversary-in-the-Middle
T1115
Clipboard Data
T1113
Screen Capture
T1074
Data Staged
TA0011: Command and Control
T1573
Encrypted Channel
T1071
Application Layer Protocol
T1001
Data Obfuscation
TA0010: Exfiltration
T1048
Exfiltration Over Alternative Protocol
T1041
Exfiltration Over C2 Channel
T1020
Automated Exfiltration
T1030
Data Transfer Size Limits
TA0040: Impact
T1485
Data Destruction
Platform Detections

How to Detect APT34 with Vectra AI

List of the Detections available in the Vectra AI Platform that would indicate an APT attack.

FAQs

Who is behind APT34?

What are APT34’s most common initial access methods?

What types of malware does APT34 use?

How does APT34 maintain persistence in victim networks?

How does APT34 exfiltrate data?

What vulnerabilities has APT34 exploited in the wild?

What tools are used for credential access?

How can organizations detect APT34 activity?

What is the best way to respond to an APT34 intrusion?

What detection solutions are effective against APT34?