APT42

APT42 is an Iranian state-sponsored cyber espionage group active since at least 2015, known for targeting individuals and organizations worldwide through spearphishing, mobile surveillance, and credential theft.

Is Your Organization Safe from APT42's Attacks?

The origin of APT42

APT42 is an Iranian state-sponsored cyber espionage group that has been active since at least 2015. It is primarily tasked with conducting intelligence-gathering operations on behalf of Iran’s Islamic Revolutionary Guard Corps (IRGC), focusing on surveillance of individuals and entities of strategic interest. While APT42’s operations have been associated by some vendors with “Magic Hound,” the two groups are considered distinct based on behavioral and software differences. APT42 is known for its use of tailored spearphishing campaigns, mobile surveillance malware, and credential harvesting infrastructure to support long-term espionage efforts.

Countries targeted by APT42

APT42’s operations extend beyond the Middle East, with notable targeting of entities in the United States, United Kingdom, Israel, Iraq, Saudi Arabia, Germany, Australia, Albania, and Iran itself. The group’s activities reflect a strategic focus on both foreign adversaries and internal dissident populations.

Industries targeted by APT42

APT42 targets a broad spectrum of sectors including academic institutions, oil and gas, defense contractors, national military organizations, NGOs, think tanks, financial services, government agencies, the technology sector, media, aerospace, healthcare, energy, and pharmaceutical industries. Their focus is generally aligned with Iran’s geopolitical and domestic intelligence priorities.

APT42's victims

Victim profiles frequently include government officials, journalists, human rights activists, academics, and political dissidents. APT42 often crafts tailored lures impersonating journalists or legitimate institutions in phishing emails. Operations have included credential theft from Microsoft 365 environments and mobile device surveillance using Android malware like PINEFLOWER.

Attack Method

APT42's attack method

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.

APT42 begins attacks with spearphishing emails containing malicious links, or delivers Android malware such as PINEFLOWER to mobile targets. These emails often impersonate known contacts or reputable institutions.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.

APT42 uses PowerShell scripts (e.g., POWERPOST) to escalate privileges and access sensitive account information.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.

They utilize registry modifications, anti-forensic techniques such as clearing logs and browser history, and masquerade payloads (like VINETHORN as VPN software) to avoid detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.

APT42 steals credentials through web browser extraction, keylogging, and by intercepting multi-factor authentication (MFA) tokens using fake login pages.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.

The group uses Windows Management Instrumentation (WMI) and malware tools (GHAMBAR, POWERPOST) to survey security software, system configurations, and network settings.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.

While lateral movement specifics are less detailed, infrastructure acquisition and command-and-control setup imply efforts to pivot within networks once access is gained.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.

APT42 collects system screenshots, browser session cookies, Microsoft 365 documents, and keylogs, focusing on politically or strategically sensitive material.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.

The group executes scripts and malware using PowerShell, VBScript, scheduled tasks, and malicious web links.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.

Data exfiltration is performed over encrypted HTTPS channels using tools like NICECURL. They also use Base64 encoding and anonymized infrastructure to conceal traffic.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.

APT42’s operations are focused on long-term intelligence collection rather than disruption or sabotage. Their impact lies in surveillance, data theft, and geopolitical intelligence gathering.

A shadowy figure casting a wide net over a digital landscape filled with various devices such as computers, smartphones, and tablets. The net symbolizes the attacker's attempts to find vulnerabilities or use phishing techniques to gain unauthorized access.
Initial Access

APT42 begins attacks with spearphishing emails containing malicious links, or delivers Android malware such as PINEFLOWER to mobile targets. These emails often impersonate known contacts or reputable institutions.

A digital ladder extending upwards from a basic user icon towards a crown symbolizing administrative privileges. This represents the attacker's efforts to gain higher-level access within the system.
Privilege Escalation

APT42 uses PowerShell scripts (e.g., POWERPOST) to escalate privileges and access sensitive account information.

A chameleon blending into a digital background, with zeroes and ones flowing around it. This represents the attacker's ability to avoid detection by security measures, changing tactics to blend in with normal network traffic.
Defense Evasion

They utilize registry modifications, anti-forensic techniques such as clearing logs and browser history, and masquerade payloads (like VINETHORN as VPN software) to avoid detection.

A thief with a lockpick toolkit working on a giant keyhole shaped like a login form, representing the attacker's efforts to steal user credentials to gain unauthorized access.
Credential Access

APT42 steals credentials through web browser extraction, keylogging, and by intercepting multi-factor authentication (MFA) tokens using fake login pages.

A magnifying glass moving over a digital map of a network, highlighting files, folders, and network connections. This image represents the phase where attackers explore the environment to understand the structure and where valuable data resides.
Discovery

The group uses Windows Management Instrumentation (WMI) and malware tools (GHAMBAR, POWERPOST) to survey security software, system configurations, and network settings.

A series of interconnected nodes with a shadowy figure moving stealthily between them. This illustrates the attacker's movements within the network, seeking to gain control of additional systems or spread malware.
Lateral Movement

While lateral movement specifics are less detailed, infrastructure acquisition and command-and-control setup imply efforts to pivot within networks once access is gained.

A large vacuum sucking up files, data icons, and folders into a bag held by a shadowy figure. This image symbolizes the process of gathering valuable data from the target network.
Collection

APT42 collects system screenshots, browser session cookies, Microsoft 365 documents, and keylogs, focusing on politically or strategically sensitive material.

A command prompt window open in front of a digital background, with malicious code being typed out. This represents the phase where attackers execute their malicious payload within the compromised system.
Execution

The group executes scripts and malware using PowerShell, VBScript, scheduled tasks, and malicious web links.

A series of files being funneled through a covert channel out of a computer to a cloud labeled with a skull, symbolizing the unauthorized transfer of data to a location controlled by the attacker.
Exfiltration

Data exfiltration is performed over encrypted HTTPS channels using tools like NICECURL. They also use Base64 encoding and anonymized infrastructure to conceal traffic.

A cracked screen with a digital cityscape in chaos behind it, symbolizing the destructive impact of the cyberattack, such as service disruption, data destruction, or financial loss.
Impact

APT42’s operations are focused on long-term intelligence collection rather than disruption or sabotage. Their impact lies in surveillance, data theft, and geopolitical intelligence gathering.

MITRE ATT&CK Mapping

TTPs used by APT42

TA0001: Initial Access
T1566
Phishing
TA0002: Execution
T1059
Command and Scripting Interpreter
TA0003: Persistence
T1547
Boot or Logon Autostart Execution
T1053
Scheduled Task/Job
TA0004: Privilege Escalation
T1547
Boot or Logon Autostart Execution
T1053
Scheduled Task/Job
TA0005: Defense Evasion
T1656
Impersonation
T1112
Modify Registry
T1036
Masquerading
T1070
Indicator Removal
TA0006: Credential Access
T1539
Steal Web Session Cookie
T1555
Credentials from Password Stores
T1111
Multi-Factor Authentication Interception
T1056
Input Capture
TA0007: Discovery
T1518
Software Discovery
T1087
Account Discovery
T1082
System Information Discovery
TA0008: Lateral Movement
No items found.
TA0009: Collection
T1530
Data from Cloud Storage
T1113
Screen Capture
TA0011: Command and Control
T1102
Web Service
T1573
Encrypted Channel
T1132
Data Encoding
T1071
Application Layer Protocol
TA0010: Exfiltration
No items found.
TA0040: Impact
No items found.

FAQs

Who sponsors APT42?

What makes APT42 different from Magic Hound?

How does APT42 gain initial access?

What malware does APT42 use?

How do they maintain persistence on infected systems?

Do they use stolen credentials for cloud platforms?

How do they avoid detection?

What detection techniques are effective against APT42?

Is APT42 destructive?

How can organizations defend against APT42?