Operation Saffron Rose Catches Ajax Security Team in Cyber Espionage

May 13, 2014 | Patrick Bedwell
X

Get the latest security news in your inbox.

Subscribe via Email

No thanks. Close this now.

FireEye published a report today on ‘Operation Saffron Rose’ documenting cyber espionage activity conducted by the Ajax Security Team, a hacking group believed to be based in Iran. The group was previously known for web defacement, but apparently they’ve moved on to malware-based spying.

The techniques used to install the malware and/or acquire credentials include spear phishing using email for a fake IEEE conference and phony web sites that mimic legitimate credential requests, such as Outlook Web Access. The group also distributed anti-censorship software with malware, targeting Iranian dissidents.

The goal of the attack is to load ‘Stealer’ malware onto systems to exfiltrate a range of data via FTP.

It’s interesting how different illegal hacking groups are using similar lures to perform targeted attacks. Two years ago we documented a campaign from the Chinese group Sykipot that was using the same aerospace conference as a lure (http://www.alienvault.com/open-threat-exchange/blog/sykipot-is-back). The domain name Sykipot used was aeroconf13[.]org. The Ajax Security Team used the domain name aeroconf2014[.]org to use the same conference as a lure. A bit lazy – another example of hackers caring about ROI?

AlienVault Unified Security Management™ (USM) and OSSIM have had an Intrusion Detection System signature that detects the data exfiltration performed by this payload since 2011. Our customers have the ability to detect the exfiltration of data with this signature:

     2013346 - TROJAN Unknown Trojan File Stealer FTP File Upload

In addition, AlienVault Labs is going to push a correlation rule to AlienVault USM to generate an alarm that specifically identifies the behavior associated with this threat shortly:

     System Compromise, Targeted Malware, Iranian Ajax Security Team Data Exfiltration

Dark Reading published a story quoting Jaime Blasco, our AlienVault Labs Director, on the threat:

Anatomy Of The New Iranian APT

Former Iranian hacktivist operation evolves into cyber espionage with 'Operation Saffron Rose.'

http://www.darkreading.com/anatomy-of-the-new-iranian-apt/d/d-id/1252695

Patrick Bedwell

About the Author: Patrick Bedwell

Patrick has been working in information security for over 17 years, creating and executing marketing strategies for both startups and public companies.

Read more posts from Patrick Bedwell ›

‹ BACK TO ALL BLOGS

Watch a Demo ›
Get Price Free Trial