New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks
The Agrius group’s focus appears to be Israel and the Middle East.
A likely Iran-backed advanced persistent threat (APT) group has been observed deploying data wiping malware and ransomware attacks against organizations in Israel since around November 2020.
Researchers from SentinelOne this week attributed the attacks to “Agrius,” a new threat actor that started off conducting cyber espionage activities but has since focused on more destructive operations.
In many instances, the threat actor has disguised data wiping attacks as ransomware attacks — victims were informed their data was stolen and encrypted even though it was wiped clean.
“The operators behind the attacks intentionally masked their activity as a ransomware attack, an uncommon behavior for financially motivated groups,” SentinelOne noted in a blog.
The Argius group’s preferred tactic for initial access is to try and exploit known vulnerabilities in an organization’s public-facing Web applications. One favorite appears to be CVE-2018-13379, a long-patched path traversal vulnerability in certain versions of Fortinet’s FortiOS operating system. SentinelOne says its researchers have observed the Agrius group widely exploiting the vulnerability in opportunistic attacks against Israeli targets.
In addition to the FortiOS flaw, Agrius has also been observed exploiting — or attempting to exploit — a variety of so-called “n-day” vulnerabilities, or flaws that are known and for which a patch is already available or in the works. Security analysts consider n-day flaws to be as dangerous, or even more so, than zero-day vulnerabilities because of the information that is publicly available around these flaws for both defenders and attackers. On some occasions, the Argius group has employed SQL injection attacks to try and gain an initial foothold on an organization’s network. Most of the attacks that Agrius has launched have been from IPs belonging to popular VPN services such as ProtonVPN, SentinelOne said.
Once Agrius gains access to a network, the threat actor uploads a webshell and uses it to enable capabilities for lateral movement. In many instances, the webshells are variations of ASPXSpy, a script that allows attackers to gain control of a remote system. SentinelOne says it has observed the threat actor deploying “IPsec Helper,” a custom backdoor written in .NET, for stealing data or deploying additional malware on a compromised network.
“Agrius’ espionage and disruptive activities go hand-in-hand,” says J.A. Guerrero-Saade, principal threat researcher at SentinelOne. “By the very nature of their attack cycle, espionage comes first – conducting lateral movement, scouting the network, placing backdoors, and deciding what data to exfiltrate.”
Once the attackers have what they are after, they move into the disruption phase, Saade says. The use of wipers — or wiper attacks disguised as ransomware — puts Agrius into a relatively small subset of threat actors, he notes. Others include APT33, another Iran-linked threat group, Russia-based Sandworm, and North Korea’s Lazarus Group.
For the moment, the Agrius group’s focus appears to be the Middle East.
“[But] there is nothing limiting their reach other than their intended tasking,” Saade says. “While we haven’t observed Agrius targeting U.S. organizations at this time, we wouldn’t put it beyond them”
Deadwood and Apostle Wipers
SentinelOne says it has observed the Agrius group using two types of wiper malware. One is Deadwood, aka Detbosit — a wiper linked to other Iranian groups, such as APT33 and APT34. Some security vendors have associated the malware to destructive attacks on organizations in the oil and gas sector in the Middle East and other regions. In addition to Deadwood, Agrius also uses a wiper not associated with any other group so far. SentinelOne is tracking that wiper as “Apostle” and believes it was likely developed by the same malware author as the one behind “IPSec Helper.” Since it was first developed, Apostle has been transformed into a full functioning ransomware tool
According to SentinelOne, Agrius’ attacks appear to be part of a broader Iranian government strategy of deploying threat groups to carry out destructive attacks against rival nations using ransomware as a cover. Another recent example is Project Signal, an effort linked to Iran’s Islamic Revolutionary Guard Corps. On the surface, Project Signal also is a financially motivated ransomware operation. On the other hand, it’s equally likely the group is using ransomware as a cover for more destructive attacks, Flashpoint noted recently.
“Iran has a history of attempting to use cybercriminal TTPs to blend in with non-state-sponsored malicious cyber activity to avoid attribution and maintain plausible deniability,” Flashpoint noted.
Saade says it’s hard to know for certain what Agrius group’s specific intentions might be.
“[But] the timing of this activity falls within a period of alleged tit-for-tat exchanges between Israel and Iran – including the claim that Israel wiped an Iranian port facility, while Israeli firms are, in turn, hit with ransomware of purported Iranian origin,” he says.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio