Iranian threat actor amasses large cyber operations infrastructure network to target Saudi organizations

Iranian threat actor amasses large cyber operations infrastructure network to target Saudi organizations

Insikt Group® researchers used proprietary methods, including Recorded Future Network Traffic Analysis and Recorded Future Domain Analysis, along with common analytical techniques, to profile Iranian cyberespionage threat actor APT33 (Elfin) and determine whether the public exposure of their TTPs in March 2019 impacted their operations.

 

Data sources include the Recorded Future® Platform, Farsight Security’s DNSDB, ReversingLabs, VirusTotal, Shodan, and common OSINT techniques.

 

This report will be of greatest interest to those interested in Middle Eastern geopolitics, as well as network defenders of organizations with a presence in the Middle East or in industries targeted by APT33, such as aerospace and defense, energy, finance, telecommunications, and manufacturing.

 

Click here to download the complete analysis as a PDF. This research is based on data collected between February 10, 2019 and June 6, 2019.

Share on Facebook
Share on Twitter
Please reload

Featured Posts

Northrop Grumman Opens Office in Poland

November 21, 2019

1/10
Please reload

Recent Posts
Please reload

Intelsat General

© 2017 DS AIR Limited. Global Military Communications is part of DS Air Limited. Email: admin@dsairpublications.com

Global Military Communications Twitter
Join our LinkedIn Group
GMC TV