Cyber War In The Middle East Is Escalating

Hacking groups with links to Iran are the latest threat that is making the Persian Gulf one of the world’s most active theatres of Cyber warfare. The oil and gas giants of the Middle East have spotted a new hacking groups attempting to break into their computer systems. The American cybersecurity firms Dragos and Dell’s Secureworks have released Reports on the group codenamed Hexane. 

Although neither company makes a definitive accusation about who is responsible for the hacking, both point toward similarities to Iranian hacking groups and alignment with Iran’s strategic political goals.

Hexane intrusion activity includes malicious documents that drop malware to establish footholds for follow-on activity. Although the group appears operational since at least mid-2018, activity accelerated in early- to-mid-2019. This timeline, targeting, and increase of operations coincides with an escalation of tensions within Middle East, a current area of political and military conflict.

It is the latest in a long line of advanced hacking groups seen in and around the Persian Gulf. In the Middle East, there are few if any more important strategic targets than the oil and gas industry that is behind much of the region's wealth and power.
Another cyber threat come from the Lyceum threat group which targets organisations in sectors of strategic national importance, including oil and gas and possibly telecommunications. 

Research suggests that Lyceum may have been active as early as April 2018. Domain registrations also suggest that a campaign in mid-2018 focused on South African targets. 

In May 2019, the threat group launched a campaign against oil and gas organisations in the Middle East. This campaign followed a sharp uptick in development and testing of their toolkit against a public multi-vendor malware scanning service in February 2019. 

Now Hexane
Hexane demonstrates similarities to the activity groups Magnallium and Chrysene. All of these groups arefocusing largely on oil and gas, and some of the behaviors and recently observed tactics, techniques, and procedures (TTPs) are similar. Dragos identified recent Magnallium activity targeting US government and financial organisations as well as oil and gas companies, attempting to gain access to computers at target organisations. 

The collection of Hexane behaviors, tools, and victimology makes this a unique entity compared to these previously-observed activity groups.

One of the most disruptive hacking campaigns the region has ever seen in the last decade took place in 2012 when Iranian hackers broke into Saudi Arabia's Aramco and deleted files to cripple tens of thousands of key company computers. The malware used in that attack is known as Shamoon.

Saudi Aramco, a state-owned oil company and one of the richest companies on earth, is at the heart of that country's power. The region's energy companies are massively important to all of the nations around the Persian Gulf. The Shamoon hackers also hit the Qatar oil company RasGas.

Active since 2018, Hexane has dramatically increased activity in 2019 and deployed new malware against its targets. The first step in the group's tactics are sending spearphishing attacks to human resources and technology staffers at targeted organisations. 

"Compromising individual HR accounts could yield information and account access that could be used in additional spearphishing operations within the targeted environment and against associated organisations," say Secureworks researchers. 

"IT personnel have access to high-privilege accounts and documentation that could help the threat actors understand the environment without blindly navigating the network to find data and systems of interest."

There is some debate among cybersecurity companies about the exact immediate targets of the group. Hackers can target information technology systems like desktop computers or operational technology systems like programmable logic controllers, computers designed specifically for industrial purposes like oil and gas refinement or manufacturing.

Although the Persian Gulf is a hotbed of cyber activity, countries like Iran have a global reach. Earlier this year, Dragos identified a group dubbed Magnallium that is targeting American government, financial, and energy companies. 

Iran continues to be the target of American hackers including, most notably, when President Donald Trump ordered cyber-attacks on Iranian weapons systems after a US drone was shot down by Iranian forces

MIT Technologu Review:            Secureworks:           Dragos:

You Might Also Read: 

US Cyber Attack Disabled Iran’s Ability To Target Shipping:

The Cyber Effect On Modern Warfare:

 

 

« The GDPR Wake-Up Call Is Being Ignored By Business
New Ransomware Formats Double »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

KZ-CERT

KZ-CERT

KZ-CERT is the national Computer Emergency Response Team for Kazakhstan.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Moore ClearComm

Moore ClearComm

Moore ClearComm is part of Moore Kingston Smith a leading UK firm of accountants and business advisers. Our services include Data Privacy, Cyber Security, Business Continuity and Information Security.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.