Headlines

APT35 Expands Arsenal: Mac Malware on the Rise

APT35 Expands Arsenal: Mac Malware on the Risemacmalware,APT35,cybersecurity,cyberattacks,hacking,threatintelligence

The Sophisticated Mac Malware Used by APT35 in Targeted Cyberattacks

An Overview of the Cyberattack

APT35, a state-sponsored Iranian cyber espionage group also known as Charming Kitten, TA453, and Tortoiseshell, has developed custom Mac malware called “NokNok” to carry out targeted cyberattacks on individuals in civil society. Recent research by cybersecurity firm Proofpoint revealed that APT35 sent a convincing email to a public media contact of a US-based think tank focused on foreign affairs, posing as a senior fellow with the Royal United Services Institute. The email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review.

The attackers engaged in a series of benign email interactions with the intended target to build trust. Eventually, they provided a malicious link to a Google Script macro, which redirected the target to a Dropbox URL. At the Dropbox location, the target could access a password-protected .RAR file containing a malicious LNK file. This LNK file, in turn, downloaded the NokNok malware onto the victim’s Mac.

Evolution of APT35 Tactics

This attack appears to be part of a broader campaign by APT35, which has recently updated its cyberattack arsenal. Prior research by Volexity highlighted a spear-phishing campaign against an Israeli journalist that used a similar infection routine, delivering a password-protected .RAR file containing a malicious LNK file. In that instance, the payload was a Windows code called PowerStar. Proofpoint researchers have tracked the Windows threat as “GorjoEcho” and have identified NokNok as the Mac version of PowerStar/GorjoEcho.

The Changing Tactics of APT35

The use of .RAR and .LNK files is a departure from APT35‘s typical infection chain involving VBA macros or remote template injection. Microsoft’s default disabling of macros downloaded from the Internet has forced threat actors to adopt new techniques for malware delivery. According to Joshua Miller, a senior threat researcher at Proofpoint, the use of LNK files in attack chains requires more human interaction, potentially increasing the chances of detection. Miller explains that threat actors have resorted to more convoluted attack chains, such as sending emails with PDF attachments containing URLs leading to password-protected zip files that include an LNK file to install malware.

The Attribution of APT35 and Their Targets

Proofpoint confidently attributes this campaign to APT35 based on code similarities with previous activities and similarities in overall campaign tactics, techniques, and procedures. The cybersecurity firm believes that APT35 operates in support of the Islamic Revolutionary Guard Corps (IRGC), specifically the IRGC Intelligence Organization (IRGC-IO). The group’s targets align with its objectives and usually include Middle Eastern military, diplomatic, and government personnel, media organizations, energy and defense industries, as well as engineering, business services, and telecommunications sectors.

The Motivation Behind the Targeting of Israeli Experts

According to Proofpoint, APT35 has focused a significant portion of its targeting efforts on experts who are likely informing foreign policies related to the ongoing Joint Comprehensive Plan of Action negotiations. As Tehran finds itself increasingly isolated within its sphere of influence, APT35 aims to gather intelligence from these experts to bolster Iran’s position. The group’s complex social engineering efforts suggest that it is well-resourced and well-equipped to carry out its operations effectively.

Expert Recommendations for Protecting Against APT35

Enhancing Email Security Measures

Given that APT35 primarily relies on spear-phishing to initiate attacks, organizations and individuals should strengthen their email security measures. This includes implementing robust spam filters, using email authentication protocols such as DMARC, DKIM, and SPF, and providing cybersecurity training to employees to increase awareness of phishing techniques.

Implementing Multi-Factor Authentication

To protect against unauthorized access, organizations and individuals should consider implementing multi-factor authentication (MFA) on all critical systems and accounts. MFA adds an extra layer of security, requiring users to provide additional verification beyond their password, such as a fingerprint or unique code generated by an app.

Maintaining Up-to-Date Software and Patching

To mitigate vulnerabilities that threat actors may exploit, it is essential to regularly update software and promptly apply security patches. This includes operating systems, applications, and security software. Keeping systems up-to-date reduces the risk of attackers exploiting known vulnerabilities.

Implementing Endpoint Protection Solutions

Endpoint protection solutions, such as antivirus and anti-malware software, can help detect and prevent malicious activities on individual devices. It is crucial to select reputable and up-to-date security software and regularly update virus definitions to ensure maximum protection.

Exercising Caution with Email Attachments and Links

Users should exercise caution when opening email attachments or clicking on links, particularly from unknown or suspicious sources. It is advisable to verify the authenticity of the sender before interacting with any email attachments or embedded links. Additionally, users should avoid entering sensitive information on unfamiliar websites or pages.

Conclusion

The discovery of the custom Mac malware NokNok and its usage by APT35 highlights the evolving tactics of state-sponsored cyber espionage groups. APT35‘s ability to adapt its attack techniques to bypass security measures demonstrates the need for continuous vigilance and robust cybersecurity practices. Organizations and individuals should remain proactive in implementing security measures to protect against these advanced threats. By enhancing email security, implementing multi-factor authentication, maintaining up-to-date software, implementing endpoint protection solutions, and exercising caution with email attachments and links, the risk of falling victim to APT35 and similar threat actors can be significantly reduced.

Cybersecuritymacmalware,APT35,cybersecurity,cyberattacks,hacking,threatintelligence


APT35 Expands Arsenal: Mac Malware on the Rise
<< photo by cottonbro studio >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !