OilRig’s New Malware Arsenal Unveiled by ESET

, OilRig Malware

In a digital age fraught with escalating cyber threats, the Iranian state-sponsored hacking group, known as OilRig, intensifies its shadow war with the deployment of new, insidious malware. This advanced persistent threat (APT) actor persists with unrelenting fervor, unveiling three new downloader malware—ODAgent, OilCheck, and OilBooster—throughout 2022.

Renowned cyber-sleuths at Slovak cybersecurity firm ESET have uncovered that these downloaders deftly exploit legitimate cloud service APIs. Crafting a veil of legitimacy, they use Microsoft Graph OneDrive, Outlook, and Exchange Web Services (EWS) APIs. These malicious tools are cogs within a grander scheme, performing the dual function of command-and-control communication and covert data exfiltration. ESET’s revelations illuminate the heightened sophistication of the group’s modus operandi, which now excels at mingling with genuine network traffic to obscure their nefarious infrastructure.

OilRig’s target net is wide, ensnaring diverse organizations, from healthcare to local government. Alarming still, all victims bear the scars of prior cyber skirmishes with this relentless adversary. Despite the pervasive anxiety enveloping these attacks, the path through which OilRig infiltrates these systems remains shrouded in mystery. Lingering doubts cloud our understanding of the group’s tenacity within these compromised networks.

Regarded alternately as APT34, Cobalt Gypsy, and other monikers, OilRig has been a vanguard of Iranian cyber espionage since at least 2014. Its arsenal houses a trove of malware strains like Solar and Menorah, underscoring a tactical diversity and adaptability.

These newfound tools are not entirely unprecedented; we see the spectral echoes of past campaigns in their designs. For instance, ODAgent and SampleCheck5000 intertwine with cloud services to execute their subterfuge. Similarly, OilBooster and OilCheck mirror their brethren but differ in the APIs they harness. The strategic use of shared OilRig-operated accounts stands out, a clever ploy to dispense commands and siphon data whilst nestled amidst the cacophony of legitimate exchanges.

The inimitable quality of these downloaders lies in their reliance on legitimate cloud service providers for stealthy incursions and the ability to uphold a presence within victim organizations, as discussed in detailed reports by ESET. The evolution of these tools reflects a chilling patience and an adaptability that sends a clear message: the cyber battlefield demands unwavering vigilance and robust defenses (ESET Research).

In the cyclical dance of advancement between cybercriminals and defenders, the OilRig group’s actions serve as a stark reminder. They underscore the ongoing, unseen wars waged within the digital shadows. It emphasizes an indisputable reality: in cyberspace, the only constant is the unyielding pace of change and the need for ever-more-sophisticated fortifications.

If you enjoyed this article, please check out our other articles on CyberNow

December 14, 2023
The Iranian APT group OilRig deploys new downloader malware, exploiting cloud service APIs to execute and conceal cyber attacks.