13 June 2022

Iranian cyber snoops attack energy sector with new DNS backdoor


Iranian cyber snoops attack energy sector with new DNS backdoor

The Lyceum cyber espionage group, which is believed to be connected to the Iranian government, conducts attacks on companies in the energy and telecommunication sectors using a new DNS backdoor.

According to analytics from cloud security company Zscaler, this new backdoor is based on .NET platform. Using a customized version of the DIG.net open-source tool the backdoor carries out "DNS hijacking" attacks – DNS query manipulation to redirect users to malicious clones of legitimate sites – executes commands, drops payloads, and steals data.

The Lyceum APT created a fake news site which distributes Word document containing a malicious macro. This document pretends to be a news report with an Iran Military affairs topic. When the visitors download the file from this site, it asks them to enable macro to view the content. After enabling macros, the DnsSystem.exe backdoor is dropped in the Startup folder on victims’ machines for establishing persistence between reboots.

Hackers can perform DNS queries for various records on the custom DNS Server, parse the response of the query to execute system commands remotely, and upload/download files from the C2 server using the DNS protocol. The backdoor is able to receive commands from the C2 and execute them on the breached systems. It also can steal local files and transfer them to the C2 or download files from a remote resource and drop additional payloads.

The Lyceum APT is known for targeting oil and gas organizations and telecommunication providers in the Middle East. The first report about the group’s activity emerged at the beginning of August 2019. At the time, to gain initial access to organization’s systems the hackers used account credentials obtained via password spraying or brute-force attacks.

Back to the list

Latest Posts

Iranian hackers exploit RMM tools to deliver malware

Iranian hackers exploit RMM tools to deliver malware

One of the aspects of MuddyWater's strategy involves exploiting Atera's free trial offers.
24 April 2024
Ongoing malware campaign targets multiple industries, distributes infostealers

Ongoing malware campaign targets multiple industries, distributes infostealers

The campaign leverages a CDN cache domain as a download server, hosting malicious HTA files and payloads.
24 April 2024
US charges four Iranian hackers for cyber intrusions

US charges four Iranian hackers for cyber intrusions

The group targeted both both government and private entities.
24 April 2024