Iranian Hackers Use “Dream Job” Lures to Deploy SnailResin Malware in Aerospace Attacks

Iranian Hackers Use

November 13, 2024 at 07:15AM

The Iranian threat actor TA455 has mimicked North Korean tactics in a Dream Job campaign, targeting the aerospace industry with fake job offers. The campaign distributes SnailResin malware, enabling remote access and credential theft. This approach includes using social engineering, impostor personas, and multi-stage infection methods to evade detection.

**Meeting Takeaways on Cyber Threat Actor TA455:**

1. **Identity and Affiliations**:
– TA455 is an Iranian threat actor associated with the Islamic Revolutionary Guard Corps (IRGC).
– Also known as UNC1549 and Yellow Dev 13, it operates within the APT35 cluster.

2. **Recent Activities**:
– Since September 2023, TA455 has mimicked North Korean strategies, specifically the “Dream Job” campaign, targeting the aerospace sector with fake job offers.

3. **Malware Deployment**:
– The campaign distributes SnailResin malware, which activates the SlugResin backdoor, allowing extensive control over compromised machines.

4. **Targeting and Methods**:
– The group conducted targeted attacks against aerospace and defense industries in the Middle East, leveraging social engineering tactics through job offers.
– Notable tactics include fake recruitment websites and LinkedIn profiles to distribute malware.

5. **Malware Characteristics**:
– The attacks utilize DLL side-loading with malicious executables (e.g., “SignedConnection.exe” and “secur32.dll”).
– Microsoft identified “secur32.dll” as the trojan loader SnailResin, facilitating access to additional malware.

6. **Operational Techniques**:
– TA455 employs a multi-stage infection process, including spear-phishing emails with malicious attachments disguised as job-related materials.
– Uses GitHub for command-and-control operations, encoding actual servers to obfuscate malicious activity.

7. **Comparison with Other Groups**:
– Similarities identified between TA455’s tactics and those of the Lazarus Group suggest either tool sharing or deliberate imitation to confuse attribution.

8. **Context from Previous Reports**:
– TA455’s job-themed decoys have been observed in past espionage activities, indicating a persistent strategy in their cyber threats.

Overall, the activities of TA455 signify a sophisticated approach to cyber espionage, particularly targeting sensitive industries through socially engineered tactics and advanced malware strategies.

Full Article