APT34
apt34 · primary source: MITRE · first observed 2013
IR · IranState-sponsoredModerate confidencelast cited Feb 27, 2018 · 8y ago
Iranian state-sponsored actor publicly assessed to operate on behalf of the Iranian government, with persistent targeting of Middle East government, financial, energy, and telecommunications organizations. Known for DNS-tunneling implants and supply-chain compromise against telecom providers as a stepping stone to downstream customers.
Aliases
OilRigOtherHelix KittenCrowdStrikeHazel SandstormMicrosoftEUROPIUMMicrosoftCrambusOther
Motivations
espionage
Target sectors
governmentenergyfinancialtelecommunications
Target countries
SAAEILUSGBKWJO
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
1 eventIndicators of compromise
3 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · Saitama Malicious Excel document 'Confirmation Receive Document.xls' used by APT34 to drop the Saitama backdoor in the April 2022 Jordanian Foreign Ministry spearphishing campaign analyzed by Malwarebytes. | Apr 25, 2022 | Malwarebytes (ThreatDown) |
| Domain | family · Saitama DNS-tunneling C2 domain used by APT34's Saitama backdoor per the May 2022 Malwarebytes analysis; one of three actor-controlled domains (alongside asiaworldremit.com and joexpediagroup.com) impersonating legitimate travel and remittance brands. | Apr 25, 2022 | Malwarebytes (ThreatDown) |
| SHA-256 | family · Saitama Saitama .NET backdoor payload (update.exe) attributed by Malwarebytes/ThreatDown to APT34 (OilRig / Helix Kitten / Hazel Sandstorm) in a May 2022 spearphishing operation against a Jordanian Ministry of Foreign Affairs official. Saitama uses DNS tunneling for C2. | Apr 25, 2022 | Malwarebytes (ThreatDown) |
Related actors
shared ATT&CK techniques- CN · ChinaAPT402 shared techniques
- RU · RussiaCOLDRIVER2 shared techniques
- RU · RussiaDragonfly2 shared techniques
- RU · RussiaRomCom2 shared techniques
- CN · ChinaSalt Typhoon2 shared techniques
- KP · DPRKAndariel1 shared technique
References
cite this page
Threat Intel Tracker. (2026-05-19). APT34 — actor profile. Retrieved from https://threatintel.local/actors/apt34
latest cited activity · 2018-02-28 · 3 cataloged indicators