threatintel
actor tracker
All actors

APT34

apt34 · primary source: MITRE · first observed 2013
IR · IranState-sponsoredModerate confidencelast cited Feb 27, 2018 · 8y ago

Iranian state-sponsored actor publicly assessed to operate on behalf of the Iranian government, with persistent targeting of Middle East government, financial, energy, and telecommunications organizations. Known for DNS-tunneling implants and supply-chain compromise against telecom providers as a stepping stone to downstream customers.

Aliases

OilRigOtherHelix KittenCrowdStrikeHazel SandstormMicrosoftEUROPIUMMicrosoftCrambusOther

Motivations

espionage

Target sectors

governmentenergyfinancialtelecommunications

Target countries

SAAEILUSGBKWJO

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • APT34
  • Iran
  • espionage
Infrastructure
  • uber-asia.com
Victim
  • government
  • energy
  • financial
  • SA
  • AE
  • +1 more

MITRE ATT&CK techniques

Tools & malware

1 entry

Timeline

1 event

Indicators of compromise

3 indicators
csv
TypeValueFirst seenSource
SHA-256
26884f872f4fae13da21fa2a24c24e963ee1eb66da47e270246d6d9dc7204c2b
family · Saitama
Malicious Excel document 'Confirmation Receive Document.xls' used by APT34 to drop the Saitama backdoor in the April 2022 Jordanian Foreign Ministry spearphishing campaign analyzed by Malwarebytes.
Apr 25, 2022Malwarebytes (ThreatDown)
Domain
uber-asia[.]com
family · Saitama
DNS-tunneling C2 domain used by APT34's Saitama backdoor per the May 2022 Malwarebytes analysis; one of three actor-controlled domains (alongside asiaworldremit.com and joexpediagroup.com) impersonating legitimate travel and remittance brands.
Apr 25, 2022Malwarebytes (ThreatDown)
SHA-256
e0872958b8d3824089e5e1cfab03d9d98d22b9bcb294463818d721380075a52d
family · Saitama
Saitama .NET backdoor payload (update.exe) attributed by Malwarebytes/ThreatDown to APT34 (OilRig / Helix Kitten / Hazel Sandstorm) in a May 2022 spearphishing operation against a Jordanian Ministry of Foreign Affairs official. Saitama uses DNS tunneling for C2.
Apr 25, 2022Malwarebytes (ThreatDown)

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). APT34 — actor profile. Retrieved from https://threatintel.local/actors/apt34

latest cited activity · 2018-02-28 · 3 cataloged indicators