APT39
apt39 · primary source: MITRE · first observed 2013
IR · IranState-sponsoredHigh confidencelast cited Sep 16, 2020 · 6y ago
Iranian state-affiliated intrusion set publicly attributed to Rana Intelligence Computing — an MOIS (Ministry of Intelligence and Security) front company sanctioned by the U.S. Treasury OFAC in September 2020. Targets the telecommunications and travel-reservation systems that Iran's intelligence services use to surveil ethnic minorities, Iranian dissidents, journalists, and former Iranian officials abroad. The 2020 OFAC action named 45 MOIS officers and unsealed parallel FBI charges.
Aliases
ChaferOtherRemix KittenCrowdStrikeITG07Other
Motivations
espionagesurveillance
Target sectors
telecommunicationstravelmediadissidents
Target countries
USGBTRILAESADE
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
1 eventIndicators of compromise
2 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| Name | family · Rana toolset Identifier for the CISA-hosted STIX bundle accompanying the FBI Malware Analysis Report on Rana / APT39 tooling, released alongside Treasury press release SM1127 on 17 Sep 2020. The bundle enumerates hashes, file names and C2 infrastructure for the eight malware sets attributed to MOIS through Rana. | Sep 16, 2020 | U.S. Department of the Treasury |
| Name | family · Rana toolset Composite designation Treasury and the FBI used on 17 Sep 2020 for the eight malware sets (VBS/AutoIt scripts, BITS 1.0 and BITS 2.0 variants, a Firefox-impersonating binary, a Python tool, Android malware and Depot.dat) operated by MOIS front company Rana Intelligence Computing Company (APT39 / Chafer / Remix Kitten). Released as FBI advisory MAR-10303705 the same day Treasury sanctioned the front company and 45 associated individuals. | Sep 16, 2020 | FBI |
Related actors
shared ATT&CK techniques- RU · RussiaGamaredon3 shared techniques
- KP · DPRKLazarus Group3 shared techniques
- CN · ChinaMustang Panda3 shared techniques
- CN · ChinaNaikon3 shared techniques
- KP · DPRKAndariel2 shared techniques
- CN · ChinaAPT32 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). APT39 — actor profile. Retrieved from https://threatintel.local/actors/apt39
latest cited activity · 2020-09-17 · 2 cataloged indicators