Peach Sandstorm Targets US and UAE Critical Sectors with Tickler Malware
- Actor Motivations: Espionage,Exfiltration
- Attack Vectors: Compromised Credentials,Backdoor,Malware,Spear Phishing
- Attack Complexity: Very High
- Threat Risk: High Impact/High Probability
Threat Overview
Between April and July 2024, Iranian state-sponsored group Peach Sandstorm deployed a custom backdoor called Tickler in intelligence-gathering operations against satellite, communications, oil and gas, and government sectors in the US and UAE. Their tactics included password spray attacks and LinkedIn-based social engineering. Tickler malware leveraged Azure infrastructure for command-and-control (C2) and utilized DLL files for persistence. Peach Sandstorm also accessed compromised Active Directory accounts to further exploit targeted environments. Their evolving tradecraft demonstrates a persistent focus on the intelligence sector, including higher education, government, and defense.
Detected Targets
Type | Description | Confidence |
---|---|---|
Sector | Defense | Verified |
Sector | Government Agencies and Services | Verified |
Sector | Aerospace | Verified |
Sector | Education | Verified |
Sector | Oil and Gas | Verified |
Sector | Telecommunication | Verified |
Region | Australia | Verified |
Region | United Arab Emirates | Verified |
Region | United States | Verified |
Extracted IOCs
- centersoftwaresupports.azurewebsites[.]net
- getsdervicessupoortss.azurewebsites[.]net
- getservicessuports.azurewebsites[.]net
- getservicessupports.azurewebsites[.]net
- getsupportsservices.azurewebsites[.]net
- nodetestservers.azurewebsites[.]net
- satellite2.azurewebsites[.]net
- satellitegardens.azurewebsites[.]net
- satellitespecialists.azurewebsites[.]net
- satservicesdev.azurewebsites[.]net
- servicessupports.azurewebsites[.]net
- softwareservicesupport.azurewebsites[.]net
- softwareservicesupports.azurewebsites[.]net
- subreviews.azurewebsites[.]net
- supportsoftwarecenter.azurewebsites[.]net
- websupportprotection.azurewebsites[.]net
- 22017c9b022e6f2560fee7d544a83ea9e3d85abee367f2f20b3b0448691fe2d4
- 56ac00856b19b41bc388ecf749eb4651369e7ced0529e9bf422284070de457b6
- 5df4269998ed79fbc997766303759768ce89ff1412550b35ff32e85db3c1f57b
- 711d3deccc22f5acfd3a41b8c8defb111db0f2b474febdc7f20a468f67db0350
- 7eb2e9e8cd450fc353323fd2e8b84fbbdfe061a8441fd71750250752c577d198
- ccb617cc7418a3b22179e00d21db26754666979b4c4f34c7fda8c0082d08cec4
- dad53a78662707d182cdb230e999ef6effc0b259def31c196c51cc3e8c42a9b8
- e984d9085ae1b1b0849199d883d05efbccc92242b1546aeca8afd4b1868c54f5
- fb70ff49411ce04951895977acfc06fa468e4aa504676dedeb40ba5cea76f37f
Tip: 25 related IOCs (0 IP, 16 domain, 0 URL, 0 email, 9 file hash) to this threat have been found.