Threats Feed|Lyceum|Last Updated 24/01/2025|AuthorCertfa Radar|Publish Date07/10/2020

Lyceum APT Targets Middle Eastern Oil, Gas, and Telecom Sectors

  • Actor Motivations: Exfiltration
  • Attack Vectors: Malicious Macro,Malware,RAT
  • Attack Complexity: High
  • Threat Risk: High Impact/Low Probability

Threat Overview

The Lyceum APT targets the oil, gas and telecommunications sectors in the Middle East, focusing on credential theft and network infiltration through a multi-stage attack chain. The initial infection involves malicious Microsoft Office documents that deploy DanDrop, a VBA-based malware dropper that installs DanBot, a remote access Trojan used for ongoing control. The group also uses PowerShell scripts, including keyloggers and credential decryption tools, to gather sensitive data from Active Directory and RDCMan configurations. The sophisticated attack chain used by this cybercrime group highlights the ongoing threat to critical infrastructure in the Middle East.

Detected Targets

TypeDescriptionConfidence
SectorOil and Gas
Verified
SectorTelecommunication
Verified
RegionMiddle East Countries
Verified