Thamar Reservoir: Iranian Cyber Campaign Targets Middle East Sectors
- Actor Motivations: Espionage,Exfiltration
- Attack Vectors: Keylogger,Spear Phishing
- Attack Complexity: Medium
- Threat Risk: Low Impact/High Probability
Threat Overview
Clearsky's "Thamar Reservoir" report details a sustained Iranian cyber-attack campaign targeting over 550 individuals, primarily in the Middle East. The attacks, which began in 2014, used a variety of techniques, including spear-phishing emails with malware, phone calls, and compromised websites to create fake login pages. The attackers were persistent but lacked technical sophistication and made mistakes that aided the investigation. The report concludes that the campaign's targets and methods strongly suggest Iranian state sponsorship, and links it to other known Iranian cyber operations.
Detected Targets
Type | Description | Confidence |
---|---|---|
Sector | Defense | Verified |
Sector | Human Rights | Verified |
Sector | Journalists | Verified |
Sector | Researchers | Verified |
Region | Afghanistan | Verified |
Region | Canada | Verified |
Region | Egypt | Verified |
Region | Iran | Verified |
Region | Iraq | Verified |
Region | Israel | Verified |
Region | Jordan | Verified |
Region | Kuwait | Verified |
Region | Morocco | Verified |
Region | Pakistan | Verified |
Region | Saudi Arabia | Verified |
Region | Spain | Verified |
Region | Syria | Verified |
Region | Turkey | Verified |
Region | United Arab Emirates | Verified |
Region | United Kingdom | Verified |
Region | Venezuela | Verified |
Region | Yemen | Verified |
Region | Middle East Countries | High |
Extracted IOCs
- drive-google[.]co
- drives-google[.]co
- gfimail[.]us
- google-setting[.]com
- google-verify[.]com
- login-users[.]com
- mail-verify[.]com
- qooqle[.]co
- video.qooqle[.]co
- saeed.kn2003@gmail[.]com
- 55ff220e38556ff902528ac984fc72dc
- 60f5bc820cf38e78b51e1e20fed290b5
- b4790618672197cab31681994bbc10a4
- 476489f75fed479f19bac02c79ce1befc62a6633
- b67572a18282e79974dc61fffb8ca3d0f4fca1b0
- d5b2b30fe2d4759c199e3659d561a50f88a7fb2e
- 072a43123e755ad1bdd159488a85a353227ec51f273c4f79c26ff7e4656c0ef4
- 1c9e519dca0468a87322bebe2a06741136de7969a4eb3efda0ab8db83f0807b4
- 69e48eb82ce7387d65cc1a82c5a6a170dc6121d479736b1dd33358d09c483617
- 107[.]6.172.51
- 31[.]192.105.10
- 5[.]39.223.227
Tip: 22 related IOCs (3 IP, 9 domain, 0 URL, 1 email, 9 file hash) to this threat have been found.
Overlaps
Source: Iran Threats - December 2017
Detection (two cases): google-setting[.]com, google-verify[.]com
Source: Trend Micro - March 2015
Detection (two cases): 476489f75fed479f19bac02c79ce1befc62a6633, d5b2b30fe2d4759c199e3659d561a50f88a7fb2e
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.