Threats Feed|OilRig|Last Updated 11/06/2025|AuthorCertfa Radar|Publish Date30/04/2019

OilRig's Global Cyber Offensive: Credential Theft and Persistent Access

  • Actor Motivations: Espionage,Exfiltration
  • Attack Vectors: Brute-force,Credential stuffing,Compromised Credentials,SQL injection,Vulnerability Exploitation,DNS spoofing,Backdoor,Fileless malware
  • Attack Complexity: High
  • Threat Risk: High Impact/High Probability

Threat Overview

The OilRig group has been actively targeting various sectors, including government, media, energy, and technology across 27 countries. The group has stolen nearly 13,000 credentials, deployed over 100 webshells, and maintained backdoor access to compromised hosts. Techniques include credential dumping with Mimikatz, DNS hijacking, and using PowerShell-based tools like Glimpse and Poison Frog. Their operations involve SQL injections, exploiting public-facing applications, and leveraging webshells for persistent access. The group's sophisticated TTPs underline their persistent threat to diverse industry verticals.

Detected Targets

TypeDescriptionConfidence
SectorGovernment Agencies and Services
Verified
SectorInformation Technology
Verified
SectorLogistics
Verified
SectorEnergy
Verified
SectorMedia
Verified
SectorTransportation
Verified
RegionAlbania
Verified
RegionBahrain
Verified
RegionCambodia
Verified
RegionChina
Verified
RegionEgypt
Verified
RegionHong Kong
Verified
RegionIraq
Verified
RegionIsrael
Verified
RegionJordan
Verified
RegionKazakhstan
Verified
RegionKuwait
Verified
RegionLebanon
Verified
RegionMacau
Verified
RegionMexico
Verified
RegionMongolia
Verified
RegionNigeria
Verified
RegionOman
Verified
RegionPalestine
Verified
RegionQatar
Verified
RegionSaudi Arabia
Verified
RegionSouth Korea
Verified
RegionTaiwan
Verified
RegionThailand
Verified
RegionTurkey
Verified
RegionUnited Arab Emirates
Verified
RegionZimbabwe
Verified
RegionMiddle East Countries
Verified

Extracted IOCs

  • msoffice-cdn[.]com
  • myleftheart[.]com
  • office365-management[.]com
  • 0f20995d431abce885b8bd7dec1013cc1ef7c73886029c67df53101ea330436c
  • 11f66b55f3d24303621e5ef9565b02a576cc58bc5f8789cae96c3d400064b90e
  • 1fb69090be8a2e11eeb220b26ee5eddf1e3fe81ffa59c47d47d01bf90c2b080c
  • 22c4023c8daa57434ef79b838e601d9d72833fec363340536396fe7d08ee2017
  • 27e03b98ae0f6f2650f378e9292384f1350f95ee4f3ac009e0113a8d9e2e14ed
  • 3ca3a957c526eaeabcf17b0b2cd345c0fffab549adfdf04470b6983b87f7ec62
  • 54c8bfa0be1d1419bf0770d49e937b284b52df212df19551576f73653a7d061f
  • 5f42deb792d8d6f347c58ddbf634a673b3e870ed9977fdd88760e38088cd7336
  • 691801e3583991a92a2ad7dfa8a85396a97acdf8a0054f3edffd94fc1ad58948
  • 903b6d948c16dc92b69fe1de76cf64ab8377893770bf47c29bf91f3fd987f996
  • 995ea68dcf27c4a2d482b3afadbd8da546d635d72f6b458557175e0cb98dd999
  • 9ba9bc08259afeef36d2689ef1b5f71ca231d7e590901fa56e69e2c9758a07ef
  • a6a0fbfee08367046d3d26fb4b4cf7779f7fb6eaf7e60e1d9b6bf31c5be5b63e
  • c9d5dc956841e000bfd8762e2f0b48b66c79b79500e894b4efa7fb9ba17e4e9e
  • d2b835b102117e327fdc4905ead24d45f46e82dd5ae525e90cca0a685d307619
  • dd6d7af00ef4ca89a319a230cdd094275c3a1d365807fe5b34133324bdaa0229
  • e483eee77fcc5ef11d5bf33a4179312753b62ec9a247dd14528cc797e7632d99
  • fe1b011fe089969d960d2dce2a61020725a02e15dbc812ee6b6ecc6a98875392
  • fe9cdef3c88f83b74512ec6400b7231d7295bda78079b116627c4bc9b7a373e0
  • 142[.]234.157.21
  • 164[.]132.67.216
  • 185[.]161.209.57
  • 185[.]161.210.25
  • 185[.]162.235.106
  • 185[.]162.235.121
  • 185[.]162.235.29
  • 185[.]36.191.31
  • 193[.]111.152.13
  • 212[.]32.226.245
download

Tip: 32 related IOCs (10 IP, 3 domain, 0 URL, 0 email, 19 file hash) to this threat have been found.

FAQs

Understanding the OilRig Data Leak

A significant data leak revealed internal tools, stolen credentials, and operational infrastructure tied to the OilRig group, a known cyber espionage actor.

The OilRig group, also known as APT34 or Helix Kitten, is believed to be linked to Iran, based on multiple industry and government reports.

The group aims to gain long-term access to targeted systems for espionage purposes, often stealing credentials and sensitive data.

At least 97 organizations across 27 countries and 18 industries were identified in the leaked data, with over 13,000 stolen credentials.

The campaign targeted a wide range of sectors, including government, energy, media, transportation, and technology service providers.

OilRig used stolen credentials, PowerShell backdoors, webshells, DNS hijacking, and lateral movement through corporate networks to gain and maintain access.

They hold sensitive information and have access to critical infrastructure—attractive to nation-state actors seeking intelligence or disruption capabilities.

Enforce multi-factor authentication, monitor for DNS tunneling, restrict PowerShell, scan for known malware signatures, and educate users on phishing risks.

The campaign is highly targeted but spans many industries and geographies, indicating OilRig's broad scope and persistent interest in strategic sectors.