Seedworm's Persistent Cyber Campaigns: Intelligence Gathering across Multiple Sectors
- Actor Motivations: Espionage,Exfiltration
- Attack Vectors: Backdoor,Malware
- Attack Complexity: High
- Threat Risk: High Impact/High Probability
Threat Overview
Seedworm has compromised more than 130 victims across 30 organizations since September 2018. The group targets primarily the Middle East, Europe, and North America, focusing on government agencies, oil and gas companies, NGOs, telecoms, and IT firms. Seedworm uses tools such as Powermud, Powemuddy, and PowerShell scripts and has updated its tactics to avoid detection. The main targeted sectors include telecommunications, IT services, oil and gas, universities, and embassies. The group is known for its speed and agility in obtaining actionable intelligence from targeted organizations.
Detected Targets
Type | Description | Confidence |
---|---|---|
Sector | Government Agencies and Services | Verified |
Sector | Manufacturing | Verified |
Sector | Healthcare | Verified |
Sector | Oil and Gas | Verified |
Sector | Telecommunication | Verified |
Region | Afghanistan | Verified |
Region | Armenia | Verified |
Region | Egypt | Verified |
Region | Iraq | Verified |
Region | Jordan | Verified |
Region | Netherlands | Verified |
Region | Oman | Verified |
Region | Pakistan | Verified |
Region | Russia | Verified |
Region | Saudi Arabia | Verified |
Region | Turkey | Verified |
Region | United States | Verified |
Extracted IOCs
- 2ae299e3693518104bf194d6257d5be6
- 35c310a1f88e41e777bc2ac4bc5284d9
- 488723b8e56dbaac8ccdc79499037d5f
- 54982c616098f6c6fbc48703922f15f4
- 837eaad1187fe9fbf91f9bc7c054f5d9
- 8e3a42371d7af2c7d0bb4036c9fb0fe3
- 8e94d1cb1ec6ea5b2c29353eb7bb5787
- 989e9dcc2182e2b5903b9acea03be11d
- 9bea3eb68ea0c215a17fa69f632d9020
- a750e2885ed3c294de148864723f73e3
- ddba713c20c232bcd60daf0ffabeffb8
- e2ed0be977ab9e50055337ec8eb0ddf4
- e6e7661efb60b9aea7969a30e17ace19
- e75443a5e825f69c75380b6dc76c6b50
- f041f96ed1abdcc84157488aa51b62af
- f5dee1f9cd47dc7bae468da9732c862e
- f8902df9fe49a04f101d0bfb41a33028
- fa200e715e856550c76f729604ebaf57
- 104[.]237.233.60
- 185[.]34.16.82
- 31[.]171.154.67
- 46[.]99.148.96
- 78[.]129.139.148
- 78[.]129.222.56
- 79[.]106.224.203
Tip: 25 related IOCs (7 IP, 0 domain, 0 URL, 0 email, 18 file hash) to this threat have been found.
Overlaps
Source: Picussecurity - March 2022
Detection (nine cases): 488723b8e56dbaac8ccdc79499037d5f, 54982c616098f6c6fbc48703922f15f4, 837eaad1187fe9fbf91f9bc7c054f5d9, 989e9dcc2182e2b5903b9acea03be11d, a750e2885ed3c294de148864723f73e3, ddba713c20c232bcd60daf0ffabeffb8, e2ed0be977ab9e50055337ec8eb0ddf4, e6e7661efb60b9aea7969a30e17ace19, fa200e715e856550c76f729604ebaf57
Source: Trend Micro - June 2019
Detection (five cases): 185[.]34.16.82, 31[.]171.154.67, 46[.]99.148.96, 78[.]129.139.148, 79[.]106.224.203
Source: Kaspersky - April 2019
Detection (one case): 78[.]129.222.56
Source: Rewterz - February 2019
Detection (five cases): 31[.]171.154.67, 46[.]99.148.96, 78[.]129.139.148, 78[.]129.222.56, 79[.]106.224.203
Source: Securelist - October 2018
Detection (one case): 104[.]237.233.60
Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.