CURIUM

CURIUM is an Iranian threat group, first reported in September 2019 and active since at least July 2018, targeting IT service providers in the Middle East.[1] CURIUM has since invested in building relationships with potential targets via social media over a period of months to establish trust and confidence before sending malware. Security researchers note CURIUM has demonstrated great patience and persistence by chatting with potential targets daily and sending benign files to help lower their security consciousness.[2]

ID: G1012
Associated Groups: Crimson Sandstorm, TA456, Tortoise Shell, Yellow Liderc
Contributors: Denise Tan; Wirapong Petshagun
Version: 3.0
Created: 13 January 2023
Last Modified: 02 October 2024

Associated Group Descriptions

Name Description
Crimson Sandstorm

[3]

TA456

[3][4]

Tortoise Shell

[3]

Yellow Liderc

[5]

Techniques Used

Domain ID Name Use
Enterprise T1005 从本地系统获取数据

CURIUM has exfiltrated data from a compromised machine.[2]

Enterprise T1598 .003 信息钓鱼: Spearphishing Link

CURIUM used malicious links to adversary-controlled resources for credential harvesting.[5]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

CURIUM has leveraged PowerShell scripts for initial process execution and data gathering in victim environments.[1]

Enterprise T1584 .006 基础设施妥协: Web Services

CURIUM has compromised legitimate websites to enable strategic website compromise attacks.[5]

Enterprise T1585 .001 建立账户: Social Media Accounts

CURIUM has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman.[2]

.002 建立账户: Email Accounts

CURIUM has created dedicated email accounts for use with tools such as IMAPLoader.[5]

Enterprise T1608 .004 暂存能力: Drive-by Target

CURIUM used strategic website compromise to fingerprint then target victims.[5]

Enterprise T1048 .002 替代协议渗出: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

CURIUM has used SMTPS to exfiltrate collected data from victims.[5]

Enterprise T1505 .003 服务器软件组件: Web Shell

CURIUM has been linked to web shells following likely server compromise as an initial access vector into victim networks.[1]

Enterprise T1189 浏览器攻击

CURIUM has used strategic website compromise to infect victims with malware such as IMAPLoader.[5]

Enterprise T1204 .002 用户执行: Malicious File

CURIUM has lured users into opening malicious files delivered via social media.[2]

Enterprise T1082 系统信息发现

CURIUM deploys information gathering tools focused on capturing IP configuration, running application, system information, and network connectivity information.[1]

Enterprise T1124 系统时间发现

CURIUM deployed mechanisms to check system time information following strategic website compromise attacks.[5]

Enterprise T1583 .001 获取基础设施: Domains

CURIUM created domains to facilitate strategic website compromise and credential capture activities.[5]

.003 获取基础设施: Virtual Private Server

CURIUM created virtual private server instances to facilitate use of malicious domains and other items.[5]

.004 获取基础设施: Server

CURIUM has created dedicated servers for command and control and exfiltration purposes.[5]

Enterprise T1041 通过C2信道渗出

CURIUM has used IMAP and SMTPS for exfiltration via tools such as IMAPLoader.[5]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

CURIUM has used phishing with malicious attachments for initial access to victim environments.[5]

.003 钓鱼: Spearphishing via Service

CURIUM has used social media to deliver malicious files to victims.[2]

Software

References