APT33 Unleashes Custom Tickler Malware Targeting the US and UAE

Red | Attack Report
Download PDF

The Iranian group APT33 has recently been observed using a new malware strain, dubbed Tickler, to backdoor the networks of various organizations in the United States and the United Arab Emirates. Tickler is a custom, multi-stage backdoor that enables attackers to maintain persistent access and deploy additional malware onto compromised systems, thereby extending their control over the targeted environments. In these attacks, APT33 leveraged Microsoft Azure infrastructure for command-and-control (C2) purposes.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs