Iranian APT is targeting Middle Eastern Aerospace and Telecommunications companies

Threat Level – Amber | Vulnerability Report
Download PDF

For a detailed advisory, download the pdf file here.

ShellClient is a powerful new Remote Access Trojan (RAT) that was used in highly targeted attacks on a select few Aerospace and Telecommunications firms, primarily in the Middle East, with other victims in the United States, Russia, and Europe. The attacks were carried out by a newly uncovered Iranian activity group known as MalKamak, which has been active since at least 2018 but has remained unknown until now. ShellClient follows the trend of abusing cloud-based storage services, in this case the popular Dropbox service. The programmers of ShellClient decided to leave their old C2 domain and replace the malware’s C2 mechanism with a simpler C2 channel to exfiltrate stolen data and deliver commands to the malware.

The techniques used by ShellClient includes:

T1049 – System Network Connections Discovery

T1566 – Phishing

T1102 – Web Service

T1036 – Masquerading

T1003 – OS Credential Dumping

T1040 – Network Sniffing

T1543 – Create or Modify System Process

T1127 – Trusted Developer Utilities Proxy Execution

T1560 – Archive Collected Data

Actor Details

Indicators of Compromise (IoCs)

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs