Current Cyber Threats

Frontline Intelligence: Analysis of UNC1549 TTPs, Custom Tools, and Malware Targeting the Aerospace

Summary:
Researchers at Mandiant have published the advanced tactics, techniques, and procedures and custom tooling employed by UNC1549, an Iran-nexus threat group, observed in targeted espionage campaigns against the aerospace, aviation, and defense sectors from late 2023 through 2025. The group's operations are characterized by a high degree of operational security, customization of malware, and a strategic focus on long-term persistence. UNC1549 employs a sophisticated dual-pronged initial access strategy. First, they deploy highly targeted spear-phishing campaigns, using lures such as fake job opportunities or, more strategically, compromised victim source code and lookalike domains to target IT staff and administrators for high-privilege credentials. Second, they exploit trusted third-party relationships, a common weakness for highly secure targets. By compromising less-secure partners, UNC1549 obtains legitimate credentials, which they then use to pivot into the primary target’s network, to perform VDI session breakouts for deeper network access.


Once inside, they establish persistence using custom backdoors like TWOSTROKE (Windows) and DEEPROOT (Linux), notably generating a unique hash for every post-exploitation payload to evade detection. They frequently use DLL Search Order Hijacking against legitimate executables to execute their tooling, including the DCSync attack variant DCSYNCER.SLICK. For privilege escalation and credential theft, UNC1549 performs DCSync attacks by unconventionally resetting domain controller computer account passwords. The actors also use custom tools like CRASHPAD, SIGHTGRAB , and TRUSTTRAP. Lateral movement is conducted using RDP and commercial utilities like Atelier Web Remote Commander (AWRC) and SCCMVNC, the latter of which bypasses user consent for remote control.

Security Officer Comments:
Their operational security is high, relying heavily on SSH reverse tunnels for Command and Control to limit host-based forensic artifacts. They further evade detection by using legitimate code-signing certificates on their binaries, routinely deleting utilities and RDP history after execution, and planting backdoors that reactivate silently after remediation attempts to ensure long-term persistence. The ultimate objective is extensive data collection, including intellectual property and leveraging compromised organizations as pivot points for further supply chain intrusions.


Suggested Corrections:


Organizations can make APT groups’ lives more difficult. Here’s how:
  • Defense-in-depth strategy: A comprehensive defense-in-depth strategy is crucial to combat APTs. This includes implementing multiple layers of security controls, such as strong perimeter defenses, network segmentation, endpoint protection, intrusion detection systems, data encryption, access controls, and continuous monitoring for anomalies.
  • Threat intelligence and sharing: Ideally, organizations should actively participate in threat intelligence sharing communities and collaborate with industry peers, government agencies, and security vendors. Sharing information about APTs and their techniques can help detect and mitigate attacks more effectively.
  • Employee education and awareness: Regular security awareness programs, phishing simulations, and training sessions can educate employees about the latest threats, social engineering techniques, and safe computing practices.
  • Incident response and recovery: Regardless of preventive measures, organizations should have a well-defined incident response plan. This includes incident detection, containment, eradication, and recovery procedures to minimize the impact of APT attacks and restore normal operations.
Link(s):
https://cloud.google.com/blog/topic...s-of-unc1549-ttps-targeting-aerospace-defense