Current Cyber Threats

Initial Access Techniques Used by Iran-Based Threat Actors

Summary:
Sophos X-Ops analysis of recent intrusions by Iran-based threat groups (including state-sponsored APTs and state-aligned "hacktivist" personas) reveals a strategic reliance on cost-effective, repeatable, and identity-centric initial access methods. Rather than developing complex zero-day exploits, these actors prioritize the exploitation of human trust, unpatched perimeter vulnerabilities, and weak identity controls.


Key Initial Access Vectors:
  • Phishing & Social Engineering (T1566): * Rapport Building:Extensive use of "multi-step" exchanges via LinkedIn and webmail to establish credibility before delivering a payload.
    • Trusted Hosting: Malicious links and "login traps" are frequently hosted on legitimate cloud services (OneDrive, Google Drive, Mega, Egnyte) to bypass email gateway filters.
  • Vulnerability Exploitation (T1190): * Rapid adoption of public exploit code targeting internet-facing edge devices. Key targets include Fortinet FortiOS (VPN bypass), Microsoft Exchange (ProxyShell), and VMware Horizon (Log4Shell).
  • Identity & Credential Abuse (T1110.003): * High-volume Password Sprayingagainst Microsoft 365 and Entra ID environments.
    • Use of MFA Fatigue (Push Bombing) to overwhelm users into authorizing illegitimate login attempts.
  • Abuse of Legitimate RMM Tools (T1219): * A recurring tactic involves installing authorized Remote Monitoring and Management agents (e.g., AnyDesk, ScreenConnect, Atera, NetSupport) to maintain persistence without triggering malware alerts.
  • OT/ICS Targeting (T1078.001): * Exploitation of default or weak credentials on internet-exposed Industrial Control Systems (e.g., Unitronics PLCs), often for disruptive or "hack-and-leak" purposes.

Security Officer Comments:
The Sophos research reveals a critical nuance: the "decentralization" of Iranian operations. Because traditional command structures within Iran have been disrupted, the CTU assesses that offshore proxy actors and diaspora groups are now driving the majority of the volume. This makes attribution harder and increases the "noise" in our SOCs. Particularly for our members in the Critical Infrastructure and Financial Services sectors, the Sophos alert regarding "MFA Fatigue" is vital. Iranian actors aren't just stealing passwords; they are using automated scripts to "push-bomb" employees' phones until a tired worker clicks "Approve." For the IT-ISAC, this means our training must evolve from "don't click links" to "don't approve unexpected MFA prompts." Additionally, the researchers' discovery of "RedWanted"—a hack-and-leak site used by Handala Hack—indicates that even if an intrusion doesn't result in a wiper attack, the reputational damage from a data leak is a primary objective for these state-aligned personas.


Suggested Corrections:


Identity & Access Management

  • Enforce Phishing-Resistant MFA: Transition all users to FIDO2-based hardware keys or certificate-based authentication to negate password spraying and MFA fatigue.
  • Implement MFA Number Matching: If hardware keys are not feasible, enable "number matching" on push notifications to prevent accidental approvals during push-bombing attacks.
  • Review Privileged Access: Audit service accounts and administrative roles to ensure the principle of least privilege is enforced and default passwords are removed.

Perimeter & Vulnerability Management
  • Prioritize Known Exploited Vulnerabilities: Patch all internet-facing systems against the CISA KEV Catalog, specifically targeting VPN appliances, remote access gateways, and web-facing services.
  • Reduce the Attack Surface: Conduct regular external attack surface reviews and remove or restrict network access to non-critical internet-facing services.
  • Validate VPN Configurations: Ensure VPN and remote access portals are protected by MFA and monitor for anomalous authentication patterns (e.g., "impossible travel").

Detection & Operational Resilience
  • Application Allow-Listing: Restrict the use of RMM tools (Atera, AnyDesk, ScreenConnect, etc.) to a specific, corporate-approved list and block all unauthorized remote access binaries.
  • Monitor for Cloud Data Egress: Increase scrutiny of outbound traffic to cloud-hosted document providers (Mega, Egnyte, Onehub) for signs of credential harvesting or data exfiltration.
  • Validate Backup Integrity: Ensure critical data is stored in offline or immutable copies to mitigate the impact of ransomware or wiper malware.
  • Baseline Traffic: Monitor for elevated reconnaissance, port scanning, and connection probing which often precede DDoS or intrusion attempts.
Link(s):
https://www.sophos.com/en-us/blog/initial-access-techniques-used-by-iran-based-threat-actors