SlideShare a Scribd company logo
1 of 14
Download to read offline
OILRIG
ANALYSIS OF THREAT
ACTOR
COURSERA
Cybersecurity for everyone
Course Final Project
01
Skills, Resources and
Capabilities
Lockheed Martin Kill
Chain
Strategic impact
02
03 04
05
Motivations
End-effects
Skills, Resources and
Capabilities
OilRig is a state-sponsored hacking
group associated with the Iranian
government. It is also known by other
names, such as APT34 and Helix
Kitten. OilRig is believed to be based
in Iran and primarily targets
organizations in the Middle East,
although they have also targeted
organizations in Europe and the
United States.
They have been associated with several
advanced persistent threats (APTs) and have
proven that they are capable of carrying out
complex attacks that involve multiple stages and
techniques.
They are also known to use social engineering
tactics to trick their targets into revealing
confidential information or downloading malware.
OilRig has been active since at least 2014 and has been involved in several
high-profile attacks. OilRig is considered to be a sophisticated hacking
group with significant resources in terms of capabilities and resources.
Since OilRigis works with/for (the
Islamic Republic of) Iran, it certainly
has sufficient resources to carry out
any operation that might benefit
Iran. As in the case of the Mabna
Institute, where an Iranian
organization (MabnaInstitute) was
tasked by the Islamic Revolutionary
Guard Corps to conduct a massive
spear phishing campaign that stole
intellectual property worth a total of
$3.4 billion and 31.5 terabytes of
academic data.
MOTIVATIONS
OilRigis is believed to be a
state-sponsored group working
on behalf of the Iranian
government. The motivations for
their activities can be seen in the
geopolitical context in which they
operate.
It operates with the support of
Iranian intelligence and the
Islamic Revolutionary Guard
Corps
OilRig targets private and government entities and
defines espionage as the practice of spying or using
spies to obtain information about the plans and
activities of, in particular, a foreign government or
competing entity, especially secret political,
military, business, financial, aviation, infrastructure,
governmental, and educational or industrial
information.
In a geopolitical context, Iran has
always been at enmity with its
neighbors in the region and Western
countries for many reasons, and
according to the Middle East
Institute (MEI), "many countries have
ceased doing business with Iran
because of the 1979 Iranian
Revolution, so the theft of academic
and business information from
around the world allows Iran to
renew its infrastructure and develop
technologies it simply cannot buy
abroad, from weapons to aircraft
parts."
LOCKHEED MARTIN KILL
CHAIN
Reconnaissance: The attacker gathers information about the target
organization. Harvesting email addresses, conference information, etc.
Weaponization: Coupling exploit with backdoor into deliverable
payload, customized RDAT, DNS-over-HTTPs and phishing websites
Delivery: OilRig uses a variety of delivery methods, such as
weaponized bundle to the victim via email, web, USB, etc.
Exploitation: Exploiting a vulnerability to execute code on victim’s
system. Probably via unpatched software, using stolen credentials, and
conducting brute-force attacks.
Installation: Installing malware on the asset using remote access tools and exploiting vulnerabilities in
the system.
Command & Control: command channel for remote manipulation of victim. They could use a variety
of C2 channels, including IRC, HTTPS, and DNS.
Actions on Objectives: With ‘Hands on Keyboard’ access, intruders accomplish their original goals
END-EFFECTS / CASE STUDY
OilRig was linked to the Shamoon 2 attack, which
targeted Saudi Arabian government agencies and
organizations.
The primary effect was the destruction of data on
thousands of computers, causing significant
disruption and damage to the targeted organizations.
Shamoon 2 (2016):
The secondary effect was the loss of trust in the affected organizations, as they
were unable to protect their data from a major cyberattack.
The second-order effect was the impact on the wider economy, as
businesses and industries in the region were disrupted due to the attack.
STRATEGIC IMPACT
OilRig is a state-sponsored hacking group that
poses a significant threat to businesses,
governments, and other organizations in the
Middle East and beyond. The group is known
for attacking government agencies, financial
institutions, and critical infrastructure, among
other things. Because OilRig is
state-sponsored, the group's activities are of
public interest to policymakers because they
pose a potential threat to national security and
the stability of the global economy.
These types of groups are of public
interest to policymakers because of
their state-sponsored activities and
their potential impact on national
security and global stability. A
comprehensive approach to
cybersecurity, including enhanced
defenses, international cooperation,
and diplomatic and economic
measures, can help mitigate the threat
THANK YOU

More Related Content

Similar to Cybersecurity for everyone - Course Final Project.pdf

wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
Numaan Huq
 

Similar to Cybersecurity for everyone - Course Final Project.pdf (20)

Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Final Project for the Cybersecurity for Everyone Course- Oilrig.pptx
Final Project for the Cybersecurity for Everyone Course- Oilrig.pptxFinal Project for the Cybersecurity for Everyone Course- Oilrig.pptx
Final Project for the Cybersecurity for Everyone Course- Oilrig.pptx
 
Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial Gain
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Rage Of The Kittens
Rage Of The KittensRage Of The Kittens
Rage Of The Kittens
 
Cyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project PresentationCyber Security for Everyone Course - Final Project Presentation
Cyber Security for Everyone Course - Final Project Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Threat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptxThreat Actors - Vietnam (OceansLotus).pptx
Threat Actors - Vietnam (OceansLotus).pptx
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar Threat Actors and Innovators - Webinar
Threat Actors and Innovators - Webinar
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
TMT industry Threat Landscape
TMT industry Threat LandscapeTMT industry Threat Landscape
TMT industry Threat Landscape
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Hunter Resume (OSINT)
Hunter Resume (OSINT)Hunter Resume (OSINT)
Hunter Resume (OSINT)
 
File000095
File000095File000095
File000095
 

Recently uploaded

Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
uodye
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Priya Reddy
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
ahmedjiabur940
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
wpkuukw
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
wpkuukw
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
ehyxf
 
Abortion pills in Dammam +966572737505 Buy Cytotec
Abortion pills in Dammam +966572737505 Buy CytotecAbortion pills in Dammam +966572737505 Buy Cytotec
Abortion pills in Dammam +966572737505 Buy Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
ougvy
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
ayoqf
 

Recently uploaded (20)

Abortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get CytotecAbortion pills in Jeddah |+966572737505 | Get Cytotec
Abortion pills in Jeddah |+966572737505 | Get Cytotec
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
🌹Patia⬅️ Vip Call Girls Bhubaneswar 📱9777949614 Book Well Trand Call Girls In...
 
Abortion pills in Dammam +966572737505 Buy Cytotec
Abortion pills in Dammam +966572737505 Buy CytotecAbortion pills in Dammam +966572737505 Buy Cytotec
Abortion pills in Dammam +966572737505 Buy Cytotec
 
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
 

Cybersecurity for everyone - Course Final Project.pdf

  • 1. OILRIG ANALYSIS OF THREAT ACTOR COURSERA Cybersecurity for everyone Course Final Project
  • 2. 01 Skills, Resources and Capabilities Lockheed Martin Kill Chain Strategic impact 02 03 04 05 Motivations End-effects
  • 3. Skills, Resources and Capabilities OilRig is a state-sponsored hacking group associated with the Iranian government. It is also known by other names, such as APT34 and Helix Kitten. OilRig is believed to be based in Iran and primarily targets organizations in the Middle East, although they have also targeted organizations in Europe and the United States.
  • 4. They have been associated with several advanced persistent threats (APTs) and have proven that they are capable of carrying out complex attacks that involve multiple stages and techniques. They are also known to use social engineering tactics to trick their targets into revealing confidential information or downloading malware. OilRig has been active since at least 2014 and has been involved in several high-profile attacks. OilRig is considered to be a sophisticated hacking group with significant resources in terms of capabilities and resources.
  • 5. Since OilRigis works with/for (the Islamic Republic of) Iran, it certainly has sufficient resources to carry out any operation that might benefit Iran. As in the case of the Mabna Institute, where an Iranian organization (MabnaInstitute) was tasked by the Islamic Revolutionary Guard Corps to conduct a massive spear phishing campaign that stole intellectual property worth a total of $3.4 billion and 31.5 terabytes of academic data.
  • 6. MOTIVATIONS OilRigis is believed to be a state-sponsored group working on behalf of the Iranian government. The motivations for their activities can be seen in the geopolitical context in which they operate. It operates with the support of Iranian intelligence and the Islamic Revolutionary Guard Corps
  • 7. OilRig targets private and government entities and defines espionage as the practice of spying or using spies to obtain information about the plans and activities of, in particular, a foreign government or competing entity, especially secret political, military, business, financial, aviation, infrastructure, governmental, and educational or industrial information.
  • 8. In a geopolitical context, Iran has always been at enmity with its neighbors in the region and Western countries for many reasons, and according to the Middle East Institute (MEI), "many countries have ceased doing business with Iran because of the 1979 Iranian Revolution, so the theft of academic and business information from around the world allows Iran to renew its infrastructure and develop technologies it simply cannot buy abroad, from weapons to aircraft parts."
  • 10. Reconnaissance: The attacker gathers information about the target organization. Harvesting email addresses, conference information, etc. Weaponization: Coupling exploit with backdoor into deliverable payload, customized RDAT, DNS-over-HTTPs and phishing websites Delivery: OilRig uses a variety of delivery methods, such as weaponized bundle to the victim via email, web, USB, etc. Exploitation: Exploiting a vulnerability to execute code on victim’s system. Probably via unpatched software, using stolen credentials, and conducting brute-force attacks. Installation: Installing malware on the asset using remote access tools and exploiting vulnerabilities in the system. Command & Control: command channel for remote manipulation of victim. They could use a variety of C2 channels, including IRC, HTTPS, and DNS. Actions on Objectives: With ‘Hands on Keyboard’ access, intruders accomplish their original goals
  • 11. END-EFFECTS / CASE STUDY OilRig was linked to the Shamoon 2 attack, which targeted Saudi Arabian government agencies and organizations. The primary effect was the destruction of data on thousands of computers, causing significant disruption and damage to the targeted organizations. Shamoon 2 (2016): The secondary effect was the loss of trust in the affected organizations, as they were unable to protect their data from a major cyberattack. The second-order effect was the impact on the wider economy, as businesses and industries in the region were disrupted due to the attack.
  • 12. STRATEGIC IMPACT OilRig is a state-sponsored hacking group that poses a significant threat to businesses, governments, and other organizations in the Middle East and beyond. The group is known for attacking government agencies, financial institutions, and critical infrastructure, among other things. Because OilRig is state-sponsored, the group's activities are of public interest to policymakers because they pose a potential threat to national security and the stability of the global economy.
  • 13. These types of groups are of public interest to policymakers because of their state-sponsored activities and their potential impact on national security and global stability. A comprehensive approach to cybersecurity, including enhanced defenses, international cooperation, and diplomatic and economic measures, can help mitigate the threat