A recent joint advisory from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Defense Cyber Crime Center (DC3) warns of increased collaboration between Pioneer Kitten, an Iranian state-backed threat actor, and various ransomware groups.
Collaboration Between Iranian Threat Actors and Ransomware Groups
According to the advisory, Iranian threat actors are now working closely with affiliates of NoEscape, Ransomhouse, and the defunct ALPHV/BlackCat groups. These threat actors gain and develop network access in support of the Government of Iran, then partner with ransomware groups to deploy ransomware in exchange for a share of the proceeds from these attacks.
The advisory highlights how these actors exploit vulnerabilities in widely used software to infiltrate networks, exfiltrate data, and deploy ransomware. Common entry points include unpatched VPNs, firewalls, and internet-facing assets. Some of the software products recently targeted by these groups include Citrix Netscaler, Ivanti VPNs, Palo Alto Networks firewalls, and cloud computing resources.
Key Recommendations and Indicators for Organizations
CISA’s advisory emphasizes the growing sophistication of cyber threats and recommends that organizations take proactive measures, including:
- Patching all known vulnerabilities
- Monitoring and logging suspicious activities regularly
The advisory also includes specific information to help organizations identify potential threats, including:
- A list of IP addresses and domain identifiers recently used by the attackers
- Tactics, techniques, and procedures (TTPs) employed by the actors in compromised networks
- Known CVE vulnerabilities exploited by the hackers
- A list of bitcoin address values linked to the threat actors
As ransomware threats continue to evolve, organizations must stay vigilant by patching vulnerabilities and monitoring their network for suspicious activities. The collaboration between Iran-backed threat actors and ransomware groups presents a growing challenge that demands a robust and proactive cybersecurity strategy.