Threat Actor Profile
High APT
Description

OilRig is a suspected Iranian threat group that has targeted Middle Eastern and international victims since at least 2014. The group has targeted a variety of sectors, including financial, government, energy, chemical, and telecommunications. It appears the group carries out supply chain attacks, leveraging the trust relationship between organizations to attack their primary targets. The group works on behalf of the Iranian government based on infrastructure details that contain references to Iran, use of Iranian infrastructure, and targeting that aligns with nation-state interests.(Citation: FireEye APT34 Dec 2017)(Citation: Palo Alto OilRig April 2017)(Citation: ClearSky OilRig Jan 2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo Alto OilRig Oct 2016)(Citation: Unit42 OilRig Playbook 2023)(Citation: Unit 42 QUADAGENT July 2018)

Confidence Score
90%
Known Aliases
OilRig COBALT GYPSY IRN2 APT34 Helix Kitten Evasive Serpens Hazel Sandstorm EUROPIUM ITG13 Earth Simnavaz Crambus TA452
Tags
mitre-attack stix-2.1 intrusion-set
First Seen

Unknown

Last Updated

Unknown

Active Status
Active
Created

April 29, 2026

MITRE ATT&CK Techniques (76)
T1005 - Data from Local System
Collection
T1025 - Data from Removable Media
Collection
T1056.001 - Keylogging
Collection
T1113 - Screen Capture
Collection
T1115 - Clipboard Data
Collection
T1119 - Automated Collection
Collection
T1008 - Fallback Channels
Command and Control
T1071.001 - Web Protocols
Command and Control
T1071.004 - DNS
Command and Control
T1105 - Ingress Tool Transfer
Command and Control
T1219 - Remote Access Tools
Command and Control
T1572 - Protocol Tunneling
Command and Control
T1573.002 - Asymmetric Cryptography
Command and Control
T1003.001 - LSASS Memory
Credential Access
T1003.004 - LSA Secrets
Credential Access
T1003.005 - Cached Domain Credentials
Credential Access
T1110 - Brute Force
Credential Access
T1552.001 - Credentials In Files
Credential Access
T1555 - Credentials from Password Stores
Credential Access
T1555.003 - Credentials from Web Browsers
Credential Access
T1555.004 - Windows Credential Manager
Credential Access
T1556.002 - Password Filter DLL
Credential Access
T1027.005 - Indicator Removal from Tools
Defense Evasion
T1027.013 - Encrypted/Encoded File
Defense Evasion
T1036 - Masquerading
Defense Evasion
T1036.005 - Match Legitimate Resource Name or Locat…
Defense Evasion
T1070.004 - File Deletion
Defense Evasion
T1078 - Valid Accounts
Defense Evasion
T1078.002 - Domain Accounts
Defense Evasion
T1112 - Modify Registry
Defense Evasion
T1140 - Deobfuscate/Decode Files or Information
Defense Evasion
T1218.001 - Compiled HTML File
Defense Evasion
T1497.001 - System Checks
Defense Evasion
T1553.002 - Code Signing
Defense Evasion
T1562.004 - Disable or Modify System Firewall
Defense Evasion
T1007 - System Service Discovery
Discovery
T1012 - Query Registry
Discovery
T1016 - System Network Configuration Discovery
Discovery
T1033 - System Owner/User Discovery
Discovery
T1046 - Network Service Discovery
Discovery
T1049 - System Network Connections Discovery
Discovery
T1057 - Process Discovery
Discovery
T1069.001 - Local Groups
Discovery
T1069.002 - Domain Groups
Discovery
T1082 - System Information Discovery
Discovery
T1087.001 - Local Account
Discovery
T1087.002 - Domain Account
Discovery
T1120 - Peripheral Device Discovery
Discovery
T1201 - Password Policy Discovery
Discovery
T1047 - Windows Management Instrumentation
Execution
T1053.005 - Scheduled Task
Execution
T1059 - Command and Scripting Interpreter
Execution
T1059.001 - PowerShell
Execution
T1059.003 - Windows Command Shell
Execution
T1059.005 - Visual Basic
Execution
T1203 - Exploitation for Client Execution
Execution
T1204.001 - Malicious Link
Execution
T1204.002 - Malicious File
Execution
T1048.003 - Exfiltration Over Unencrypted Non-C2 Pr…
Exfiltration
T1195 - Supply Chain Compromise
Initial Access
T1566.001 - Spearphishing Attachment
Initial Access
T1566.002 - Spearphishing Link
Initial Access
T1566.003 - Spearphishing via Service
Initial Access
T1021.001 - Remote Desktop Protocol
Lateral Movement
T1021.004 - SSH
Lateral Movement
T1133 - External Remote Services
Persistence
T1137.004 - Outlook Home Page
Persistence
T1505.003 - Web Shell
Persistence
T1543.003 - Windows Service
Persistence
T1068 - Exploitation for Privilege Escalation
Privilege Escalation
T1583.001 - Domains
Resource Development
T1586.002 - Email Accounts
Resource Development
T1587.001 - Malware
Resource Development
T1588.002 - Tool
Resource Development
T1588.003 - Code Signing Certificates
Resource Development
T1608.001 - Upload Malware
Resource Development
Indicators of Compromise

Loading IOCs…

IOC KQL for Sentinel
STIX Data
{'aliases': ['OilRig',
             'COBALT GYPSY',
             'IRN2',
             'APT34',
             'Helix Kitten',
             'Evasive Serpens',
             'Hazel Sandstorm',
             'EUROPIUM',
             'ITG13',
             'Earth Simnavaz',
             'Crambus',
             'TA452'],
 'created': '2017-12-14T16:46:06.044Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': '[OilRig](https://attack.mitre.org/groups/G0049) is a '
                'suspected Iranian threat group that has targeted Middle '
                'Eastern and international victims since at least 2014. The '
                'group has targeted a variety of sectors, including financial, '
                'government, energy, chemical, and telecommunications. It '
                'appears the group carries out supply chain attacks, '
                'leveraging the trust relationship between organizations to '
                'attack their primary targets. The group works on behalf of '
                'the Iranian government based on infrastructure details that '
                'contain references to Iran, use of Iranian infrastructure, '
                'and targeting that aligns with nation-state '
                'interests.(Citation: FireEye APT34 Dec 2017)(Citation: Palo '
                'Alto OilRig April 2017)(Citation: ClearSky OilRig Jan '
                '2017)(Citation: Palo Alto OilRig May 2016)(Citation: Palo '
                'Alto OilRig Oct 2016)(Citation: Unit42 OilRig Playbook '
                '2023)(Citation: Unit 42 QUADAGENT July 2018)',
 'external_references': [{'external_id': 'G0049',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/groups/G0049'},
                         {'description': '(Citation: Crowdstrike Helix Kitten '
                                         'Nov 2018)',
                          'source_name': 'IRN2'},
                         {'description': '(Citation: IBM ZeroCleare Wiper '
                                         'December 2019)',
                          'source_name': 'ITG13'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)',
                          'source_name': 'Hazel Sandstorm'},
                         {'description': '(Citation: Microsoft Threat Actor '
                                         'Naming July 2023)',
                          'source_name': 'EUROPIUM'},
                         {'description': '(Citation: Palo Alto OilRig April '
                                         '2017) (Citation: ClearSky OilRig Jan '
                                         '2017) (Citation: Palo Alto OilRig '
                                         'May 2016) (Citation: Palo Alto '
                                         'OilRig Oct 2016) (Citation: Unit 42 '
                                         'Playbook Dec 2017) (Citation: Unit '
                                         '42 QUADAGENT July 2018)',
                          'source_name': 'OilRig'},
                         {'description': '(Citation: Proofpoint Iranian '
                                         'Aligned Attacks JAN 2020)',
                          'source_name': 'TA452'},
                         {'description': '(Citation: Secureworks COBALT GYPSY '
                                         'Threat Profile)',
                          'source_name': 'COBALT GYPSY'},
                         {'description': '(Citation: Symantec Crambus OCT '
                                         '2023)',
                          'source_name': 'Crambus'},
                         {'description': '(Citation: Trend Micro Earth '
                                         'Simnavaz October 2024)',
                          'source_name': 'Earth Simnavaz'},
                         {'description': '(Citation: Unit 42 QUADAGENT July '
                                         '2018)(Citation: Crowdstrike Helix '
                                         'Kitten Nov 2018)',
                          'source_name': 'Helix Kitten'},
                         {'description': '(Citation: Unit42 OilRig Playbook '
                                         '2023)',
                          'source_name': 'Evasive Serpens'},
                         {'description': 'Check Point. (2021, April 8). Iran’s '
                                         'APT34 Returns with an Updated '
                                         'Arsenal. Retrieved May 5, 2021.',
                          'source_name': 'Check Point APT34 April 2021',
                          'url': 'https://research.checkpoint.com/2021/irans-apt34-returns-with-an-updated-arsenal/'},
                         {'description': 'ClearSky Cybersecurity. (2017, '
                                         'January 5). Iranian Threat Agent '
                                         'OilRig Delivers Digitally Signed '
                                         'Malware, Impersonates University of '
                                         'Oxford. Retrieved May 3, 2017.',
                          'source_name': 'ClearSky OilRig Jan 2017',
                          'url': 'http://www.clearskysec.com/oilrig/'},
                         {'description': 'Fahmy, M. et al. (2024, October 11). '
                                         'Earth Simnavaz (aka APT34) Levies '
                                         'Advanced Cyberattacks Against Middle '
                                         'East. Retrieved November 27, 2024.',
                          'source_name': 'Trend Micro Earth Simnavaz October '
                                         '2024',
                          'url': 'https://www.trendmicro.com/en_us/research/24/j/earth-simnavaz-cyberattacks.html'},
                         {'description': 'Falcone, R. and Lee, B.. (2016, May '
                                         '26). The OilRig Campaign: Attacks on '
                                         'Saudi Arabian Organizations Deliver '
                                         'Helminth Backdoor. Retrieved May 3, '
                                         '2017.',
                          'source_name': 'Palo Alto OilRig May 2016',
                          'url': 'http://researchcenter.paloaltonetworks.com/2016/05/the-oilrig-campaign-attacks-on-saudi-arabian-organizations-deliver-helminth-backdoor/'},
                         {'description': 'Falcone, R.. (2017, April 27). '
                                         'OilRig Actors Provide a Glimpse into '
                                         'Development and Testing Efforts. '
                                         'Retrieved May 3, 2017.',
                          'source_name': 'Palo Alto OilRig April 2017',
                          'url': 'http://researchcenter.paloaltonetworks.com/2017/04/unit42-oilrig-actors-provide-glimpse-development-testing-efforts/'},
                         {'description': 'Grunzweig, J. and Falcone, R.. '
                                         '(2016, October 4). OilRig Malware '
                                         'Campaign Updates Toolset and Expands '
                                         'Targets. Retrieved May 3, 2017.',
                          'source_name': 'Palo Alto OilRig Oct 2016',
                          'url': 'http://researchcenter.paloaltonetworks.com/2016/10/unit42-oilrig-malware-campaign-updates-toolset-and-expands-targets/'},
                         {'description': 'Kessem, L. (2019, December 4). New '
                                         'Destructive Wiper ZeroCleare Targets '
                                         'Energy Sector in the Middle East. '
                                         'Retrieved September 4, 2024.',
                          'source_name': 'IBM ZeroCleare Wiper December 2019',
                          'url': 'https://securityintelligence.com/posts/new-destructive-wiper-zerocleare-targets-energy-sector-in-the-middle-east/'},
                         {'description': 'Lee, B., Falcone, R. (2018, July '
                                         '25). OilRig Targets Technology '
                                         'Service Provider and Government '
                                         'Agency with QUADAGENT. Retrieved '
                                         'August 9, 2018.',
                          'source_name': 'Unit 42 QUADAGENT July 2018',
                          'url': 'https://researchcenter.paloaltonetworks.com/2018/07/unit42-oilrig-targets-technology-service-provider-government-agency-quadagent/'},
                         {'description': 'Meyers, A. (2018, November 27). Meet '
                                         'CrowdStrike’s Adversary of the Month '
                                         'for November: HELIX KITTEN. '
                                         'Retrieved December 18, 2018.',
                          'source_name': 'Crowdstrike Helix Kitten Nov 2018',
                          'url': 'https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-november-helix-kitten/'},
                         {'description': 'Microsoft . (2023, July 12). How '
                                         'Microsoft names threat actors. '
                                         'Retrieved November 17, 2023.',
                          'source_name': 'Microsoft Threat Actor Naming July '
                                         '2023',
                          'url': 'https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide'},
                         {'description': 'Proofpoint. (2020, January 10). '
                                         'Iranian State-Sponsored and Aligned '
                                         'Attacks: What You Need to Know and '
                                         'Steps to Protect Yourself. Retrieved '
                                         'January 16, 2025.',
                          'source_name': 'Proofpoint Iranian Aligned Attacks '
                                         'JAN 2020',
                          'url': 'https://www.proofpoint.com/us/corporate-blog/post/iranian-state-sponsored-and-aligned-attacks-what-you-need-know-and-steps-protect'},
                         {'description': 'Sardiwal, M, et al. (2017, December '
                                         '7). New Targeted Attack in the '
                                         'Middle East by APT34, a Suspected '
                                         'Iranian Threat Group, Using '
                                         'CVE-2017-11882 Exploit. Retrieved '
                                         'December 20, 2017.',
                          'source_name': 'FireEye APT34 Dec 2017',
                          'url': 'https://www.fireeye.com/blog/threat-research/2017/12/targeted-attack-in-middle-east-by-apt34.html'},
                         {'description': 'Secureworks. (n.d.). COBALT GYPSY '
                                         'Threat Profile. Retrieved April 14, '
                                         '2021.',
                          'source_name': 'Secureworks COBALT GYPSY Threat '
                                         'Profile',
                          'url': 'https://www.secureworks.com/research/threat-profiles/cobalt-gypsy'},
                         {'description': 'Symantec Threat Hunter Team. (2023, '
                                         'October 19). Crambus: New Campaign '
                                         'Targets Middle Eastern Government. '
                                         'Retrieved November 27, 2024.',
                          'source_name': 'Symantec Crambus OCT 2023',
                          'url': 'https://www.security.com/threat-intelligence/crambus-middle-east-government'},
                         {'description': 'This group was previously tracked '
                                         'under two distinct groups, APT34 and '
                                         'OilRig, but was combined due to '
                                         'additional reporting giving higher '
                                         'confidence about the overlap of the '
                                         'activity.(Citation: Unit 42 '
                                         'QUADAGENT July 2018)(Citation: '
                                         'FireEye APT34 Dec 2017)(Citation: '
                                         'Check Point APT34 April 2021)',
                          'source_name': 'APT34'},
                         {'description': 'Unit 42. (2017, December 15). Unit '
                                         '42 Playbook Viewer. Retrieved '
                                         'December 20, 2017.',
                          'source_name': 'Unit 42 Playbook Dec 2017',
                          'url': 'https://pan-unit42.github.io/playbook_viewer/'},
                         {'description': 'Unit42. (2016, May 1). Evasive '
                                         'Serpens Unit 42 Playbook Viewer. '
                                         'Retrieved February 6, 2023.',
                          'source_name': 'Unit42 OilRig Playbook 2023',
                          'url': 'https://pan-unit42.github.io/playbook_viewer/?pb=evasive-serpens'}],
 'id': 'intrusion-set--4ca1929c-7d64-4aab-b849-badbfc0c760d',
 'modified': '2025-01-16T18:55:49.463Z',
 'name': 'OilRig',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'intrusion-set',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Robert Falcone',
                          'Bryan Lee',
                          'Dragos Threat Intelligence',
                          'Jaesang Oh, KC7 Foundation'],
 'x_mitre_deprecated': False,
 'x_mitre_domains': ['enterprise-attack', 'ics-attack'],
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_version': '5.0'}
Quick Actions
Related TTPs (76)
Data from Local System
Collection

Data from Removable Media
Collection

Keylogging
Collection

Screen Capture
Collection

Clipboard Data
Collection