|
What is the Attack? |
A suspected Iran-linked espionage group tracked as UNC1549 is actively targeting aerospace, defense, and telecommunications organizations across Europe and other regions. The threat actor employs a combination of highly tailored spear-phishing, credential theft from third-party services, and abuse of virtual desktop infrastructure such as Citrix, VMware, and Azure VDI to gain initial access and move laterally within target networks. These activities align with state-sponsored intelligence objectives, including the theft of sensitive technical data, monitoring of communications, and long-term strategic positioning within high-value targets. UNC1549 employs a range of custom malware families and stealth techniques to maintain persistent and covert access. MINIBIKE is a modular backdoor used to steal credentials, log keystrokes, capture screenshots, and deploy additional payloads. TWOSTROKE enables remote access, system control, and persistence, while DEEPROOT extends similar functionality to Linux environments. For stealthy command-and-control, the group leverages LIGHTRAIL and GHOSTLINE, tunneling tools that disguise malicious communications within legitimate cloud traffic to facilitate covert data exfiltration and resilient connectivity. |
|
What is the recommended Mitigation? |
|
|
What FortiGuard Coverage is available? |
|