Iranian hackers now exploit Windows flaw to elevate privileges

Share:

The Iranian state-sponsored hacking group APT34, aka OilRig, has recently escalated its activities with new campaigns targeting government and critical infrastructure entities in the United Arab Emirates and the Gulf region.

In these attacks, spotted by Trend Micro researchers, OilRig deployed a novel backdoor, targeting Microsoft Exchange servers to steal credentials, and also exploited the Windows CVE-2024-30088 flaw to elevate their privileges on compromised devices.

Apart from the activity, Trend Micro has also made a connection between OilRig and FOX Kitten, another Iran-based APT group involved in ransomware attacks.

Latest OilRig attack chain

The attacks seen by Trend Micro begin with the exploitation of a vulnerable web server to upload a web shell, giving the attackers the ability to execute remote code and PowerShell commands.

Once the web shell is active, OilRig leverages it to deploy additional tools, including a component designed to exploit the Windows CVE-2024-30088 flaw.

CVE-2024-30088 is a high-severity privilege escalation vulnerability Microsoft fixed in June 2024, enabling attackers to escalate their privileges to the SYSTEM level, giving them significant control over the compromised devices.

Microsoft has acknowledged a proof-of-concept exploit for CVE-2024-30088 but has not yet marked the flaw as actively exploited on its security portal. CISA has also not reported it as previously exploited in ts Known Exploited Vulnerability catalog.

Next, OilRig registers a password filter DLL to intercept plaintext credentials during password change events and then downloads and installs the remote monitoring and management tool ‘ngrok,’ used for stealthy communications through secure tunnels.

Another new tactic by the threat actors is the exploitation of on-premise Microsoft Exchange servers to steal credentials and exfiltrate sensitive data via legitimate email traffic that is hard to detect.

Backdoor stealing passwords from Exchange
Backdoor stealing passwords from Exchange
Source: Trend Micro

The exfiltration is facilitated by a new backdoor named ‘StealHook,’ while Trend Micro says government infrastructure is often used as a pivot point to make the process appear legitimate.

“The key objective of this stage is to capture the stolen passwords and transmit them to the attackers as email attachments,” explains Trend Micro in the report.

“Additionally, we observed that the threat actors leverage legitimate accounts with stolen passwords to route these emails through government Exchange Servers.”

OilRig's latest attack chain
OilRig’s latest attack chain
Source: Trend Micro

TrendMicro says there are code similarities between StealHook and backdoors OilRig used in past campaigns, like Karkoff, so the latest malware appears to be an evolutionary step rather than a novel creation from scratch.

Also, this is not the first time OilRig has used Microsoft Exchange servers as an active component of their attacks. Almost a year ago, Symantec reported that APT34 installed a PowerShell backdoor dubbed ‘PowerExchange’ on on-premise Exchange servers capable of receiving and executing commands via email.

The threat actor remains highly active in the Middle East region, and its affiliation with FOX Kitten, while unclear at this time, is worrying for the potential of adding ransomware to its attack arsenal.

Since most of the targeted entities are in the energy sector, according to Trend Micro, operational disruptions in these organizations could severely impact many people.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:06 pm, Jun 26, 2025
weather icon 22°C
L: 21° | H: 23°
overcast clouds
Humidity: 71 %
Pressure: 1011 mb
Wind: 15 mph SW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:44 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
21° | 23°°C 0.24 mm 24% 17 mph 72 % 1018 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
16° | 28°°C 0 mm 0% 13 mph 61 % 1021 mb 0 mm/h
Sat Jun 28 10:00 pm
weather icon
17° | 28°°C 0.2 mm 20% 10 mph 88 % 1025 mb 0 mm/h
Sun Jun 29 10:00 pm
weather icon
19° | 32°°C 0 mm 0% 6 mph 82 % 1025 mb 0 mm/h
Mon Jun 30 10:00 pm
weather icon
21° | 34°°C 0.2 mm 20% 12 mph 59 % 1019 mb 0 mm/h
Today 1:00 pm
weather icon
21° | 22°°C 0.2 mm 20% 12 mph 72 % 1011 mb 0 mm/h
Today 4:00 pm
weather icon
22° | 23°°C 0.24 mm 24% 17 mph 61 % 1011 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 21°°C 0 mm 0% 13 mph 47 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 10 mph 47 % 1018 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 57 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
16° | 16°°C 0 mm 0% 6 mph 61 % 1020 mb 0 mm/h
Tomorrow 7:00 am
weather icon
17° | 17°°C 0 mm 0% 8 mph 59 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 11 mph 52 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€91,944.30
0.32%
Ethereum(ETH)
€2,100.59
1.15%
Tether(USDT)
€0.86
-0.01%
XRP(XRP)
€1.87
-0.65%
Solana(SOL)
€122.91
-1.50%
USDC(USDC)
€0.86
-0.01%
Dogecoin(DOGE)
€0.138833
-1.88%
Shiba Inu(SHIB)
€0.000010
-0.90%
Pepe(PEPE)
€0.000008
-5.96%
Scroll to Top