Security

Cyber-crime

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle


Iranian government-backed cybercriminals have been hacking into US and foreign networks as recently as this month to steal sensitive data and deploy ransomware, and they're breaking in via vulnerable VPN and firewall devices from Check Point, Citrix, Palo Alto Networks and other manufacturers, according to Uncle Sam.

In a joint security advisory issued today, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) warned network defenders that Pioneer Kitten continues to exploit American schools, banks, hospitals, defense-sector orgs, and government agencies, along with targets in Israel, Azerbaijan, and the United Arab Emirates.

These attacks include network intrusions to steal sensitive technical data from US defense contractors, along with Israel- and Azerbaijan-based organizations, in support of the Iranian government, we're told.

Most of the attacks against American targets, however, are financially motivated and not state-sanctioned, according to the FBI and friends.

"The FBI assesses a significant percentage of these threat actors' operations against US organizations are intended to obtain and develop network access to then collaborate with ransomware affiliate actors to deploy ransomware," the joint alert says. 

Recently, federal law enforcement agencies have spotted Pioneer Kitten (aka Fox Kitten, UNC757, Parisite, RUBIDIUM and Lemon Sandstorm) working with ransomware-as-a-service gangs NoEscape, Ransomhouse and ALPHV/BlackCat.

"The Iranian cyber actors' involvement in these ransomware attacks goes beyond providing access; they work closely with ransomware affiliates to lock victim networks and strategize on approaches to extort victims," according to the US agencies. "The FBI assesses these actors do not disclose their Iran-based location to their ransomware affiliate contacts and are intentionally vague as to their nationality and origin."

This new warning follows multiple instances of finger pointing against Iran for its malicious cyber activities. Last week, US authorities named Iran as the likely source of a recent hack-and-leak attack against former US president and current candidate Donald Trump amid multiple reports of Iranian crews intensifying their election meddling efforts

Earlier this month, OpenAI banned ChatGPT accounts linked to an Iranian crew suspected of spreading fake news on social media sites about the US presidential campaigns, and both Google and Microsoft have warned of ongoing attacks targeting both political parties' candidates.

Today's warning, however, focuses on a different government-backed gang, which CISA and the FBI say has been active since 2017. 

Pioneer Kitten

In 2020, CISA and the FBI published a similar warning about Pioneer Kitten breaking into a similarly wide range of US industry sectors to steal credentials and other sensitive information.

The group refers to itself as "Br0k3r" and "xplfinder" on their Tor and social media sites, and also uses an Iranian IT company, Danesh Novin Sahand, likely as a cover for its malicious cyber activities.

While Pioneer Kitten has historically abused years-old bugs in Citrix Netscaler (CVE-2019-19781 and CVE-2023-3519) and BIG-IP F5 (CVE-2022-1388) devices to gain initial access to victim organizations. As of July, they have been scanning the Shodan search engine for IP addresses hosting Check Point Security Gateways devices that are vulnerable to CVE-2024-24919, which the software vendor in June warned was under active exploitation.

A few months earlier, in April, the feds caught the Iranians scanning for vulnerable Palo Alto Networks PAN-OS and GlobalProtect VPNs. The crew was likely conducting reconnaissance and probing for unpatched devices vulnerable to CVE-2024-3400, a critical command-injection flaw that received a 10 out of 10 CVSS severity rating.

Side note: multiple proof-of-concept exploits exist for CVE-2024-3400, so if you haven't updated your Palo Alto Networks firewall/VPN yet, if Iran's not sitting on your device right now, someone else likely is.

After successfully exploiting a vulnerable device, Pioneer Kitten performs the usual criminal activities. They use webshells to steal login info and maintain network access. With the stolen admin-level credentials, the crooks disable antivirus and other security software. 

They also create new accounts — observed names include "sqladmin$," "adfsservice," "IIS_Admin," "iis-admin," and "John McCain" — and request exemptions from the zero-trust application and security policies for various tools they intend to deploy. And then, they install backdoors to load malware and exfiltrate data.

In the feds' joint alert, they include a list of IP addresses and domains that Pioneer Kitten has been using this year, so it's a good idea to check out the list and then block — or at least investigate — any of these addresses.

However, the Iranian hackers have also been known to break into companies' cloud environments and use this infrastructure for cyber espionage operations targeting other organizations. 

"The FBI observed use of this tradecraft against U.S. academic and defense sectors, but it could theoretically be used against any organization," the alert notes. "The FBI and CISA warn that if these actors compromised your organization, they may be leveraging your cloud services accounts to conduct malicious cyber activity and target other victims." ®

Send us news
5 Comments

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud

Seattle airport 'possible cyberattack' snarls travel yet again

No word yet on if ransomware is to blame

AMD internal data reportedly offered for sale

Second sensitive info theft claimed by the same crims since June