Initial access techniques used by Iran-based threat actors
Iranian-linked threat actors consistently utilize a core set of cost-effective initial access techniques, including social engineering, rapid exploitation of known vulnerabilities, and credential abuse. These groups frequently leverage legitimate RMM tools and trusted cloud services to establish persistence and evade detection, highlighting the need for robust identity management, prompt patching, and perimeter security.
Authors: Sophos Counter Threat Unit Research Team
Source:Sophos
Key Takeaways
- Iranian threat actors heavily rely on cost-effective, repeatable initial access techniques like phishing, password spraying, and exploiting public-facing applications.
- Phishing campaigns often involve multistep rapport-building and host payloads on trusted cloud services like OneDrive and Google Drive.
- Threat actors rapidly adopt public exploit code for vulnerabilities in perimeter systems, notably Fortinet, Microsoft Exchange, and VMware.
- Legitimate RMM tools (e.g., ScreenConnect, Atera, PDQ) are frequently abused to gain remote execution capabilities without deploying custom malware.
- Default and weak credentials remain a significant risk, particularly for exposed ICS/OT systems like Unitronics PLCs targeted by groups like Cyber Av3ngers.
Affected Systems
- Fortinet FortiOS
- Microsoft Exchange Server
- VMware Horizon
- Microsoft 365 / Entra ID
- ICS/OT systems (Unitronics PLCs)
Vulnerabilities (CVEs)
- CVE-2018-13379
- CVE-2019-5591
- CVE-2020-12812
- CVE-2021-34473
- CVE-2021-26855
- CVE-2021-26857
- CVE-2021-26858
- CVE-2021-27065
- CVE-2021-44228
Attack Chain
Intrusions typically begin with phishing, password spraying, or the exploitation of unpatched public-facing applications. Once initial access is achieved, threat actors often deploy web shells or install legitimate RMM tools (like ScreenConnect or Atera) to establish persistent remote access. From this foothold, they pivot deeper into the internal network, utilizing compromised credentials to access cloud services, VPNs, or RDP endpoints, effectively blending in with legitimate administrative traffic.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article provides a strategic overview of techniques and behaviors but does not include specific detection rules or queries.
Detection Engineering Assessment
EDR Visibility: Medium — Threat actors heavily rely on legitimate RMM tools and valid accounts, which can blend in with normal administrative activity, reducing EDR efficacy without behavioral tuning. Network Visibility: Medium — Network sensors can detect exploit attempts against perimeter devices, but post-compromise traffic often uses encrypted channels (VPN, RDP, HTTPS for cloud services) with valid credentials. Detection Difficulty: Moderate — The reliance on Living-off-the-Land (LotL) techniques, valid credentials, and legitimate RMM tools makes distinguishing malicious activity from legitimate administrative tasks challenging.
Required Log Sources
- Web Server Logs
- VPN/Firewall Logs
- Authentication Logs (Entra ID/Active Directory)
- Endpoint Process Execution Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for unexpected installations or executions of RMM tools (ScreenConnect, Atera, etc.) originating from non-administrative user contexts or unusual parent processes (e.g., browsers, Office apps). | Endpoint Process Logs | Persistence/C2 | Medium |
| Monitor for high-volume authentication failures followed by a successful login from the same source IP, indicating potential password spraying. | Authentication Logs | Initial Access | Low |
| Identify web server processes (e.g., w3wp.exe, nginx) spawning unexpected child processes like cmd.exe or powershell.exe, suggesting web shell activity. | Endpoint Process Logs | Execution/Persistence | Low |
Control Gaps
- Lack of MFA on external remote services
- Unpatched perimeter devices
- Permissive outbound network filtering allowing unauthorized RMM tools
Key Behavioral Indicators
- Web server process spawning command shells
- Multiple failed logins across different accounts from a single IP
- Execution of RMM binaries from user download directories
False Positive Assessment
- Medium
Recommendations
Immediate Mitigation
- Implement phishing-resistant MFA for all external-facing services and cloud accounts.
- Patch known exploited vulnerabilities in perimeter systems (Fortinet, Exchange, VMware).
- Change default credentials on all internet-exposed devices, especially ICS/OT systems.
Infrastructure Hardening
- Restrict outbound network access to only approved RMM tools and block known malicious or unapproved RMM domains.
- Monitor and restrict access to public-facing applications and management interfaces.
User Protection
- Deploy endpoint protection to monitor for unauthorized RMM installations and web shell deployments.
- Implement email filtering to block malicious attachments and links to credential harvesting sites.
Security Awareness
- Train employees to recognize multistep rapport-building phishing attempts and impersonation tactics.
- Educate users on the risks of downloading software from unverified links in emails.
MITRE ATT&CK Mapping
- T1566.001 - Spearphishing Attachment
- T1566.002 - Spearphishing Link
- T1566.003 - Spearphishing via Service
- T1190 - Exploit Public-Facing Application
- T1110.003 - Password Spraying
- T1078.004 - Valid Accounts: Cloud Accounts
- T1219.002 - Remote Access Tools: Remote Desktop Software
- T1133 - External Remote Services
- T1078.001 - Valid Accounts: Default Accounts
- T1078.003 - Valid Accounts: Local Accounts