
TLP:CLEAR | CTI Analysts | Updated: March 2026
1. IDENTIFICATION & ATTRIBUTION
Naming (known aliases by vendor)
The group is tracked under the following names across vendors: APT33 (Mandiant/FireEye, reference designation), Elfin / Elfin Team (Broadcom/Symantec), Refined Kitten (CrowdStrike), Peach Sandstorm (Microsoft, formerly HOLMIUM), MAGNALLIUM (Dragos), COBALT TRINITY (SecureWorks), ATK35, TA451, G0064 (MITRE ATT&CK) (1)(2)(3)(4).
Origin
Iran.
Presumed sponsor
The group is assessed to operate on behalf of the Iranian government, with a probable affiliation to the Islamic Revolutionary Guard Corps (IRGC) (1)(2). Attribution rests on multiple converging lines of evidence: Farsi language artifacts in custom malware (DropShot, ShapeShift), operational activity patterns aligned with Iran Standard Time (IRST), and documented inactivity during the Iranian weekend (Thursday afternoon and Friday) (8)(12). The handle xman_1365_x, identified in PDB paths of the TurnedUp backdoor, has been linked to the Iranian Nasr Institute, itself associated with the Iranian Cyber Army (8).
Sophistication level
High and continuously improving. The group evolved from campaigns relying on basic spearphishing and commodity malware toward cloud-native operations combining large-scale password spraying, fraudulent Azure C2 infrastructure, and custom backdoors (Tickler, FalseFont). This evolution has been described as materially more sophisticated compared to earlier capabilities (5)(12).
Motivation
Strategic espionage — collection of technical intelligence and intellectual property in the aerospace, defense, and energy sectors. Documented latent destructive capability via links to the ShapeShift wiper and Shamoon attacks (1)(4).
Targeted sectors
Aerospace, defense, Defense Industrial Base (DIB), satellite/space, energy (oil, gas, petrochemicals), government, education (leveraged as access infrastructure), pharmaceutical (2)(3)(5).
Geographic scope
United States (primary target), Saudi Arabia, South Korea, United Arab Emirates, United Kingdom, Belgium, Australia (2)(3)(5).
2. INFRASTRUCTURE & TTPs
C2 infrastructure
Between April and July 2024, the group leveraged Microsoft Azure infrastructure hosted in fraudulent, attacker-controlled Azure subscriptions for command-and-control (5). Subscriptions were created using Outlook accounts and compromised education sector accounts with Azure for Students entitlements (5)(10). This approach conceals malicious traffic within legitimate corporate cloud activity, making attribution and detection difficult (4). Historically, the group has also used Iranian hosting providers and commodity RATs for lower-priority operations (1)(2).
MITRE ATT&CK TTP Table
| Phase | Technique | ATT&CK ID |
|---|---|---|
| Initial Access | Spearphishing Attachment (HTA, archives) | T1566.001 |
| Initial Access | Spearphishing Link | T1566.002 |
| Initial Access | Password Spraying (user-agent: go-http-client) | T1110.003 |
| Initial Access | Social Engineering via LinkedIn (fake profiles) | T1566.003 |
| Execution | User Execution — malicious HTA / archive | T1204.002 |
| Execution | Exploitation CVE-2017-11774 (Outlook Home Page) | T1203 |
| Execution | Exploitation CVE-2018-20250 (WinRAR) | T1203 |
| Persistence | Registry Run Keys (SharePoint.exe / Tickler) | T1547.001 |
| Persistence | Scheduled Tasks | T1053.005 |
| Defense Evasion | DLL Sideloading (legitimate signed binaries) | T1574.001 |
| Defense Evasion | PEB Traversal (API hook bypass) | T1027 |
| Defense Evasion | Masquerading (.pdf.exe, ZIP lure archives) | T1036 |
| Credential Access | Password Spraying (massive scale) | T1110.003 |
| Credential Access | Credential Dumping (LSASS, Mimikatz, procdump) | T1003.001 |
| Credential Access | Golden SAML (AD FS private key theft) | T1606.002 |
| Discovery | AD Explorer (Active Directory snapshots) | T1087.002 |
| Discovery | AzureHound / Roadtools (Entra ID cloud enumeration) | T1538 |
| Lateral Movement | SMB (Server Message Block) | T1021.002 |
| Collection | Data from Cloud Storage | T1530 |
| Command & Control | Fraudulent Azure infrastructure | T1583.006 |
| Command & Control | Legitimate RMM tools (AnyDesk) | T1219 |
| Command & Control | HTTP C2 over non-standard ports (808, 880) | T1071.001 |
| Impact | Disk Wipe (ShapeShift — latent capability) | T1561.001 |
Sources: (1)(2)(3)(4)(5)(6)(9)(10)
3. MALWARE & TOOLING
Tickler
- Name: Tickler
- Type: Custom multi-stage backdoor
- Function: First sample — collects network information from the host and sends it to the C2 server via an HTTP POST request while launching a decoy PDF document. Second sample — Trojan dropper functionality to download payloads from the C2 server, including a backdoor, a batch script for persistence, and legitimate files used for DLL sideloading (5).
- C2 channel / technical specifics: Fraudulent Azure infrastructure, non-standard HTTP ports (808, 880). PEB traversal technique to bypass API hooks. Distributed in ZIP archives disguised as PDF documents (5)(10).
- Identifying campaign: Peach Sandstorm campaign, April–July 2024 (5)(6).
FalseFont
- Name: FalseFont
- Type: Custom backdoor
- Function: Provides operators with remote access to compromised systems, file execution, and file transfer to C2 servers. First observed in the wild around early November 2023 (13).
- C2 channel: HTTPS.
- Identifying campaign: Campaigns targeting the Defense Industrial Base (DIB), November 2023 (6)(13).
TurnedUp (TURNEDUP)
- Name: TurnedUp
- Type: Custom backdoor
- Function: Backdoor for data exfiltration and surveillance. Key attribution artifact: handle
xman_1365_xfound in PDB paths of samples (8). - C2 channel: HTTP/HTTPS.
- Identifying campaign: 2013–2019 campaigns (1)(8).
DropShot (DROPSHOT)
- Name: DropShot
- Type: Dropper
- Function: Signature dropper of the group, linked to the ShapeShift wiper. Contains Farsi language artifacts. The only documented group observed using DropShot (1)(3).
- C2 channel: HTTP.
- Identifying campaign: Documented from 2017 onward (1)(4).
ShapeShift (SHAPESHIFT)
- Name: ShapeShift
- Type: Destructive wiper
- Function: Wiper linked to the Shamoon 2016 attacks. Contains Farsi artifacts. Capability for data and critical infrastructure destruction. Assessed as latent and pre-positioned (3)(4).
- C2 channel: None (autonomous destructive payload).
- Identifying campaign: Linked to 2016–2018 campaigns (1)(4).
ALMA Backdoor
- Name: ALMA
- Type: PowerShell-based implant
- Function: Implant introduced in 2024, targeting defense contractors and logistics firms. Oriented toward espionage and credential exfiltration (2).
- Identifying campaign: 2024, North America and Gulf region (2).
Third-party tools used
- PoshC2, PowerShell Empire: open-source C2 frameworks (1)
- Remcos, DarkComet, QuasarRAT, PupyRAT: commodity RATs for non-critical operations (4)(10)
- AzureHound, Roadtools: Entra ID / Azure Resource Manager cloud enumeration (5)
- AnyDesk: legitimate RMM tool for persistence (5)
- AD Explorer (Sysinternals): Active Directory snapshots (5)
- Mimikatz, procdump: credential dumping (4)(10)
- Ruler: Outlook Home Page exploitation (1)
4. CAMPAIGN HISTORY
| Period | Campaign | Targets | Vector | Tooling |
|---|---|---|---|---|
| 2013–2016 | Initial espionage operations | Aerospace, defense, energy — USA, Saudi Arabia, South Korea | Spearphishing HTA, job-lures | TurnedUp, DropShot, commodity RATs (1) |
| 2016–2018 | Presumed destructive campaigns | Energy infrastructure, Saudi oil sector | Spearphishing | DropShot, ShapeShift (presumed Shamoon link) (1)(4) |
| 2018–2019 | WinRAR / Outlook exploitation | Organizations in USA, Middle East, Europe | CVE-2018-20250, CVE-2017-11774 exploitation | DropShot, commodity RATs (7) |
| Feb. 2023 – 2024 | Massive global password spray | Defense, satellite, pharmaceutical, government, education | Password spraying (go-http-client) | Valid credentials, RMM tools (3)(5) |
| Nov. 2023 | FalseFont — DIB campaign | Global Defense Industrial Base | Spearphishing, password spray | FalseFont backdoor (6)(13) |
| Apr.–Jul. 2024 | Tickler — Azure C2 campaign | Government, defense, space, oil/gas — USA, UAE | Password spray + LinkedIn social engineering | Tickler, fraudulent Azure, AzureHound, AD Explorer, SMB (5)(10) |
| 2024 | ALMA deployment | Defense contractors, logistics — North America, Gulf | Phishing, credential harvesting | ALMA PowerShell implant (2) |
| 2025 | Energy sector reconnaissance | Energy companies, oilfield services | Phishing, credential harvesting | ICS/SCADA reconnaissance (2) |
5. INDICATORS OF COMPROMISE (IOCs)
⚠️ Expiration warning: The IOCs listed below are sourced from public reporting dated 2017–2025. They have a limited validity period. Any use in a blocking or detection context must be preceded by a freshness verification against real-time CTI platforms. Do not use as a blocking basis without prior validation.
Characteristic network patterns
- Distinctive user-agent in password spraying campaigns:
go-http-client(3)(5) - HTTP C2 traffic over non-standard ports: 808 and 880 (4)(10)
- Connections toward Microsoft Azure infrastructure from unusual or recently created tenants (5)
- High-volume FTP traffic (historical exfiltration indicator) (4)
- HTTP POST requests toward Azure URIs hosting Tickler payloads (5)
Historical domains (public sources)
Domains impersonating legitimate aerospace entities registered during 2016–2019 campaigns: Boeing, Alsalam Aircraft Company, Northrop Grumman, Vinnell. Infrastructure is regularly rotated (8). Refer to real-time IOC feeds listed below.
Documented public hashes
Hashes associated with Tickler (July 2024), FalseFont (November 2023), TurnedUp, and DropShot are available in sources (1)(5)(6)(13). Not reproduced in this report due to rapid expiration.
Abnormal User-Agents observed
go-http-client— identifying marker for password spraying campaigns since February 2023 (3)(5)
Recommended real-time IOC sources
- MITRE ATT&CK — APT33 (G0064) (9)
- Malpedia — APT33 actor card (1)
- Microsoft Security Blog — Peach Sandstorm (5)(13)
- Mandiant / Google Cloud Threat Intelligence (1)
- Anvilogic Threat Reports (10)
6. DETECTION & COUNTERMEASURES
Priority technique 1 — Password Spraying (T1110.003)
Detection logic (SIEM/IdP):
ALERT IF :
auth.failed_attempts > 5
AND auth.target_accounts > 50
AND auth.timeframe < 3600s
AND auth.user_agent == "go-http-client"
AND auth.source_ip NOT IN known_corp_ranges
Recommended tools: Azure AD / Entra ID authentication log monitoring, alerting on go-http-client user-agent, Microsoft Entra ID Protection, mandatory phishing-resistant MFA (3)(5).
Priority technique 2 — Azure infrastructure abuse / Cloud Supply Chain (T1583.006)
Detection logic (CASB / Cloud Security):
ALERT IF :
azure.subscription.created_by IN [education_sector_accounts]
AND azure.tenant.age < 30d
AND azure.resource.outbound_connections > threshold
AND azure.subscription.type == "Azure for Students"
Recommended tools: Microsoft Defender for Cloud Apps, audit of Azure tenants created from education sector accounts, monitoring of Azure for Students subscriptions with high network activity (4)(5)(10).
Priority technique 3 — DLL Sideloading via signed binaries (T1574.001)
Detection logic (EDR):
ALERT IF :
process.name IN ["SharePoint.exe", "known_signed_binary"]
AND dll.loaded NOT IN [expected_dll_whitelist]
AND dll.path NOT IN [system_directories]
AND process.parent IS NOT [legitimate_installer]
Recommended tools: EDR with DLL integrity monitoring, audit of Registry Run key entries associated with signed Microsoft binaries (4)(10).
Priority technique 4 — Golden SAML / AD FS compromise (T1606.002)
Detection logic (SIEM / IdP):
ALERT IF :
saml.token.issuer NOT IN [known_adfs_servers]
OR saml.token.signing_key != [registered_key_fingerprint]
OR saml.token.attributes CONTAIN [unusual_privilege_claims]
AND saml.token.source_ip NOT IN [corp_ranges]
Recommended tools: AD FS event monitoring (Event ID 307, 510), detection of access to AD FS private keys, Microsoft Entra ID sign-in anomaly detection (4)(5).
Organizational countermeasures
- Mandatory deployment of phishing-resistant MFA (FIDO2/passkey) on all cloud access, VPN, and privileged accounts — most effective countermeasure against password spraying (3)(5)(6)
- Continuous monitoring and audit of Azure tenants created from education sector accounts (4)(5)
- Review of AD FS server access rights; access controls on SAML signing private keys (5)
- Detection of LSASS access and credential dumping tool execution via EDR (4)(10)
- Block or strictly monitor non-standard outbound HTTP ports (808, 880) from endpoints (4)(10)
- Integration of
go-http-clientuser-agent detection into SIEM/proxy rules (3)(5) - Hunting for Tickler artifacts: DLL sideloading from signed binaries, unusual Registry Run key entries (4)(10)
- Awareness training on fraudulent LinkedIn profiles (fake students, recruiters, developers) used for target collection (3)(5)
- Wiper-oriented resilience: ShapeShift/Shamoon destructive capability assessed as latent; tested offline backups and system rebuild procedures in place (4)(6)
- OT/ICS network segmentation from IT network to limit potential propagation to industrial systems (4)(6)
SOURCES
- Malpedia — APT33 (Threat Actor) : https://malpedia.caad.fkie.fraunhofer.de/actor/apt33
- Brandefense — APT33 (Elfin / Refined Kitten): Iran’s Longstanding Cyber-Espionage Arm (Nov. 2025) : https://brandefense.io/blog/apt33-apt-2025/
- TerraZone — APT33: A Complete Guide to Iran’s ‘Elfin’ Cyber Espionage Group (Nov. 2025) : https://terrazone.io/apt-3/
- Brandefense — APT33/Peach Sandstorm: 2025 Threat Forecast And Analysis (Nov. 2025) : https://brandefense.io/blog/apt33-2025-threat-forecast-and-analysis/
- Microsoft Security Blog — Peach Sandstorm deploys new custom Tickler malware (Aug. 2024) : https://www.microsoft.com/en-us/security/blog/2024/08/28/peach-sandstorm-deploys-new-custom-tickler-malware-in-long-running-intelligence-gathering-operations/
- BleepingComputer — New Tickler malware used to backdoor US govt, defense orgs (Aug. 2024) : https://www.bleepingcomputer.com/news/security/APT33-Iranian-hacking-group-uses-new-tickler-malware-to-backdoor-us-govt-defense-orgs/
- Broadcom/Symantec — Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S. : https://symantec-enterprise-blogs.security.com/threat-intelligence/elfin-apt33-espionage
- Wikipedia — Elfin Team : https://en.wikipedia.org/wiki/Elfin_Team
- MITRE ATT&CK — APT33, G0064 : https://attack.mitre.org/groups/G0064/
- Anvilogic — APT33 Targets Aerospace to Oil with Password Spraying Attacks : https://www.anvilogic.com/threat-reports/apt33-attacks-and-azure
- ThreatIntelReport — Threat Actor Profile: APT33 (Feb. 2026) : https://www.threatintelreport.com/2026/02/21/threat_actor_profiles/threat-actor-profile-apt33/
- Hedgehog Security — APT33: The Aerospace Stalker — Cyber Threat Profile : https://www.hedgehogsecurity.co.uk/blog/apt33-the-aerospace-stalker
- BleepingComputer — Microsoft: Hackers target defense firms with new FalseFont malware (Dec. 2023) : https://www.bleepingcomputer.com/news/security/microsoft-hackers-target-defense-firms-with-new-falsefont-malware/
- CrowdStrike — Who is Refined Kitten (APT33)? : https://www.crowdstrike.com/en-us/blog/who-is-refined-kitten/
- MITRE ATT&CK — Tactics and Techniques Reference : https://attack.mitre.org/
This report is produced on the basis of publicly available open sources (vendors, CERTs, independent researchers) consolidated as of March 16, 2026. It does not rely on any classified source. Attribution to the Iranian IRGC is assessed at high confidence based on multi-vendor convergence (Mandiant, Microsoft, CrowdStrike, Symantec, Dragos) and technical artifacts (Farsi language, operational timing, infrastructure). IOCs have a limited lifespan and must be validated before any operational use. This report is unrestricted (TLP:CLEAR).



