ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > Hexane

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Hexane

NamesHexane (Dragos)
Lyceum (SecureWorks)
Cobalt Lyceum (SecureWorks)
Siamesekitten (ClearSky)
ATK 120 (Thales)
Yellow Dev 9 (PWC)
CountryIran Iran
MotivationInformation theft and espionage
First seen2017
Description(Dragos) Dragos identified a new activity group targeting industrial control systems (ICS) related entities: Hexane. Dragos observed this group targeting oil and gas companies in the Middle East, including Kuwait as a primary operating region. Additionally, and unlike other activity groups Dragos tracks, Hexane also targeted telecommunication providers in the greater Middle East, Central Asia, and Africa, potentially as a stepping stone to network-focused man-in-the-middle and related attacks.

The threat actor shows similarities with other groups such as APT 33, Elfin, Magnallium and OilRig, APT 34, Helix Kitten, Chrysene, both active since at least 2017 and involved in attacks on oil and gas companies. Anyway, experts pointed out that the Hexane group has differed TTPs and has its own arsenal.
ObservedSectors: Energy, Oil and gas, Telecommunications.
Countries: Israel, Kuwait, Morocco, Saudi Arabia, Tunisia, UAE and Middle East, Central Asia and Africa.
Tools usedDanBot, DanDrop, Decrypt-RDCMan.ps1, Get-LAPSP.ps1, Marlin, Milan, kl.ps1, Shark.
Operations performedMay 2021New Iranian Espionage Campaign By “Siamesekitten” – Lyceum
<https://www.clearskysec.com/siamesekitten/>
2021In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia
<https://securelist.com/lyceum-group-reborn/104586/>
Jul 2021Who are latest targets of cyber group Lyceum?
<https://www.accenture.com/us-en/blogs/cyber-defense/iran-based-lyceum-campaigns>
Sep 2021Operation “Out to Sea”
OilRig was particularly active in September – December 2021, iterating on a campaign we are calling Out to Sea. OilRig operators have been developing and deploying iterative improvements to the DanBot backdoor, with Shark, Milan, and Marlin, an ESET exclusive.
<https://www.welivesecurity.com/wp-content/uploads/2022/02/eset_threat_report_t32021.pdf>
Mar 2022Mid March, an Israeli energy company received an email with the subject “Russian war crimes in Ukraine”.
<https://research.checkpoint.com/2022/state-sponsored-attack-groups-capitalise-on-russia-ukraine-war-for-cyber-espionage/>
Jun 2022Lyceum .NET DNS Backdoor
<https://www.zscaler.com/blogs/security-research/lyceum-net-dns-backdoor>
Jun 2022ClearSky discovered a new malware associated with the Iranian SiameseKitten (Lyceum) group with medium-high confidence.
<https://www.clearskysec.com/wp-content/uploads/2022/06/Lyceum-suicide-drone-23.6.pdf>
Information<https://dragos.com/resource/hexane/>
<https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign>
MITRE ATT&CK<https://attack.mitre.org/groups/G1001/>

Last change to this card: 10 March 2024

Download this actor card in PDF or JSON format

Previous: Harvester
Next: Hidden Lynx, Aurora Panda

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]