ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Tortoiseshell, Imperial Kitten

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Tortoiseshell, Imperial Kitten

NamesTortoiseshell (Symantec)
Imperial Kitten (CrowdStrike)
TA456 (Proofpoint)
Curium (Microsoft)
Marcella Flores (self given)
Houseblend (?)
CountryIran Iran
MotivationInformation theft and espionage
First seen2018
Description(Symantec) A previously undocumented attack group is using both custom and off-the-shelf malware to target IT providers in Saudi Arabia in what appear to be supply chain attacks with the end goal of compromising the IT providers’ customers.

The group, which we are calling Tortoiseshell, has been active since at least July 2018. Symantec has identified a total of 11 organizations hit by the group, the majority of which are based in Saudi Arabia. In at least two organizations, evidence suggests that the attackers gained domain admin-level access.
ObservedSectors: Defense, IT, Maritime and Shipbuilding.
Countries: Saudi Arabia, UAE, USA and Middle East.
Tools usedget-logon-history.ps1, Infostealer, LEMPO, liderc, SysKit.
Operations performedSep 2019Cisco Talos recently discovered a threat actor attempting to take advantage of Americans who may be seeking a job, especially military veterans.
Nov 2020I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona
Counter operationsJul 2021Taking Action Against Hackers in Iran

Last change to this card: 26 December 2021

Download this actor card in PDF or JSON format

Previous: Tortilla
Next: Tracer Kitten

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]