An Iranian APT group known as Agrius has conducted supply chain-focused attacks against the diamond industry in three continents.
ESET threat intelligence team analyzed a supply chain attack targeted at an Israeli software developer to deploy Fantasy, Agrius’s new wiper.
The Fantasy wiper is built on the foundations of the previously reported Apostle wiper but does not attempt to masquerade as ransomware as Apostle. Instead, it wipes data. Victims were observed in South Africa, Israel and Hong Kong.
The victims in Israel included an IT support services company, a diamond seller, and an HR consulting firm. Victims in South African victims were an organization in the diamond industry, and the Hong Kong victim was a jeweler.
Agrius TTP typically exploits known vulnerabilities in internet-facing applications to install web shells. It conducts internal reconnaissance before moving laterally and deploying its malicious payloads.
Agrius operators possibly executed a supply-chain attack by targeting the Israeli software company’s software updating mechanisms to deploy Fantasy to victims in Israel, Hong Kong, and South Africa. It makes no effort to disguise itself as ransomware. Agrius operators used a new tool, Sandals, to connect remotely to systems and execute Fantasy.
Indicators of Compromise