APT15
This group, which some researchers believe to have Chinese origins, has been operating since at least 2010. It attacks government organizations, embassies, and economic sectors in multiple countries. The group uses its own malware and publicly available tools. Researchers found connections between APT15 and a malicious actor who developed spying mobile applications involved in attacks on Uighurs.
APT33
This group targets government and private organizations related to aviation and energy. Activity has been observed since 2013. The attackers use both publicly available tools and their own ones with elements of the Farsi language, leading researchers to suggest a connection to Iran.
APT35
Researchers link this group to the Islamic Revolutionary Guard Corps (IRGC). APT35 targets both economic sectors and individuals, specializing in stealing confidential information using its own malware, as well as exploiting recently discovered vulnerabilities (N-day). The group has several subgroups, one of which is Nemesis Kitten (also known as DEV-0270 and Storm-0270).
Bahamut
A "hack-for-hire" mercenary cybercriminal group, active since 2016. The group attacks both high-ranking government officials and industrial magnates in India, the UAE, and Saudi Arabia, as well as those supporting Sikh separatism or human rights movements in the Middle East. The group possesses its own software and is involved in creating malicious apps for Android and iOS mobile devices, distributing them through Google Play and App Store.
Bitter
Many researchers believe this cybercriminal group to have Indian origins. Active since 2013. As confirmed by researchers from Anomali, Bitter attacks military and industrial targets in China and Pakistan, with activity also observed in other countries. The group uses various tools, including Android malware. Originally based on AndroRAT, they later developed their own tools, and exploit many vulnerabilities, such as CVE-2021-28310.
Dark Caracal
This group has been operating since at least 2012. According to researchers from Lookout, the group has Lebanese roots and conducts large-scale espionage campaigns worldwide. Since 2021, it has been seen in South and Central America. Typically for APT groups, Dark Caracal's targets include industrial and defense enterprises and individuals involved in activist, legal, or journalistic activities. The group uses tools that record video and capture keyboard input for subsequent transmission of information to the group's servers.
Desert Falcons
This group has been active since at least 2011. According to some researchers, including from Sekoia.io, it is linked to the Palestinian movement Hamas. Their main targets are concentrated in Israel, but attacks have also been recorded in other countries. The group has an arsenal of malware for computers and mobile devices, and regularly updates it. Among their victims are private individuals, as the group carries out attacks targeting users of iOS and Android-based mobile devices.
Hexane
This group has been attacking Middle Eastern and African countries since 2017. According to some researchers, for example from Sekoia.io, it has Iranian roots. The group's goals are politically motivated. Their tactics and techniques are similar to APT33 and OilRig (supposedly Iranian groups), but Hexane's tools and the uniqueness of its victims make it difficult to determine whether this group belongs with those ones. The attackers use their own backdoors written in C# and C++, PowerShell scripts, as well as open-source programs like Empire.
Molerats
It has been suggested that this group is Arab in origin and is politically motivated. Activity has been observed since 2012. According to researchers from Clearsky, the group is linked to the Palestinian movement Hamas. The group mainly targets enterprises in the Middle East but has also been observed attacking organizations in Europe and the United States. The group has both self-developed tools and various remote control malware, also used by other groups operating in the Middle East.
Moses Staff
According to researchers from Cybereason, this group may be linked to Iran. Its main goal is espionage.
Muddy Water
This group has been active since 2017. According to researchers, for example from Sekoia.io, the group may have Iranian roots. The primary targets are Middle Eastern countries, but the group also attacks countries in Asia, Africa, Europe, and North America. They often use open-source tools and exploit known vulnerabilities to gain access to the victim's computer for further data theft. The group also possesses an extensive arsenal of its own tools that are constantly being improved.
Mustang Panda
Crowdstrike researchers believe that this group has Chinese origins. Its activity has been recorded since at least 2014. They target countries neighboring China and conduct large-scale campaigns, all linked to the geopolitical interests of the People's Republic of China (PRC). Since 2022, they have actively attacked European countries, primarily embassies and diplomatic missions. The group uses tracking pixels in phishing campaigns. They have various tools in their arsenal, including Cobalt Strike and modified versions of PlugX, as well as self-developed malware.
OilRig
According to researchers, including from Sekoia.io, the group is supported by Iran. OilRig's main victims are predominantly organizations in the Middle East. Its activity was first recorded in 2012 during a wave of attacks in the Middle East. The group is known for its wide range of tools and the use of supply chain attacks to gather strategic information.
Stealth Falcon
According to some researchers from Citizenlab and sources from Reuters, the group is supposedly associated with the UAE. Active since at least 2012, it targets political activists, journalists, and dissidents in Arab countries. It uses self-developed malware and exploits zero-day vulnerabilities.
Volatile Cedar
This group has been active since 2012. Researchers from ClearSkySec found that the group's servers were located in Lebanon. The attacks are often politically motivated, targeting companies and individuals worldwide. The group uses publicly available tools and its own software, capable of bypassing most antivirus defenses.
Wirte
This group has been operating since 2018 at least. The group targets victims in Syria, Lebanon, Jordan, and other Middle Eastern countries. As confirmed by Proofpoint, the group is probably politically motivated and may be associated with the Molerats group. The attackers send phishing emails with documents in Arabic containing VBA macros that download additional payloads. Additionally, the group has been observed using the post-exploitation framework Empire.