Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns

Iranian APT Screening Serpens Uses AppDomainManager Hijacking in Espionage Campaigns

Palo Alto Unit 42 reports that the Iranian APT group Screening Serpens is actively employing sophisticated techniques, including AppDomainManager hijacking and new Remote Access Trojan (RAT) variants, in recent espionage campaigns. This marks a significant escalation in their operational tradecraft, moving beyond typical phishing lures to more stealthy and persistent methods.

The primary targets for these campaigns are organizations within the technology and defense sectors. Screening Serpens’ focus on these critical industries indicates a strategic objective to acquire sensitive intellectual property and strategic intelligence, rather than financial gain. The use of AppDomainManager hijacking is particularly concerning as it allows for code execution within a trusted application domain, making detection challenging.

Defenders need to shift their focus from perimeter defenses to robust endpoint detection and response (EDR) capabilities, specifically looking for anomalous process behavior and unusual module loading. Standard antivirus will likely miss these advanced techniques. CISOs should prioritize threat hunting for these specific TTPs, especially within development environments and critical infrastructure segments.

What This Means For You

  • If your organization operates in the technology or defense sectors, you are a prime target for Screening Serpens. Immediately audit your EDR logs for AppDomainManager hijacking indicators and unusual RAT activity. Ensure application whitelisting is robust and review your network segmentation, particularly for critical R&D or operational technology networks.
Take action on this incident
πŸ“‘ Monitor unit42.paloaltonetworks.com Free Β· 1 watchlist slot Β· instant alerts on new breaches πŸ” Threat intel on Unit 42 All breaches, IOCs & vendor exposure

Related coverage on Unit 42

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Trend Micro Apex One Zero-Day Under Active Exploitation

Trend Micro has confirmed a zero-day vulnerability in its Apex One security product, actively exploited on Windows systems. BleepingComputer reports that this critical flaw allows...

threat-inteldata-breachmalwarevulnerabilitymicrosoft
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma

Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities

Ubiquiti has rolled out critical security updates addressing three maximum severity vulnerabilities in UniFi OS. BleepingComputer reports these flaws, tracked as CVE-2023-48092, CVE-2023-48093, and CVE-2023-48094,...

threat-inteldata-breachmalwarevulnerabilitytools
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 1 Sigma