This is one VPN you won't want to download

VPN
(Image credit: Shutterstock)

Security researchers have discovered that an Iranian state-sponsored hacking group has built and been operating its own private VPN which it uses for hacking, reconnaissance and even everyday web browsing.

According to new research from Trend Micro, the group, codenamed APT33, is Iran's most sophisticated hacking unit. The group was responsible for the Shamoon malware back in 2012 which was used to wipe the hard drives of more than 35,000 workstations at Saudi Arabia's Saudi Aramco.

The group recently resurfaced and launched a series of new attacks targeting the oil and aviation industries. So far in 2019, APT33 has infected an American company that provides national security services, a university and a college in the US, a victim associated with the US military and several other victims in the Middle East and Asia.

However, while Trend Micro was investigating the group's latest attacks, it was able to gain a great deal of insight into how APT33 manages its hacking infrastructure.

APT33

Trend Micro's researchers discovered that APT33 used four layers between its operators and their targets to help the group avoid detection. 

First they used a custom-built network of VPN nodes to hide the IP addresses and the locations of their operators, they then employ a bot controller layer made up of intermediary servers, next a C&C backend layer is made up of servers which manage its malware botnets and finally a layer of proxy servers is used by the C&C servers to hide from infected hosts.

However, the biggest revelation made by Trend Micro is the fact that APT33 had set up and was operating its own private VPN network as opposed to using commercial VPN servers to hide their location. This actually made the group easier to track as the researchers only had to look out for a few IP addresses whereas with a commercial VPN they would have been far less detectable.

Trend Micro explained how APT33's private VPN made the group easier for it to track in a blog post, saying:

“Setting up a private VPN can be easily done by renting a couple of servers from datacenters around the world and using open source software like OpenVPN. Though the connections from private VPN networks still come from seemingly unrelated IP addresses around the world, this kind of traffic is actually easier to track. Once we know that an exit node is mainly being used by a particular actor, we can have a high degree of confidence about the attribution of the connections that are made from the IP addresses of the exit node.”

This isn't the first time we've seen a group of hackers create and operate their own VPN as earlier this year, hackers who used many of the tools and techniques of the Chinese-affiliated threat actor group APT10, built a VPN for greater convenience within the networks of mobile carriers they had previously infiltrated.

Via ZDNet

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in VPN
NordVPN running on a desktop, mobile devices, Apple TV, a router and a game console
NordVPN reacts to results from its latest security audit
ExpressVPN's new Linux app interface
ExpressVPN releases a major upgrade to its Linux app
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Why is there so much spyware hidden in the Play Store?
PrivadoVPN running on an iPhone during TechRadar's VPN tests
Why PrivadoVPN Free is still the best free VPN for streaming
Homepage of CloudFlare website on the display of PC, url - CloudFlare.com.
"Network blocking is never going to be the solution" – Cloudflare slams anti-piracy tactics
Man and woman watching TV
How can a VPN help with streaming? A complete guide to securing your favorite shows
Latest in News
MacBook Air mute key
The new M4 MacBook Air finally fixes an Apple keyboard annoyance that's been around for decades
A collage of Ellie and Joel in The Last of Us season 2
The Last of Us season 2's new trailer teases a huge showdown between Bella Ramsey's Ellie and Pedro Pascal's Joel, but the big moment I'm waiting for is still being held back
Apple iPhone 16 Pro Max REVIEW
New iPhone 17 Air leak may have revealed some key specs – and how it compares to the iPhone 17 Pro Max
Gaming with AI
I asked Gemini to play a text-based adventure game with me and the AI whisked me away to a word-based fantasy
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price