ETDA ThaiCERT
Report
Search
Home > List all groups > Hexane

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Hexane

NamesHexane (Dragos)
Lyceum (SecureWorks)
ATK 120 (Thales)
Country[Unknown]
MotivationInformation theft and espionage
First seen2017
Description(Dragos) Dragos identified a new activity group targeting industrial control systems (ICS) related entities: Hexane. Dragos observed this group targeting oil and gas companies in the Middle East, including Kuwait as a primary operating region. Additionally, and unlike other activity groups Dragos tracks, Hexane also targeted telecommunication providers in the greater Middle East, Central Asia, and Africa, potentially as a stepping stone to network-focused man-in-the-middle and related attacks.

The threat actor shows similarities with other groups such as APT 33, Elfin, Magnallium and OilRig, APT 34, Helix Kitten, Chrysene, both active since at least 2017 and involved in attacks on oil and gas companies. Anyway, experts pointed out that the Hexane group has differed TTPs and has its own arsenal.
ObservedSectors: Energy, Oil and gas, Telecommunications.
Countries: Kuwait and Middle East, Central Asia and Africa.
Tools usedDanBot, DanDrop, Decrypt-RDCMan.ps1, Get-LAPSP.ps1, kl.ps1.
Information<https://dragos.com/resource/hexane/>
<https://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign>

Last change to this card: 15 April 2020

Download this actor card in PDF or JSON format

Previous: Hades
Next: Hidden Lynx, Aurora Panda

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
E-mail report@thaicert.or.th
PGP Download PGP key