Geographic Focus
Department 40’s primary operational focus centers on the Middle East and Gulf region, with extensive targeting across multiple countries.Middle East and Gulf Region
The APT has directed attacks against targets in:- Turkey: Government entities, telecommunications infrastructure
- United Arab Emirates (UAE): Government and security sectors
- Qatar: Various organizational targets
- Afghanistan: Government and civilian entities
- Israel: Intelligence and security organizations
- Jordan: Government entities and companies
- Saudi Arabia: Various targets
- Kuwait: Government and corporate targets
European Operations
- Greece: Extensive Proxyshell targeting campaign
- Belgium: Multiple organizational targets
- Various European targets including media organizations
Global Reach
While focused on the Middle East, operations extend to:- India: Extensive Proxyshell exploitation campaign
- Canada: Multiple targets identified
- Egypt: Various entities
- Other international locations as operational needs dictate
Target Categories
Telecommunications Companies
Telecommunications infrastructure represents a primary target category:- Network access for intelligence gathering
- Communication interception capabilities
- Customer data access
- Infrastructure mapping
Aviation Companies
Aviation sector targeting includes:- Airlines and aviation service providers
- Airport infrastructure
- Travel data collection
- Passenger information access
Intelligence Organizations
Foreign intelligence services are high-priority targets:- Israeli intelligence entities
- Arab intelligence organizations
- European security services
- Counterintelligence against foreign operations
Government Entities
Extensive targeting of government organizations:- Turkey: Foreign Ministry and other government departments
- UAE: Government and security employees
- Jordan: Government entities
- Afghanistan: Government organizations
- Various Middle Eastern government targets
Media Organizations
Media outlets targeted for:- Intelligence on reporting activities
- Source identification
- Influence operations
- Monitoring coverage of Iranian activities
Corporate Targets
Civilian companies across multiple sectors:- Medical and healthcare companies
- Financial institutions (e.g., Optima Bank in Greece)
- Business organizations
- Professional services firms
Iranian Opposition Tracking
Domestic Opposition
Monitoring and targeting of Iranians within Iran identified as “regime opponents”:- Political dissidents
- Civil society activists
- Reform movement members
- Critics of the Iranian government
Iranian Exiles
Extensive operations against Iranians abroad:- Exile community monitoring
- Opposition groups outside Iran
- Iranian diaspora activists
- Former regime officials who defected
Operational Methods
- Social engineering campaigns
- Credential harvesting
- Communications monitoring
- Network infiltration
- Intelligence gathering for potential targeting
Specific Target Examples
Turkish Foreign Ministry
Documented attack using BellaCiao malware:- Government entity penetration
- Webshell deployment
- Sustained access maintained
- Intelligence gathering operations
UAE Security Personnel
AMEEN ALKHALIJ recruitment campaign:- Fake recruitment website established
- Targeting former government and security employees
- Social engineering operation
- Credential harvesting
- Server logs document access attempts
Proxyshell Mass Exploitation
Mass targeting campaigns documented:- India: 52+ targets identified
- Greece: 34+ targets including banks and businesses
- Belgium: 31+ targets across multiple sectors
- Canada: Multiple targets
- Egypt: Various entities
- Exchange servers at corporate entities
- Government email infrastructure
- Financial institutions
- Professional services firms
- Healthcare organizations
Documented Specific Targets
From leaked attack reports:- Optima Bank (Greece) - webmail access
- Various Greek businesses and accounting firms
- Indian Mahindra entities
- Belgian corporate targets
- Multiple telecommunications providers
Target Selection Criteria
Strategic Value
- Intelligence Collection: Access to communications and sensitive information
- Counterintelligence: Monitoring foreign intelligence activities
- Regime Security: Tracking opposition and dissidents
- Regional Influence: Supporting Iranian geopolitical objectives
Operational Factors
- Accessibility: Vulnerability to exploitation techniques
- Value: Intelligence significance of the target
- Strategic Positioning: Location and connections
- Operational Security: Likelihood of detection
Priority Targeting
Highest priority categories:- Intelligence organizations
- Iranian opposition (domestic and abroad)
- Government entities in neighboring countries
- Telecommunications infrastructure
- Strategic regional partners
Target Documentation
Leaked materials reveal extensive target tracking:- Excel spreadsheets of Proxyshell targets by country
- Attack reports on specific entities
- Daily reports mentioning target activities
- Success/failure logs for operations
- Credential databases from compromised targets
Targeting Evolution
Evidence shows operational evolution:- Mass exploitation campaigns (Proxyshell)
- Targeted social engineering (AMEEN ALKHALIJ)
- Custom malware deployment (BellaCiao)
- Sustained access operations
- Multi-stage targeting approaches