{"id":29166,"date":"2019-09-18T23:10:00","date_gmt":"2019-09-18T23:10:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/saudi-it-providers-hit-in-cyber-espionage-operation\/d\/d-id\/1335850"},"modified":"2019-09-18T23:10:00","modified_gmt":"2019-09-18T23:10:00","slug":"saudi-it-providers-hit-in-cyber-espionage-operation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/","title":{"rendered":"Saudi IT Providers Hit in Cyber Espionage Operation"},"content":{"rendered":"<header>\n<\/header>\n<p><span class=\"strong black\">Symantec identifies new &#8216;Tortoiseshell&#8217; nation-state group as the attackers.<\/span> <\/p>\n<p class>In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers&#8217; ultimate targets in that region.<\/p>\n<p>Researchers at Symantec say the attackers have been operating since July 2018 and appear to be a previously unidentified threat group, which Symantec has christened Tortoiseshell. The group infiltrated at least 11 organizations, mostly in Saudi Arabia and including large IT providers, employing both off-the-shelf tools and its own custom attack malware. And in two of the infected organizations, the attackers obtained domain-level administrative access, so the attackers had access to all machines on those networks.<\/p>\n<p>The researchers say Tortoiseshell does not appear to be related to any existing groups in the Middle East. But one of its victim organizations was infiltrated via a backdoor associated with the Iranian nation-state group Oilrig (aka APT34). Even so, Symantec says there&#8217;s no confirmed connection that indicates Tortoiseshell is actually Oilrig.<\/p>\n<p>&#8220;There&#8217;s no code overlap or shared infrastructures&#8221; with other groups, says Jon DiMaggio, a senior threat intelligence analyst with Symantec. &#8220;So we put this activity into its own bucket.&#8221;<\/p>\n<p>Symantec does not tie specific nations to threat groups unless they&#8217;ve been identified by the US government.&nbsp;<\/p>\n<p>At a time when many nation-state hacking groups have ditched custom tools and malware for legitimate, off-the-shelf IT tools to remain under the radar, Tortoiseshell bucks the trend a bit with a combination of its own custom backdoor plus some legit IT tools such as PowerShell to camouflage its activity. Its <a href=\"https:\/\/www.symantec.com\/content\/symantec\/english\/en\/security-center\/writeup.html\/2019-082613-5549-99\">Backdoor.Syskit<\/a>, based on Delphi and .NET, can download and run other tools and tasks.<\/p>\n<p>&#8220;My theory is they [nation-states] are primarily going to use whatever tools in the environment they can because it helps them avoid detection. The only reason to create a custom tool is if you need to do something that was present in that environment,&#8221; DiMaggio says.<\/p>\n<p>Symantec did not identify the targeted industry sector or sectors of the Tortoiseshell victims.<\/p>\n<p>In one interesting twist that&#8217;s atypical of most targeted attacks, two of the victim networks suffered infections of several hundred machines. &#8220;That&#8217;s noisy for a targeted attack,&#8221; DiMaggio notes. The attackers may have struggled a bit to get to the actual victim machine they needed, hence the high number of infected machines.<\/p>\n<p>Symantec says the initial attack vector is unknown at this point, but one of the victims may have been hit via a compromised Web server. &#8220;For at least one victim, the first indication of malware on their network was a web shell,&#8221; according to Symantec&#8217;s threat report on Tortoiseshell, published today. &#8220;This indicates that the attackers likely compromised a web server, and then used this to deploy malware onto the network.&#8221;<\/p>\n<p>The attack steals details about the victim machine, including IP configuration, applications, system information, and network connections. &nbsp;<\/p>\n<p>John Bambenek, director of cybersecurity research at ThreatStop, says he found the three Syskit backdoor hashes shared by Symantec in the <a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/tortoiseshell-apt-supply-chain\" target=\"_blank\" rel=\"noopener noreferrer\">Tortoiseshell report<\/a>&nbsp;match Yara rules connected to Charming Kitten, aka APT35, an Iranian nation-state group. Charming Kitten is best known for targeting victims in the US, Israel, and the UK, who work in the academic research, human rights, and media industries.<\/p>\n<p>It&#8217;s unclear what the overlap means &#8211; nation-stage groups sometimes share or reuse others&#8217; tools. And as Symantec and other security researchers note, attribution gets harder all the time as these groups get more sophisticated.<\/p>\n<p>Bambenek says Iran is likely to continue expanding its cyber espionage and other hacking operations even in the wake of the latest economic sanctions by the US. Cyber operations are relatively inexpensive, he notes.<\/p>\n<p>Meanwhile, Saudi Arabia&#8217;s oil and gas industry long has been a major cyber target for Iran, starting with its data-destruction attack on Saudi Aramco in 2012, as well as the infamous Shamoon and Triton attacks. And the recent drone attacks on Saudi oil facilities which were attributed to Iran by US officials, have escalated tensions in the Middle East.<\/p>\n<p><strong>Supply Chain for the &#8216;Win&#8217;<\/strong><\/p>\n<p>Supply-chain attacks over the past few years have become a more popular and effective way for nation-states to reach their targeted victims. The number of supply chain attacks jumped 78% in 2018, according to Symantec&#8217;s data. &#8220;IT providers are an ideal target for attackers given their high level of access to their clients&#8217; computers. This access may give them the ability to send malicious software updates to target machines, and may even provide them with remote access to customer machines,&#8221; Symantec said in its report.<\/p>\n<p>&#8220;The Tortoiseshell hacks illustrate why IT providers are a classic target for third-party attacks: Such providers have administrative access to numerous customers and many of them lack basic security controls,&#8221; said Giora Omer, head of security architecture at Panorays, a security-as-a-service firm that provides automated supply chain management.<\/p>\n<p>Tortoiseshell&#8217;s supply-chain attack method is yet another example of how Iran&#8217;s cyber espionage machine has matured. Earlier this year, FireEye officially christened an Iranian hacking team it has been tracking for more than four years, as APT39 &#8211; the same group of hackers that Symantec already calls&nbsp;<a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/chafer-latest-attacks-reveal-heightened-ambitions\" target=\"_blank\" rel=\"noopener noreferrer\">Chafer<\/a>&nbsp;and CrowdStrike calls Helix Kitten. APT39 steals personal information for use in monitoring, tracking, and surveillance operations by the nation.<\/p>\n<p>&#8220;They&#8217;re generally stealing data &#8230; in bulk and then processing it&#8221; for usefulness, Benjamin Read, senior manager of cyber espionage analysis at FireEye told Dark Reading <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/iran-ups-its-traditional-cyber-espionage-tradecraft\/d\/d-id\/1333764\" target=\"_blank\" rel=\"noopener noreferrer\">in a previous interview<\/a>.&nbsp;<\/p>\n<p>Meantime, a new RAND report released today on nation-state hacking found that Iran is less likely to use cyberattacks for coercion than Russia and North Korea. Instead, Iran is more about retaliation. &#8220;Iranian cyber operations appear more focused on retaliating against regional neighbors and the West, rather than serving a direct coercive purpose,&#8221; the <a href=\"https:\/\/protect-us.mimecast.com\/s\/OkqzCrkEYwi8q3AYET7jCSs?domain=rand.org%20says.\" target=\"_blank\" rel=\"noopener noreferrer\">RAND report<\/a>&nbsp;said.<\/p>\n<p><strong>Related Content:<\/strong><\/p>\n<p><strong><em><strong><strong><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg\" alt width=\"290\" height=\"90\">Check out&nbsp;<a href=\"https:\/\/www.darkreading.com\/Edge.asp\">The Edge<\/a>, Dark Reading&#8217;s new section for features, threat data, and in-depth perspectives. Today&#8217;s top story: &#8220;<a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/poll-results-maybe-not-burned-out-but-definitely-well-done\/b\/d-id\/1335831\">Poll Results: Maybe Not Burned Out, But Definitely &#8216;Well Done&#8217;<\/a>.&#8221;<\/strong><\/strong><\/em><\/strong><\/p>\n<p><span class=\"italic\">Kelly Jackson Higgins is Executive Editor&nbsp;at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=322\">View Full Bio<\/a><\/span> <\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/saudi-it-providers-hit-in-cyber-espionage-operation\/d\/d-id\/1335850?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symantec identifies new &#8216;Tortoiseshell&#8217; nation-state group as the attackers. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/saudi-it-providers-hit-in-cyber-espionage-operation\/d\/d-id\/1335850?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-29166","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-18T23:10:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Saudi IT Providers Hit in Cyber Espionage Operation\",\"datePublished\":\"2019-09-18T23:10:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/\"},\"wordCount\":1071,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Edgepromohorizontal.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/\",\"name\":\"Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Edgepromohorizontal.jpg\",\"datePublished\":\"2019-09-18T23:10:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Edgepromohorizontal.jpg\",\"contentUrl\":\"https:\\\/\\\/img.deusm.com\\\/darkreading\\\/MarilynCohodas\\\/Edgepromohorizontal.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/saudi-it-providers-hit-in-cyber-espionage-operation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Saudi IT Providers Hit in Cyber Espionage Operation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/","og_locale":"en_US","og_type":"article","og_title":"Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-09-18T23:10:00+00:00","og_image":[{"url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Saudi IT Providers Hit in Cyber Espionage Operation","datePublished":"2019-09-18T23:10:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/"},"wordCount":1071,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/","url":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/","name":"Saudi IT Providers Hit in Cyber Espionage Operation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#primaryimage"},"thumbnailUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg","datePublished":"2019-09-18T23:10:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#primaryimage","url":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg","contentUrl":"https:\/\/img.deusm.com\/darkreading\/MarilynCohodas\/Edgepromohorizontal.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/saudi-it-providers-hit-in-cyber-espionage-operation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Saudi IT Providers Hit in Cyber Espionage Operation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29166"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29166\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}