DNS rebinding attacks are not often seen in the wild, which is one reason why browser makers have taken a slower approach to adopting the web security standard.
Related Posts
Top MacOS Malware Threats Proliferate: Here Are 6 to Watch
Top MacOS Malware Threats Proliferate: Here Are 6 to Watch
Apple’s growing market share — in a shrinking PC market — and the growing use of Golang for malware development is pushing a gradual increase in malicious tools targeting macOS environments.
New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules
New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules
Cybersecurity researchers have uncovered a new stealthy piece of Linux malware that leverages an unconventional technique to achieve persistence on infected systems and hide credit card skimmer code.
The malware, attributed to a financially motivated threat actor, has been codenamed sedexp by Aon’s Stroz Friedberg incident response services team.
“This advanced threat, active since 2022, hides Read More
Multiple Chinese Hacking Groups Exploiting Ivanti Connect Secure VPN Flaw
Multiple Chinese Hacking Groups Exploiting Ivanti Connect Secure VPN Flaw
[[{“value”:”
Cybersecurity firm Mandiant has uncovered a series of sophisticated cyberattacks targeting Ivanti Connect Secure VPN appliances.
These attacks, attributed to multiple Chinese nexus espionage groups, exploit critical vulnerabilities to facilitate lateral movement and compromise Active Directory systems.
This article delves into the intricate details of the CVEs involved, the clustering and attribution of these attacks, the deployment of new TTPs and malware, and the implications of such breaches.
CVEs: The Gateway to Exploitation
The initial disclosure of CVE-2023-46805 and CVE-2024-21887 on January 10, 2024, marked the beginning of a series of incident response engagements by Mandiant.
Document
Run Free ThreatScan on Your Mailbox
AI-Powered Protection for Business Email Security
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .
These vulnerabilities, an authentication bypass and a command injection flaw, have been the focal points of exploitation attempts by suspected Chinese nexus espionage actors.
The exploitation of these vulnerabilities underscores the critical need for timely patching and the application of appropriate mitigations.
As per the latest report by Google, several Chinese hacking groups are currently leveraging the vulnerability in Ivanti Connect Secure VPN to carry out their malicious activities.
Clustering and Attribution
Mandiant’s investigations have led to the clustering of these cyberattacks under the activities of two primary groups: UNC5325 and UNC5337.
Both groups are suspected of having ties to China and using the CVEs above to compromise Ivanti Connect Secure VPN appliances.
The attribution to these groups is based on deploying custom malware families and evolving their tactics, techniques, and procedures (TTPs) to exploit appliance-specific functionalities.
New TTPs and Malware
The evolution of attacker methodologies has been evident in deploying new TTPs and malware.
UNC5337, in particular, has been observed leveraging multiple custom malware families, including the SPAWNSNAIL passive backdoor, SPAWNMOLE tunneler, SPAWNANT installer, and SPAWNSLOTH log tampering utility.
These tools facilitate the persistence and lateral movement within compromised networks, showcasing the sophistication of these threat actors.
SPAWN Malware Family
The SPAWN malware family represents a significant advancement in the arsenal of these espionage groups.
PAWN malware family diagram
Each family component serves a unique purpose, from establishing backdoor access to facilitating network tunneling and tampering with logs to evade detection.
The deployment of these tools highlights the attackers’ strategic planning and technical prowess.
While the focus has been on exploiting Ivanti Connect Secure VPN appliances, Mandiant has also identified a campaign dubbed BRICKSTORM.
This campaign leverages similar tactics and malware to target other critical infrastructures, indicating a broader threat landscape and the adaptability of these espionage groups.
Lateral Movement Leading to Active Directory Compromise
One of the most concerning aspects of these attacks is the threat actors’ ability to leverage lateral movement techniques to compromise Active Directory systems.
UNC5330 attack path diagram
This not only allows for the escalation of privileges but also facilitates the exfiltration of sensitive information and the deployment of additional payloads across the network.
Multiple Chinese nexus espionage groups exploit Ivanti Connect Secure VPN flaws, representing a significant threat to global cybersecurity.
The deployment of new TTPs and malware, coupled with the ability to compromise critical systems, underscores the need for vigilant cybersecurity practices and the timely application of patches and mitigations.
As these threat actors evolve their strategies, the cybersecurity community must remain proactive in its defense measures to protect against such sophisticated attacks.
Indicators of Compromise (IOCs)
Host-Based Indicators (HBIs)
libdsproxy. soMD5Descriptiondata.dat9d684815bc96508b99e6302e253bc292PHANTOMNETepdevmgr.dllb210a9a9f3587894e5a0f225b3a6519fTONERJAMlibdsmeeting.so4f79c70cce4207d0ad57a339a9c7f43cSPAWNMOLElibdsmeeting.soe7d24813535f74187db31d4114f607a1SPAWNSNAIL.liblogblock.so4acfc5df7f24c2354384f7449280d9e0 SPAWNSLOTH.dskey3ef30bc3a7e4f5251d8c6e1d3825612dSPAWNSNAIL private keyN/Abb3b286f88728060c80ea65993576ef8TERRIBLETEAN/Acfca610934b271c26437c4ce891bad00TERRIBLETEAN/A08a817e0ae51a7b4a44bc6717143f9c2TERRIBLETEAlinb64.pnge7fdbed34f99c05bb5861910ca4cc994SLIVERlint64.pngc251afe252744116219f885980f2caeaSLIVERlinb64.png4f68862d3170abd510acd5c500e43548SLIVERlint64.png9d0b6276cbc4c8b63c269e1ddc145008SLIVERlogd71b4368ef2d91d49820c5b91f33179cbSLIVERwinb64.pngd88bbed726d79124535e8f4d7de5592eSLIVERlogd.spec.cfg846369b3a3d4536008a6e1b92ed09549SLIVER persistenceN/A8e429d919e7585de33ea9d7bb29bc86bSLIVER downloaderN/Afc1a8f73010f401d6e95a42889f99028PHANTOMNETN/Ae72efc0753e6386fbca0a500836a566ePHANTOMNETN/A4645f2f6800bc654d5fa812237896b00BRICKSTORMTable 4: Host-based indicators
Network-Based Indicators (NBIs)
Network IndicatorTypeDescription8.218.240[.]85IPv4Post-exploitation activity98.142.138[.]21IPv4Post-exploitation activity103.13.28[.]40IPv4Post-exploitation activity103.27.110[.]83IPv4Post-exploitation activity103.73.66[.]37IPv4Post-exploitation activity193.149.129[.]191IPv4Post-exploitation activity206.188.196[.]199IPv4Post-exploitation activityoast[.]funDomainPre-exploitation validationcpanel.netbar[.]orgDomainWARPWIRE Variant C2 serverpan.xj[.]hkDomainPost-exploitation activityakapush.us[.]toDomainSLIVER C2 serveropra1.oprawh.workers.devDomainBRICKSTORM C2 serverTable 5: Network-based indicators
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
The post Multiple Chinese Hacking Groups Exploiting Ivanti Connect Secure VPN Flaw appeared first on Cyber Security News.
“}]] Read More
Cyber Security News