Article Details
Scrape Timestamp (UTC): 2024-04-19 19:06:01.772
Original Article Text
Click to Toggle View
MITRE says state hackers breached its network via Ivanti zero-days. The MITRE Corporation says that a state-backed hacking group breached its systems in January 2024 by chaining two Ivanti VPN zero-days. The incident was discovered after suspicious activity was detected on MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative network used for research and development. MITRE has since notified affected parties of the breach, contacted relevant authorities, and is now working on restoring "operational alternatives." Evidence collected during the investigation so far shows that this breach did not affect the organization's core enterprise network or its partners' systems. "No organization is immune from this type of cyber attack, not even one that strives to maintain the highest cybersecurity possible," said MITRE CEO Jason Providakes. "We are disclosing this incident in a timely manner because of our commitment to operate in the public interest and to advocate for best practices that enhance enterprise security as well necessary measures to improve the industry's current cyber defense posture." MITRE explains in a separate advisory published on Friday that the threat actors compromised one of its Virtual Private Networks (VPNs) by chaining two Ivanti Connect Secure zero-days. They could also bypass multi-factor authentication (MFA) defenses by using session hijacking, which allowed them to move laterally through the breached network's VMware infrastructure using a hijacked administrator account. Throughout the incident, the threat group used a combination of sophisticated webshells and backdoors to maintain access to hacked systems and harvest credentials. Since early December, the two security vulnerabilities, an auth bypass (CVE-2023-46805) and a command injection (CVE-2024-21887), have been exploited to deploy multiple malware families for espionage purposes. Mandiant linked these attacks to an advanced persistent threat (APT) it tracks as UNC5221, while Volexity reported seeing signs that Chinese state-sponsored threat actors were exploiting the two zero-days. Volexity said the Chinese hackers backdoored over 2,100 Ivanti appliances, harvesting and stealing account and session data from breached networks. The victims ranged in size from small businesses to some of the largest organizations worldwide, including Fortune 500 companies from various industry verticals. Due to their mass exploitation and the vast attack surface, CISA issued this year's first emergency directive on January 19, ordering federal agencies to mitigate the Ivanti zero-days immediately.
Daily Brief Summary
MITRE Corporation experienced a breach in January 2024 by a state-sponsored hacking group using Ivanti VPN zero-days.
The hackers accessed MITRE’s unclassified Networked Experimentation, Research, and Virtualization Environment (NERVE) but did not impact the core enterprise network or partner systems.
The threat actors exploited vulnerabilities to bypass multi-factor authentication and used sophisticated techniques like webshells and backdoors for system access and credential harvesting.
The attack involved chaining two Ivanti Connect Secure zero-days, CVE-2023-46805 and CVE-2024-21887, identified for mass exploitation by various threat groups including the Chinese state-sponsored actors.
Over 2,100 Ivanti appliances were reportedly compromised by the attackers, affecting a range of victims including Fortune 500 companies.
MITRE has contacted affected parties and authorities, working on recovery and advocating for enhanced cybersecurity practices.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to address these vulnerabilities promptly in January 2024.