Article Details

Scrape Timestamp (UTC): 2024-01-12 13:58:44.451

Source: https://thehackernews.com/2024/01/nation-state-actors-weaponize-ivanti.html

Original Article Text

Click to Toggle View

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families. As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since early December 2023. "These families allow the threat actors to circumvent authentication and provide backdoor access to these devices," Mandiant said in an analysis published this week. The Google-owned threat intelligence firm is tracking the threat actor under the moniker UNC5221. The attacks leverage an exploit chain comprising an authentication bypass flaw (CVE-2023-46805) and a code injection vulnerability (CVE-2024-21887) to take over susceptible instances. Volexity, which attributed the activity to a suspected Chinese espionage actor named UTA0178, said the twin flaws were used to gain initial access, deploy webshells, backdoor legitimate files, capture credentials and configuration data, and pivot further into the victim environment. According to Ivanti, the intrusions impacted less than 10 customers, indicating that this could be a highly-targeted campaign. Patches for the two vulnerabilities (informally called ConnectAround) are expected to become available in the week of January 22. Mandiant's analysis of the attacks has revealed the presence of five different custom malware families, besides injecting malicious code into legitimate files within ICS and using other legitimate tools like BusyBox and PySoxy to facilitate subsequent activity. "Due to certain sections of the device being read-only, UNC5221 leveraged a Perl script (sessionserver.pl) to remount the filesystem as read/write and enable the deployment of THINSPOOL, a shell script dropper that writes the web shell LIGHTWIRE to a legitimate Connect Secure file, and other follow-on tooling," the company said. LIGHTWIRE is one of the two web shells, the other being WIREFIRE, which are "lightweight footholds" designed to ensure persistent remote access to compromised devices. While LIGHTWIRE is written in Perl CGI, WIREFIRE is implemented in Python. Also used in the attacks are a JavaScript-based credential stealer dubbed WARPWIRE and a passive backdoor named ZIPLINE that's capable of downloading/uploading files, establishing a reverse shell, creating a proxy server, and setting up a tunneling server to dispatch traffic between multiple endpoints. "This indicates that these are not opportunistic attacks, and UNC5221 intended to maintain its presence on a subset of high priority targets that it compromised after a patch was inevitably released," Mandiant further added. UNC5221 has not been linked to any previously known group or a particular country, although the targeting of edge infrastructure by weaponizing zero-day flaws and the use of compromise command-and-control (C2) infrastructure to bypass detection bears all the hallmarks of an advanced persistent threat (APT). "UNC5221's activity demonstrates that exploiting and living on the edge of networks remains a viable and attractive target for espionage actors," Mandiant said. The Ultimate Enterprise Browser Checklist Download a Concrete and Actionable Checklist for Finding a Browser Security Platform. Master Cloud Security - Get FREE eBook Comprehensive eBook covering cloud security across infrastructure, containers, and runtime environments for security professionals

Daily Brief Summary

NATION STATE ACTIVITY // Nation-State Hackers Exploit VPN Vulnerabilities for Espionage

Suspected nation-state actors have used two zero-day vulnerabilities in Ivanti Connect Secure VPN appliances to deploy five malware families.

The attack involved an authentication bypass flaw and a code injection vulnerability, allowing unauthorized access and post-exploitation activities.

The campaign seems to be highly targeted, affecting less than 10 Ivanti customers, with patches for the vulnerabilities forthcoming.

Malware families identified include THINSPOOL, LIGHTWIRE, WIREFIRE, WARPWIRE, and ZIPLINE, serving various functions from web shells to credential stealing and backdoor access.

Mandiant, the threat intelligence firm, is tracking the involved threat actor under the name UNC5221, noting the attacks' sophistication and persistence on the edge of networks.

There is no definitive link between UNC5221 and any known group or country, but their methods are consistent with advanced persistent threat (APT) actors.

UNC5221's techniques indicate a focus on maintaining long-term presence on high-value targets, highlighting the ongoing risk to edge infrastructure security.