Article Details
Scrape Timestamp (UTC): 2024-04-22 11:07:48.515
Source: https://thehackernews.com/2024/04/mitre-corporation-breached-by-nation.html
Original Article Text
Click to Toggle View
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws. The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissance of our networks, exploited one of our Virtual Private Networks (VPNs) through two Ivanti Connect Secure zero-day vulnerabilities, and skirted past our multi-factor authentication using session hijacking," Lex Crumpton, a defensive cyber operations researcher at the non-profit, said last week. The attack entailed the exploitation of CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), which could be weaponized by threat actors to bypass authentication and run arbitrary commands on the infected system. Upon gaining initial access, the threat actors moved laterally and breached its VMware infrastructure using a compromised administrator account, ultimately paving the way for the deployment of backdoors and web shells for persistence and credential harvesting. "NERVE is an unclassified collaborative network that provides storage, computing, and networking resources," MITRE said. "Based on our investigation to date, there is no indication that MITRE's core enterprise network or partners' systems were affected by this incident." The organization said that it has since taken steps to contain the incident, and that it undertook response and recovery efforts as well as forensic analysis to identify the extent of the compromise. The initial exploitation of the twin flaws has been attributed to a cluster tracked by cybersecurity company Volexity under the name UTA0178, a nation-state actor likely linked to China. Since then, several other China-nexus hacking groups have joined the exploitation bandwagon, according to Mandiant. "No organization is immune from this type of cyber attack, not even one that strives to maintain the highest cybersecurity possible," Jason Providakes, president and CEO of MITRE, said. "We are disclosing this incident in a timely manner because of our commitment to operate in the public interest and to advocate for best practices that enhance enterprise security as well as necessary measures to improve the industry's current cyber defense posture." Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
The MITRE Corporation was compromised by nation-state actors exploiting two zero-day vulnerabilities in Ivanti Connect Secure appliances.
The attackers accessed MITRE's unclassified NERVE network, which supports research and prototyping, by breaching a VPN and evading multi-factor authentication.
Identified vulnerabilities, CVE-2023-46805 and CVE-2024-21887, allowed unauthorized authentication bypass and arbitrary command execution.
Following initial access, the adversaries moved laterally to breach VMware infrastructure using compromised admin credentials, deploying backdoors and web shells for persistence.
Despite extensive breaches, no evidence suggests that MITRE's core enterprise network or partner systems were impacted.
MITRE has taken containment measures, conducted a forensic analysis, and is undertaking recovery efforts to address the security incident.
The exploitation of the vulnerabilities was first linked to UTA0178, a suspected China-linked nation-state group, with subsequent exploitation by other related groups.
MITRE's CEO emphasized the incident's disclosure aligns with their public interest commitment and the advocacy for improved cybersecurity practices.