Article Details

Scrape Timestamp (UTC): 2023-10-19 07:16:18.523

Source: https://thehackernews.com/2023/10/microsoft-warns-of-north-korean-attacks.html

Original Article Text

Click to Toggle View

Microsoft Warns of North Korean Attacks Exploiting TeamCity Flaw. North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically breach vulnerable servers, according to Microsoft. The attacks, which entail the exploitation of CVE-2023-42793 (CVSS score: 9.8), have been attributed to Diamond Sleet (aka Labyrinth Chollima) and Onyx Sleet (aka Andariel or Silent Chollima). It's worth noting that both the threat activity clusters are part of the infamous North Korean nation-state actor known as Lazarus Group. In one of the two attack paths employed by Diamond Sleet, a successful compromise of TeamCity servers is followed by the deployment of a known implant called ForestTiger from legitimate infrastructure previously compromised by the threat actor. A second variant of the attacks leverages the initial foothold to retrieve a malicious DLL (DSROLE.dll aka RollSling or Version.dll or FeedLoad) that's loaded by means of a technique referred to as DLL search-order hijacking to either execute a next-stage payload or a remote access trojan (RAT). Microsoft said it witnessed the adversary leveraging a combination of tools and techniques from both attack sequences in certain instances. The intrusions mounted by Onyx Sleet, on the other hand, use the access afforded by the exploitation of the JetBrains TeamCity bug to create a new user account named krtbgt that's likely intended to impersonate the Kerberos Ticket Granting Ticket. "After creating the account, the threat actor adds it to the Local Administrators Group through net use," Microsoft said. "The threat actor also runs several system discovery commands on compromised systems." The attacks subsequently lead to the deployment of a custom proxy tool dubbed HazyLoad that helps establish a persistent connection between the compromised host and attacker-controlled infrastructure. Another notable post-compromise action is the use of the attacker-controlled krtbgt account to sign into the compromised device via remote desktop protocol (RDP) and terminating the TeamCity service in a bid to prevent access by other threat actors. Over the years, the Lazarus group has established itself as one of the most pernicious and sophisticated advanced persistent threat (APT) groups currently active, orchestrating financial crime and espionage attacks in equal measure via cryptocurrency heists and supply chain attacks. "We certainly believe that North Korean hacking of cryptocurrency around infrastructure, around the world – including in Singapore, Vietnam, and Hong Kong – is a major source of revenue for the regime that's used to finance the advancing of the missile program and the far greater number of launches we have seen in the last year," U.S. Deputy National Security Advisor, Anne Neuberger, said. The development comes as the AhnLab Security Emergency Response Center (ASEC) detailed the Lazarus Group's use of malware families such as Volgmer and Scout that act as a conduit for serving backdoors for controlling the infected systems. "The Lazarus group is one of the very dangerous groups that are highly active worldwide, using various attack vectors such as spear-phishing and supply chain attacks," the South Korean cybersecurity firm said, implicating the hacking crew to another campaign codenamed Operation Dream Magic. This involves mounting watering hole attacks by inserting a rogue link within a specific article on an unspecified news website that weaponizes security flaws in INISAFE and MagicLine products to activate the infections, a tactic previously associated with the Lazarus Group. In a further sign of North Korea's evolving offensive programs, ASEC has attributed another threat actor known as Kimsuky (aka APT43) to a fresh set of spear-phishing attacks that utilize the BabyShark malware to install a motley slate of remote desktop tools and VNC software (i.e., TightVNC and TinyNuke) to commandeer victim systems and exfiltrate information.

Daily Brief Summary

NATION STATE ACTIVITY // North Korean Lazarus Group Exploits Critical JetBrains TeamCity Flaw

North Korean threat actors, Diamond Sleet and Onyx Sleet, are exploiting a critical security flaw in JetBrains TeamCity (CVE-2023-42793) to breach vulnerable servers, Microsoft has warned.

Linked to the notorious Lazarus Group, a nation-state actor from North Korea, these threat actors use different attack paths, one relying on a compromised TeamCity server to deploy a known implant called ForestTiger from a previously compromised legitimate infrastructure.

Another attack variant retrieves a malicious DLL that executes a next-stage payload or a remote access trojan (RAT).

The Onyx Sleet group exploits the same TeamCity bug to create a new user account, post which it runs several system discovery commands on compromised systems, leading to the deployment of a custom proxy tool, HazyLoad.

There have been instances where the attacker, via the newly created account, signs into the compromised device using remote desktop protocol (RDP) and terminates the TeamCity service to prevent other threat actors' access.

Notably, the Lazarus group has been engaged in financial crime and espionage attacks, including cryptocurrency heists and supply chain attacks, to fund North Korea's missile program.

AhnLab Security Emergency Response Center (ASEC) has detailed Lazarus Group's use of malware families like Volgmer and Scout for backdoor system control, linking the group to yet another campaign known as Operation Dream Magic which involves watering hole attacks.

ASEC has further attributed threat actor Kimsuky (or APT43) to fresh spear-phishing attacks using the BabyShark malware to install various remote desktop tools for system commandeering and information exfiltration.