Friday, September 22, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Barracuda ESG Flaw Exploited by ‘Aggressive’ China-Linked Actor

Researcher by Researcher
June 16, 2023
in Cybersecurity
0
Microsoft to Block Macros by Default in Office Apps
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


A threat actor with suspected links to China has been targeting a recently disclosed zero-day vulnerability in Barracuda Email Security Gateway (ESG) appliances, in what Mandiant researchers call the broadest espionage campaign known to be conducted by a China-nexus threat actor since the 2021 mass exploitation of Microsoft Exchange.

After Barracuda initially shipped a series of patches in May for the remote command injection vulnerability (CVE-2023-2868) in some versions of its ESG appliance, the company said that the vulnerability had been exploited in the wild for eight months and urged certain impacted customers to replace their ESG appliances.

In a new Thursday analysis, Mandiant, which assisted in the incident response, offered new details around the threat actor behind the attacks. The group, UNC4841, has not been linked to a previously known threat group at this time and researchers assess with high confidence that it is an espionage actor in support of the People’s Republic of China.

According to the analysis, the threat group’s operations have targeted victims worldwide, with a majority of attacks appearing to impact the Americas (though Mandiant noted that “may partially reflect Barracuda’s product customer base”). Additionally, around one-fourth of the impacted organizations were government agencies, including the Ministry of Foreign Affairs (MFAs) of ASEAN, and foreign trade offices and academic research organizations in various locations, such as Hong Kong.

“Post initial compromise, Mandiant and Barracuda observed UNC4841 aggressively target specific data of interest for exfiltration, and in some cases, leverage access to an ESG appliance to conduct lateral movement into the victim network, or to send mail to other appliances,” said Mandiant researchers on Thursday. “Mandiant has also observed UNC4841 deploy additional tooling to maintain presence on ESG appliances.”

UNC4841 started to send emails to victim organizations as early as Oct. 10, which contained crafted TAR file attachments that were developed to exploit CVE-2023-2868. In some cases, these emails were also sent from email addresses belonging to other organizations with compromised appliances.

“Mandiant expects UNC4841 will continue to alter their TTPs and modify their toolkit, especially as network defenders continue to take action against this adversary and their activity is further exposed by the infosec community.”

These emails contained generic lures with poor grammar and, in some cases, placeholder values; however, researchers believe that the attackers likely did this on purpose in order to disguise the messages as generic spam. This tactic, which has previously been used by sophisticated threat groups, means the messages will be flagged as spam and is an effort to dissuade security analysts from investigating them.

As was previously disclosed in Barracuda’s security advisory, researchers found that UNC4841 deployed a variety of custom malware families to maintain persistence on impacted ESG appliances. These included a backdoor called Saltwater with components enabling attackers to upload or download arbitrary files and execute commands; a malware family called Seaside that monitors SMTP commands for a command-and-control (C2) IP address and port, which it then passes on to an external binary that creates a reverse shell; and a backdoor called Seaspy that has code that overlaps with the known, publicly available backdoor cd00r.

In addition to these previously highlighted custom families, researchers on Thursday revealed more malware modules used post-compromise by the attackers, including Seaspray, a trojanized Barracuda email security gateway module that executes an external binary (called Whirlpool) upon registering an email filename attachment with a special value, which then establishes a reverse shell. Researchers also uncovered a passive backdoor called Skipjack that acts as a trojanized version of the Barracuda email security gateway; and a rootkit called Sandbar, which is a trojanized network file system kernel module for Linux that hides processes that start with a specific name.

The threat actors tweaked these malware families, along with their TTPs, on a rolling basis and in response to Barracuda’s efforts to contain and remediate the attacks. For instance, when Barracuda released an initial remediation script, UNC4841 made rapid modifications to components related to Seaspy and Saltwater in order to prevent effective patching, said Mandiant.

“Between May 22, 2023 and May 24, 2023, UNC4841 conducted high frequency operations on a number of victims located in at least 16 different countries; modifying 7 components of SEASPY and at least 2 components of SALTWATER,” said Mandiant researchers.

While Mandiant researchers said they have not yet attributed the activity to a previously known threat group, they found several overlaps in infrastructure and malware code that gave them a high degree of confidence that UNC4841 is a China-nexus espionage operation. Researchers strongly recommend that impacted customers continue to hunt for the threat actor and investigate their networks, given that the group is highly responsive to defense efforts.

“Mandiant expects UNC4841 will continue to alter their TTPs and modify their toolkit, especially as network defenders continue to take action against this adversary and their activity is further exposed by the infosec community,” said researchers.



Source link

Related articles

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
Tags: ActorAggressiveBarracudaChinaLinkedESGexploitedFlaw
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

August 13, 2023
0

Northern Ireland’s top police officer apologized Thursday for what he described as an “industrial scale” data breach in which the...

Minimizing Risk Through Proactive Apple Device Management: Addigy

Minimizing Risk Through Proactive Apple Device Management: Addigy

August 12, 2023
0

Enterprise IT teams are struggling to cope with three major forces of change: the evolving regulatory environment, a globally dispersed...

Decipher Podcast: Katelyn Bowden and TC Johnson

Decipher Podcast: Katelyn Bowden and TC Johnson

August 12, 2023
0

Veilid main site: https://veilid.com/ Cult of the Dead Cow site: https://cultdeadcow.com/ Source link

In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack 

In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

August 12, 2023
0

SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...

Used Correctly, Generative AI is a Boon for Cybersecurity

Used Correctly, Generative AI is a Boon for Cybersecurity

August 12, 2023
0

Adobe stock, by Busra At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023
Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

September 21, 2023

Recent Posts

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

September 21, 2023
EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

EBANX Furthers Expansion into Africa; Adding 8 new Countries to its Ecosystem

September 21, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved