Thursday, August 11, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Cyberespionage Group Targeting M&A, Corporate Transactions Personnel

Researcher by Researcher
May 3, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Security researchers at Mandiant are documenting the discovery of a new hacking group focused on cyberespionage targeting employees responsible for corporate development, large corporate transactions, and mergers and acquisitions.

Referred to as UNC3524 – Mandiant uses ‘UNC’ to track uncategorized hacking groups – the threat actor does not appear interested in immediate financial gain, given that it manages to remain undetected for an order of magnitude longer than the average dwell time of 21 days in 2021.

Related articles

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022

Mandiant said the group managed to stay under the radar partly through the use of backdoors installed on appliances that do not support security tools, but also displays a high level of operational security and evasive skills.

The group has a small malware footprint, has built a large Internet of Things (IoT) botnet, and shows a focus on maintaining persistent access to the target environments by employing various mechanisms to immediately re-compromise a network after being booted, Mandiant said in a report.

After gaining initial access to a network, the group was observed installing a novel backdoor called QUIETXIT that was built on open-source Dropbear SSH client-server software – on appliances running older BSD or CentOS iterations.  This has allowed the malicious file to remain undetected for more than 18 months.

[ READ: Mandiant: ttacker Dwell Times Down, But No Correlation to Breach Impact ]

“For their long-haul remote access, UNC3524 opted to deploy QUIETEXIT on opaque network appliances within the victim environment; think backdoors on SAN arrays, load balancers, and wireless access point controllers. These kinds of devices don’t support antivirus or endpoint detection and response tools (EDRs), subsequently leaving the underlying operating systems to vendors to manage,” Mandiant added.

The researchers found that QUIETEXIT was designed in such a manner that it reverses the traditional client-server roles in an SSH connection: the client running on the infected system establishes a TCP connection and then performs the SSH server role.

“The QUIETEXIT component running on the threat actor’s infrastructure initiates the SSH connection and sends a password. Once the backdoor establishes a connection, the threat actor can use any of the options available to an SSH client, including proxying traffic via SOCKS,” Mandiant said.

While QUIETEXIT has no persistence mechanism, UNC3524 would install a run command or hijack legitimate startup scripts to ensure the backdoor runs at system startup.

According to Mandiant, the observed QUIETEXIT command and control (C&C) servers use dynamic DNS providers, which allows the adversary to update the DNS records almost seamlessly.

In some instances, the threat actor deployed a secondary backdoor called REGEORG, a web shell designed to create a SOCKS proxy.  Mandiant said the web shell was deployed on severs that had internet access in a manner that it would blend with legitimate applications (using specific names and even employing timestomping to match its timestamp with that of other files).

“UNC3452 only used these web shells when their QUIETEXIT backdoors stopped functioning and only to re-establish QUIETEXIT on another system in the network. UNC3452 used a still public but little-known version of the web shell that is heavily obfuscated. This allowed them to bypass common signature-based detections for REGEORG,” according to the Mandiant report.

To keep the malware footprint low, the attackers relied on built-in Windows protocols. Lateral movement was obtained through a customized version of Impacket’s WMIEXEC tool, which employs Windows Management Instrumentation to create a semi-interactive shell.

UNC3524 was observed employing privileged credentials to access the victim’s mail environment and target the mailboxes of executive teams and personnel in departments such as corporate development, IT security, or mergers and acquisitions.

The threat actor then moved to extract specific emails from the victim mailboxes, after getting a better understanding of those mailboxes – specifically, items created after the threat actor last accessed the mailbox were targeted for exfiltration.

Related: Chinese Cyberspies Seen Using macOS Variant of ‘Gimmick’ Malware

Related: FamousSparrow Cyberspies Exploit ProxyLogon in Attacks on Governments, Hotels

Related: Cyberespionage Implant Delivered via Targeted Government DNS Hijacking

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:
Tags:



Source link

Tags: corporatecyberespionageGroupPersonnelTargetingtransactions
Share76Tweet47

Related Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
0

“This is something we’re seeing affecting more and more organizations, and it’s likely due to an increasingly crowded market for...

High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
0

Flashpoint is warning organizations of two newly identified critical vulnerabilities in NetModule Router Software (NRSW) that could be exploited in...

Top 5 best backup practices

Top 5 best backup practices

August 10, 2022
0

Give yourself peace of mind by implementing a new backup strategy with our tips. Image: apinan/Adobe Stock You know that...

NVIDIA Fixes High-Severity Flaws in Graphics Drivers For Windows, Linux

Microsoft Fixes Known, Exploited Flaw in Windows Diagnostic Tool

August 10, 2022
0

Microsoft said it fixed a variant of a publicly known vulnerability that was first reported to the company in 2019....

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022
Makulu Linux Shift makes shifting between desktop layouts easy

Makulu Linux Shift makes shifting between desktop layouts easy

August 10, 2022

Recent Posts

U.S. Gov Offers $5M Reward For North Korean Cybercrime Intel

How Three Ransomware Groups Targeted One Vulnerable Network

August 11, 2022
High-Severity Flaw in Argo CD is Information Leak Risk

Organizations Warned of Critical Vulnerabilities in NetModule Routers

August 11, 2022
Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

Join the SD-WAN webinar: How to Extend Network Visibility and Optimize the SaaS Experience

August 11, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp security Software TFT Threat Top vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved