Enhanced Monitoring to Detect APT Activity Targeting Outlook Online


SUMMARY

In June 2023, a Federal Civilian Executive Branch (FCEB) agency identified suspicious activity in their Microsoft 365 (M365) cloud environment. The agency reported the activity to Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA), and Microsoft determined that advanced persistent threat (APT) actors accessed and exfiltrated unclassified Exchange Online Outlook data.

CISA and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory to provide guidance to critical infrastructure organizations on enhancing monitoring of Microsoft Exchange Online environments. Organizations can enhance their cyber posture and position themselves to detect similar malicious activity by implementing logging recommendations in this advisory. Organizations that identify suspicious, anomalous activity should contact Microsoft for proceeding with mitigation actions due to the cloud-based infrastructure affected, as well as report to CISA and the FBI.

Download the PDF version of this report:

TECHNICAL DETAILS

In Mid-June 2023, an FCEB agency observed MailItemsAccessed events with an unexpected ClientAppID and AppID in M365 Audit Logs. The MailItemsAccessed event is generated when licensed users access items in Exchange Online mailboxes using any connectivity protocol from any client. The FCEB agency deemed this activity suspicious because the observed AppId did not normally access mailbox items in their environment. The agency reported the activity to Microsoft and CISA.

Microsoft determined that APT actors accessed and exfiltrated unclassified Exchange Online Outlook data from a small number of accounts. The APT actors used a Microsoft account (MSA) consumer key to forge tokens to impersonate consumer and enterprise users. Microsoft remediated the issue by first blocking tokens issued with the acquired key and then replacing the key to prevent continued misuse.[1]

The affected FCEB agency identified suspicious activity by leveraging enhanced logging—specifically of MailItemsAccessed events—and an established baseline of normal Outlook activity (e.g., expected AppID). The MailItemsAccessed event enables detection of otherwise difficult to detect adversarial activity.

CISA and FBI are not aware of other audit logs or events that would have detected this activity. Critical infrastructure organizations are strongly urged to implement the logging recommendations in this advisory to enhance their cybersecurity posture and position themselves to detect similar malicious activity.

LOGGING

CISA and the FBI strongly encourage critical infrastructure organizations to ensure audit logging is enabled. Note: Per CISA’s Microsoft Exchange Online Microsoft 365 Minimum Viable Secure Configuration Baselines, FCEB agencies shall enable audit logging. These minimum viable secure configuration baselines are part of CISA’s Secure Cloud Business Applications (SCuBA) Project, which provides guidance for FCEB agencies securing their cloud business application environments and protecting federal information created, accessed, shared, and stored in those environments. Although tailored to FCEB agencies, the project provides security guidance applicable to all organizations with cloud environments. The Office of Management and Budget (OMB) M-21-31 requires Microsoft audit logs be retained for at least twelve months in active storage and an additional eighteen months in cold storage. This can be accomplished either by offloading the logs out of the cloud environment or natively through Microsoft by creating an audit log retention policy.

In addition to enabling audit logging, CISA and FBI strongly encourage organizations to:

  • Enable Purview Audit (Premium) logging. This logging requires licensing at the G5/E5 level. See Microsoft’s guidance on Assigning Microsoft 365 Licenses to Users for additional information.
  • Ensure logs are searchable by operators. The relevant logs need to be accessible to operational teams in a platform (e.g., security operations center [SOC] tooling) that enables hunting for this activity and distinguishing it from expected behavior within the environment.
  • Enable Microsoft 365 Unified Audit Logging (UAL). UAL should be enabled by default, but organizations are encouraged to validate these settings.
  • Understand your organization’s cloud baseline. Organizations are encouraged to look for outliers and become familiar with baseline patterns to better understand abnormal versus normal traffic.

GENERAL CLOUD MITIGATIONS

All mitigation actions for this activity are the responsibility of Microsoft due to the cloud-based infrastructure affected; however, CISA and the FBI recommend that critical infrastructure organizations implement the following to harden their cloud environments. Although, these mitigations will not prevent this or related activity where actors leverage compromised consumer keys, they will reduce the impact of less sophisticated malicious activity targeting cloud environments. Note: These mitigations align with CISA’s SCuBA Technical Reference Architecture (TRA), which describes essential components of security services and capabilities to secure and harden cloud business applications, including the platforms hosting the applications.

  • Apply CISA’s recommended baseline security configurations for Microsoft Defender for Office 365, Azure Active Directory, Exchange Online, OneDrive for Business, Power BI, Power Platform, SharePoint Online, and Teams [SCuBA TRA Section 6.6].
  • Separate administrator accounts from user accounts according to the National Institute of Standards and Technology’s (NIST’s) guidance, AC-5: Separation of Duties. Only allow designated administrator accounts to be used for administration purposes. If an individual user requires administrative rights over their workstation, use a separate account without administrative access to other hosts.
  • Collect and store access and security logs for secure cloud access (SCA) solutions, endpoint solutions, cloud applications/platforms and security services, such as firewalls, data loss prevention systems, and intrusion detection systems [SCuBA TRA Section 6.8.1].
  • Use a telemetry hosting solution (e.g., SIEM solution) that aggregates logs and telemetry data to facilitate internal organization monitoring, auditing, alerting, and threat detection activities [SCuBA TRA Section 6.8.1].
  • Review contractual relationships with all Cloud Service Providers (CSPs) and ensure contracts include:
    • Security controls the customer deems appropriate.
    • Appropriate monitoring and logging of provider-managed customer systems.
    • Appropriate monitoring of the service provider’s presence, activities, and connections to the customer network.
    • Notification of confirmed or suspected activity.

REPORTING SUSPICIOUS ACTIVITY

Organizations are encouraged to report suspicious activity to CISA via CISA’s 24/7 Operations Center ([email protected] or 888-282-0870). The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office or IC3.gov.

RESOURCES

REFERENCES

[1] Microsoft Security Response Center (MSRC) blog: Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email

ACKNOWLEDGEMENTS

Microsoft contributed to this CSA.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. The FBI, and CISA do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI and CISA.

Source…

Increased Truebot Activity Infects U.S. and Canada Based Networks


SUMMARY

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) are releasing this joint Cybersecurity Advisory (CSA) in response to cyber threat actors leveraging newly identified Truebot malware variants against organizations in the United States and Canada. As recently as May 31, 2023, the authoring organizations have observed an increase in cyber threat actors using new malware variants of Truebot (also known as Silence.Downloader). Truebot is a botnet that has been used by malicious cyber groups like CL0P Ransomware Gang to collect and exfiltrate information from its target victims.

Previous Truebot malware variants were primarily delivered by cyber threat actors via malicious phishing email attachments; however, newer versions allow cyber threat actors to also gain initial access through exploiting CVE-2022-31199—(a remote code execution vulnerability in the Netwrix Auditor application), enabling deployment of the malware at scale within the compromised environment. Based on confirmation from open-source reporting and analytical findings of Truebot variants, the authoring organizations assess cyber threat actors are leveraging both phishing campaigns with malicious redirect hyperlinks and CVE-2022-31199 to deliver new Truebot malware variants.

The authoring organizations recommend hunting for the malicious activity using the guidance outlined in this CSA, as well as applying vendor patches to Netwrix Auditor (version 10.5—see Mitigations section below).[1] Any organization identifying indicators of compromise (IOCs) within their environment should urgently apply the incident responses and mitigation measures detailed in this CSA and report the intrusion to CISA or the FBI.

Download the PDF version of this report:

Read the associated Malware Analysis Report MAR-10445155-1.v1 Truebot Activity Infects U.S. and Canada Based Networks or download the PDF version below:

For a downloadable copy of IOCs in .xml and .json format, see:

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See the MITRE ATT&CK Tactics and Techniques section below for cyber threat actors’ activity mapped to MITRE ATT&CK tactics and techniques.

Initial Access and Execution

In recent months, open source reporting has detailed an increase in Truebot malware infections, particularly cyber threat actors using new tactics, techniques, and procedures (TTPs), and delivery methods.[2] Based on the nature of observed Truebot operations, the primary objective of a Truebot infection is to exfiltrate sensitive data from the compromised host(s) for financial gain [TA0010].

  • Phishing:
    • Cyber threat actors have historically used malicious phishing emails as the primary delivery method of Truebot malware, which tricks recipients into clicking a hyperlink to execute malware. Cyber threat actors have further been observed concealing email attachments (executables) as software update notifications [T1189] that appear to be legitimate [T1204.002], [T1566.002]. Following interaction with the executable, users will be redirected to a malicious web domain where script files are then executed. Note: Truebot malware can be hidden within various, legitimate file formats that are used for malicious purposes [T1036.008].[3]
  • Exploitation of CVE-2022-31199:
    • Though phishing remains a prominent delivery method, cyber threat actors have shifted tactics, exploiting, in observable manner, a remote code execution vulnerability (CVE-2022-31199) in Netwrix Auditor [T1190]—software used for on-premises and cloud-based IT system auditing. Through exploitation of this CVE, cyber threat actors gain initial access, as well as the ability to move laterally within the compromised network [T1210].
Figure 1: CVE-2022-3199 Delivery Method for Truebot

Following the successful download of the malicous file, Truebot renames itself and then loads FlawedGrace onto the host. Please see the FlawedGrace section below for more information on how this remote access tool (RAT) is used in Truebot operations.

After deployment by Truebot, FlawedGrace is able to modify registry [T1112] and print spooler programs [T1547.012] that control the order that documents are loaded to a print queue. FlawedGrace manipulates these features to both escalate privilege and establish persistence.

During FlawedGrace’s execution phase, the RAT stores encrypted payloads [T1027.009] within the registry. The tool can create scheduled tasks and inject payloads into msiexec[.]exe and svchost[.]exe, which are command processes that enable FlawedGrace to establish a command and control (C2) connection to 92.118.36[.]199, for example, as well as load dynamic link libraries (DLLs) [T1055.001] to accomplish privilege escalation.

Several hours post initial access, Truebot has been observed injecting Cobalt Strike beacons into memory [T1055] in a dormant mode for the first few hours prior to initiating additional operations. Please see the Cobalt Strike section below for more information on how this remote access tool (RAT) is used in Truebot operations.

Discovery and Defense Evasion

During the first stage of Truebot’s execution process, it checks the current version of the operating system (OS) with RtlGetVersion and processor architecture using GetNativeSystemInfo [T1082].[4] Note: This variant of Truebot malware is designed with over one gigabyte (GB) of junk code which functions to hinder detection and analysis efforts [T1027.001].

Following the initial checks for system information, Truebot has the capability to enumerate all running processes [T1057], collect sensitive local host data [T1005], and send this data to an encoded data string described below for second-stage execution. Based on IOCs in table 1, Truebot also has the ability to discover software security protocols and system time metrics, which aids in defense evasion, as well as enables synchronization with the compromised system’s internal clock to facilitate scheduling tasks [T1518.001][T1124].

Next, it uses a .JSONIP extension, (e.g., IgtyXEQuCEvAM.JSONIP), to create a thirteen character globally unique identifier (GUID)—a 128-bit text string that Truebot uses to label and organize the data it collects [T1036].

After creating the GUID, Truebot compiles and enumerates running process data into either a base64 or unique hexadecimal encoded string [T1027.001]. Truebot’s main goal is identifying the presence of security debugger tools. However, the presence of identified debugger tools does not change Truebot’s execution process—the data is compiled into a base64 encoded string for tracking and defense evasion purposes [T1082][T1622].

Data Collection and Exfiltration

Following Truebot’s enumeration of running processes and tools, the affected system’s computer and domain name [T1082][T1016], along with the newly generated GUID, are sent to a hard-coded URL in a POST request (as observed in the user-agent string). Note: A user-agent string is a customized HTTP request that includes specific device information required for interaction with web content. In this instance, cyber threat actors can redirect victims to malicious domains and further establish a C2 connection.

The POST request functions as means for establishing a C2 connection for bi-lateral communication. With this established connection, Truebot uses a second obfuscated domain to receive additional payloads [T1105], self-replicate across the environment [T1570], and/or delete files used in its operations [T1070.004]. Truebot malware has the capability to download additional malicious modules [T1105], load shell code [T1620], and deploy various tools to stealthily navigate an infected network.

Associated Delivery Vectors and Tools

Truebot has been observed in association with the following delivery vectors and tools:

Raspberry Robin (Malware)

Raspberry Robin is a wormable malware with links to other malware families and various infection methods, including installation via USB drive [T1091].[5] Raspberry Robin has evolved into one of the largest malware distribution platforms and has been observed deploying Truebot, as well as other post-compromise payloads such as IcedID and Bumblebee malware.[6] With the recent shift in Truebot delivery methods from malicious emails to the exploitation of CVE-2022-31199, a large number of Raspberry Robin infections have leveraged this exploitable CVE.[2]

Flawed Grace (Malware)

FlawedGrace is a remote access tool (RAT) that can receive incoming commands [T1059] from a C2 server sent over a custom binary protocol [T1095] using port 443 to deploy additional tools [T1105].[7] Truebot malware has been observed leveraging (and dropping) FlawedGrace via phishing campaigns as an additional payload [T1566.002].[8] Note: FlawedGrace is typically deployed minutes after Truebot malware is executed.

Cobalt Strike (Tool)

Cobalt Strike is a popular remote access tool (RAT) that cyber threat actors have leveraged—in an observable manner—for a variety of post-exploitation means. Typically a few hours after Truebot’s execution phase, cyber threat actors have been observed deploying additional payloads containing Cobalt Strike beacons for persistence and data exfiltration purposes [T1059].[2] Cyber threat actors use Cobalt Strike to move laterally via remote service session hijacking [T1563.001][T1563.002], collecting valid credentials through LSASS memory credential dumping, or creating local admin accounts to achieve pass the hash alternate authentication [T1003.001][T1550.002].

Teleport (Tool)

Cyber threat actors have been observed using a custom data exfiltration tool, which Talos has named “Teleport.”[2] Teleport is known to evade detection during data exfiltration by using an encryption key hardcoded in the binary and a custom communication protocol [T1095] that encrypts data using advanced encryption standard (AES) and a hardcoded key [T1048][T1573.002]. Furthermore, to maintain its stealth, Teleport limits the data it collects and syncs with outbound organizational data/network traffic [T1029][T1030].

Truebot Malware Indicators of Compromise (IOCs)

Truebot IOCs from May 31, 2023, contain IOCs from cyber threat actors conducting Truebot malspam campaigns. Information is derived from a trusted third party, they observed cyber threat actors from 193.3.19[.]173 (Russia) using a compromised local account to conduct phishing campaigns on May 23, 2023 and spread malware through: https[:]//snowboardspecs[.]com/nae9v, which then promptly redirects the user to: https://www.meditimespharma[.]com/gfghthq/, which a trusted third party has linked to other trending Truebot activity.

After redirecting to https://www.meditimespharma[.]com/gfghthq/, trusted third parties have observed, the cyber threat actors using Truebot to pivot to https://corporacionhardsoft[.]com/images/2/Document_16654.exe, which is a domain associated with snowboardspecs[.]com. This malicious domain has been linked to UNC4509, a threat cluster that has been known to use traffic distribution systems (TDS) to redirect users to either a benign or malicious website to facilitate their malicious phishing campaigns in May 2023.

According to trusted third parties, the MD5 Hash: 6164e9d297d29aa8682971259da06848 is downloaded from https://corporacionhardsoft.com/images/2/Document_16654[.]exe, and has been flagged by numerous security vendors, as well as is linked to UNC4509 Truebot campaigns. Note: These IOCs are associated with Truebot campaigns used by Graceful Spider to deliver FlawedGrace and LummaStealer payloads in May of 2023.

After Truebot is downloaded, the malware copies itself to C:\Intel\RuntimeBroker.exe and—based on trusted third party analysis—links to https://essadonio.com/538332[.]php (which is linked to 45.182.189[.]71 (Panama) and is associated with other trending Truebot malware campaigns from May 2023).

Please reference table 1 for IOCs described in the paragraph above.

Table 1: Truebot IOCs from May of 2023    

Indicator Type

Indicator

Source

Registrant

GKG[.]NET Domain Proxy Service Administrator

Trusted Third Party

Compromised Account Created:

2022-04-10

Trusted Third Party

Malicious account created

1999-11-09

Trusted Third Party

IP

193.3.19[.]173 (Russia)

Trusted Third Party

URL

https://snowboardspecs[.]com/nae9v

Trusted Third Party

Domain

https://corporacionhardsoft[.]com/images/2/Document_16654.exe

Trusted Third Party

File

Document_16654[.]exe

Trusted Third Party

MD5 Hash

6164e9d297d29aa8682971259da06848

Trusted Third Party

File

Document_may_24_16654[.]exe

Trusted Third Party

File

C:\Intel\RuntimeBroker[.]exe

Trusted Third Party

URL

https://essadonio.com/538332[.]php

Trusted Third Party

IP

45.182.189[.]71 (Panama)

Trusted Third Party

Account Created

2023-05-18

Trusted Third Party

 

Table 2: Truebot malware IOCs from May of 2023    

Indicator Type

Indicator

Source

File Name

Secretsdump[.]py

Domain

Imsagentes[.]pe

URL

https://imsagentes[.]pe/dgrjfj/

URL

https://imsagentes[.]pe/dgrjfj

URL

https://hrcbishtek[.]com/{5

URL

https://ecorfan.org/base/sj/document_may_24_16654[.]exe

Domain

Hrcbishtek[.]com

MD5 Hash

F33734DFBBFF29F68BCDE052E523C287

MD5 Hash

F176BA63B4D68E576B5BA345BEC2C7B7

MD5 Hash

F14F2862EE2DF5D0F63A88B60C8EEE56

Domain

Essadonio[.]com

Domain

Ecorfan[.]org

SHA256 Hash

C92C158D7C37FEA795114FA6491FE5F145AD2F8C08776B18AE79DB811E8E36A3

File Name

Atexec[.]py

MD5 Hash

A0E9F5D64349FB13191BC781F81F42E1

IPv4

92.118.36[.]199

IPv4

81.19.135[.]30

MD5 Hash

72A589DA586844D7F0818CE684948EEA

SHA256 Hash

717BEEDCD2431785A0F59D194E47970E9544FBF398D462A305F6AD9A1B1100CB

IPv4

5.188.86[.]18

IPv4

5.188.206[.]78

IPv4

45.182.189[.]71

IPv4

139.60.160[.]166

SHA256 Hash

121A1F64FFF22C4BFCEF3F11A23956ED403CDEB9BDB803F9C42763087BD6D94E

 

Table 3: Truebot IOCs from May 2023 (Malicious Domains, and Associated IP addresses and URLs)    
Malicious Domain Associated IP(s) Beacon URL

nitutdra[.]com

46.161.40[.]128

 

romidonionhhgtt[.]com

46.161.40.128

 

midnigthwaall[.]com

46.161.40[.]128

 

dragonetzone[.]com

46.161.40[.]128

hxxps://dragonetzone[.]com/gate_info[.]php

rprotecruuio[.]com

45.182.189[.]71

 

essadonio[.]com

45.182.189[.]71

hxxps://nomoresense[.]com/checkinfo[.]php

nomoresense[.]com

45.182.189[.]91

hxxps://nomoresense[.]com/checkinfo[.]php

ronoliffuion[.]com

45.182.189[.]120

hxxps://ronoliffuion[.]com/dns[.]php

bluespiredice[.]com

45.182.189[.]119

 

dremmfyttrred[.]com

45.182.189[.]103

hxxps://dremmfyttrred[.]com/dns[.]php

ms-online-store[.]com

45.227.253[.]102

 

ber6vjyb[.]com

92.118.36[.]252

hxxps://ber6vjyb[.]com/dns[.]php

jirostrogud[.]com

88.214.27[.]101

hxxps://ber6vjyb[.]com/dns[.]php

fuanshizmo[.]com

45.182.189[.]229

 

qweastradoc[.]com

92.118.36[.]213

hxxp://nefosferta[.]com/gate[.]php

qweastradoc[.]com

92.118.36[.]213

hxxp://nefosferta[.]com/gate[.]php

qweastradoc[.]com

92.118.36[.]213

hxxp://nefosferta[.]com/gate[.]php

hiperfdhaus[.]com

88.214.27[.]100

hxxp://nefosferta[.]com/gate[.]php

guerdofest[.]com

45.182.189[.]228

hxxp://qweastradoc[.]com/gate[.]php

nefosferta[.]com

179.60.150[.]139

hxxp://nefosferta[.]com/gate[.]php

 

Table 4: Truebot IOCs from May 2023 Continued (Malicious Domains and Associated Hashes)      

 Malicious Domain

MD5

SHA1

SHA256

nitutdra[.]com

 

 

 

romidonionhhgtt[.]com

 

 

 

midnigthwaall[.]com

 

 

 

dragonetzone[.]com

64b27d2a6a55768506a5658a31c045de

c69f080180430ebf15f984be14fb4c76471cd476

e0178ab0893a4f25c68ded11e74ad90403443e413413501d138e0b08a910471e

rprotecruuio[.]com

 

 

 

essadonio[.]com

9a3bad7d8516216695887acc9668cda1

a89c097138e5aab1f35b9a03900600057d907690

4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

essadonio[.]com

6164e9d297d29aa8682971259da06848

96b95edc1a917912a3181d5105fd5bfad1344de0

717beedcd2431785a0f59d194e47970e9544fbf398d462a305f6ad9a1b1100cb

nomoresense[.]com

8f924f3cbe5d8fe3ecb7293478901f1a

516051b4cab1be74d32a6c446eabac7fc354904f

6b646641c823414c2ee30ae8b91be3421e4f13fa98e2d99272956e61eecfc5a1

nomoresense[.]com

ac6a2f1eafaae9f6598390d1017dd76c

1c637c2ded5d3a13fd9b56c35acf4443f308be52

f9f649cb5de27f720d58aa44aec6d0419e3e89f453730e155067506ad3ece638

ronoliffuion[.]com

881485ac77859cf5aaa8e0d64fbafc5f

51be660a3bdaab6843676e9d3b2af8444e88bbda

36d89f0455c95f9b00a8cea843003d0b53c4e33431fe57b5e6ec14a6c2e00e99

bluespiredice[.]com

 

 

 

dremmfyttrred[.]com

e4a42cbda39a20134d6edcf9f03c44ed

afda13d5365b290f7cdea701d00d05b0c60916f8

47f962063b42de277cd8d22550ae47b1787a39aa6f537c5408a59b5b76ed0464

dremmfyttrred[.]com

aa949d1a7ebe5f878023c6cfb446e29b

06057d773ad04fda177f6b0f6698ddaa47f7168a

594ade1fb42e93e64afc96f13824b3dbd942a2cdbc877a7006c248a38425bbc1

dremmfyttrred[.]com

338476c2b0de4ee2f3e402f3495d0578

03916123864aa034f7ca3b9d45b2e39b5c91c502

a67df0a8b32bdc5f9d224db118b3153f66518737e702314873b673c914b2bb5c

ms-online-store[.]com

 

 

 

ber6vjyb[.]com

46fe07c07fd0f45ba45240ef9aae2a44

b918f97c7c6ebc9594de3c8f2d9d75ecc292d02b

c0f8aeeb2d11c6e751ee87c40ee609aceb1c1036706a5af0d3d78738b6cc4125

jirostrogud[.]com

89c8afc5bbd34f160d8a2b7218b9ca4a

16ecf30ff8c7887037a17a3eaffcb17145b69160

5cc8c9f2c9cee543ebac306951e30e63eff3ee103c62dadcd2ce43ef68bc7487

jirostrogud[.]com

5da364a8efab6370a174736705645a52

792623e143ddd49c36f6868e948febb0c9e19cd3

80b9c5ec798e7bbd71bbdfffab11653f36a7a30e51de3a72c5213eafe65965d9

fuanshizmo[.]com

 

 

 

qweastradoc[.]com

ee1ccb6a0e38bf95e44b73c3c46268c5

62f5a16d1ef20064dd78f5d934c84d474aca8bbe

0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3

qweastradoc[.]com

82d4025b84cf569ec82d21918d641540

bb32c940f9ca06e7e8533b1d315545c3294ee1a0

c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c

qweastradoc[.]com

dbecfe9d5421d319534e0bfa5a6ac162

9e7a2464f53ce74d840eb84077472bc29fd1ba05

c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d

qweastradoc[.]com

b7fed593e8eb3646f876367b56725e6c

44090a7858eceb28bc111e1edd2f0dc98047afb2

ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885

hiperfdhaus[.]com

8e2b823aac6c9e11fcabecb1d8c19adf

77ad34334a370d85ca5e77436ed99f18b185eee3

a30e1f87b78d1cd529fbe2afdd679c8241d3baab175b2f083740263911a85304

hiperfdhaus[.]com

8a94163ddf956abd0ea92d89db0034e5

abc96032071adeb6217f0a5ba1aff55dc11f5438

b95a764820e918f42b664f3c9a96141e2d7d7d228da0edf151617fabdd9166cf

guerdofest[.]com

65fb9572171b903aa31a325f550d8778

d8bd44b7a8f136e29b31226f4edf566a4223266c

d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7

nefosferta[.]com

d9d85bdb6a3ac60a8ba6776c661dbace

78e38e522b1765efb15d0585e13c1f1301e90788

092910024190a2521f21658be849c4ac9ae6fa4d5f2ecd44c9055cc353a26875

nefosferta[.]com

20643549f19bed9a6853810262622755

c8227dcc1cd6ecc684de8c5ea9b16e3b35f613f1

1ef8cdbd3773bd82e5be25d4ba61e5e59371c6331726842107c0f1eb7d4d1f49

nefosferta[.]com

e9299fc9b7daa0742c28bfc4b03b7b25

77360abc473dc65c8bdd73b6459b9ea8fddb6f1d

22e3f4602a258e92a0b8deb5a2bd69c67f4ac3ca67362a745178848a9da7a3cc

nefosferta[.]com

775fb391db27e299af08933917a3acda

eaaa5e68956a3a3f6113e965199f479e10ae9956

2d50b03a92445ba53ae147d0b97c494858c86a56fe037c44bc0edabb902420f7

nefosferta[.]com

f4045710c99d347fe6dfa2c0fcadde29

b7bffdbbaf817d149bbd061070a2d171449afbfc

32ae88cddeeeec255d6d9c827f6bffc7a95e9ea7b83a84a79ff793735a4b4ed7

nefosferta[.]com

587acecdb9491e0897d1067eb02e7c8d

a9eb1ac4b85d17da3a2bae5835c7e862d481c189

55d1480cd023b74f10692c689b56e7fd6cc8139fb6322762181daead55a62b9e

nefosferta[.]com

0bae65245e5423147fce079de29b6136

f24232330e6f428bfbb6b9d8154db1c4046c2fc2

6210a9f5a5e1dc27e68ecd61c092d2667609e318a95b5dade3c28f5634a89727

nefosferta[.]com

5022a85b39a75ebe2bc0411d7b058b2e

a9040ac0e9f482454e040e2a7d874ddc50e6f6ce

68a86858b4638b43d63e8e2aaec15a9ebd8fc14d460dd74463db42e59c4c6f89

nefosferta[.]com

6a2f114a8995dbeb91f766ac2390086e

edac3cf9533b6f7102f6324fadb437a0814cc680

72813522a065e106ac10aa96e835c47aa9f34e981db20fa46a8f36c4543bb85d

nefosferta[.]com

e9115cc3280c16f9019e0054e059f4b8

dad01b0c745649c6c8b87dbeb7ab549ed039515d

7a64bc69b60e3cd3fd00d4424b411394465640f499e56563447fe70579ccdd00

nefosferta[.]com

b54cc9a3dd88e478ea601dfd5b36805e

318fdfec4575d1530a41c80274aa8caae7b7f631

7c607eca4005ba6415e09135ef38033bb0b0e0ff3e46d60253fc420af7519347

nefosferta[.]com

f129c12b1bda7426f6b31682b42ee4b0

5bb804153029c97fe23517ae5428a591c3c63f28

7c79ec3f5c1a280ffdf19d0000b4bfe458a3b9380c152c1e130a89de3fe04b63

nefosferta[.]com

f68aa4c92dd30bd5418f136aaf6c07d6

aa56f43e39d114235a6b1d5f66b593cc80325fa4

7e39dcd15307e7de862b9b42bf556f2836bf7916faab0604a052c82c19e306ca

nefosferta[.]com

acac995cee8a6a75fa79eb41bdffa53f

971a00a392b99f64a3886f40b6ef991e62f0fe2f

97bae3587f1d2fd35f24eb214b9dd6eed95744bed62468d998c7ef55ff8726d4

nefosferta[.]com

36057710279d9f0d023cb5613aa76d5e

e4dd1f8fc4e44c8fd0e25242d994c4b59eed6939

97d0844ce9928e32b11706e06bf2c4426204d998cb39964dd3c3de6c5223fff0

nefosferta[.]com

37e6904d84153d1435407f4669135134

1dcd85f7364ea06cd595a86e3e9be48995d596e9

bf3c7f0ba324c96c9a9bff6cf21650a4b78edbc0076c68a9a125ebcba0e523c9

nefosferta[.]com

4f3916e7714f2a32402c9d0b328a2c91

87a692e3592f7b997c7d962919e243b665f2be36

c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887

nefosferta[.]com

d9daaa0df32b0bb01a09e500fc7f5881

f9cb839adba612db5884e1378474996b4436c0cd

c3b3640ddf53b26f4ebd4eedf929540edb452c413ca54d0d21cc405c7263f490

nefosferta[.]com

c87fb9b9f6c343670bed605420583418

f05cf0b026b2716927dac8bcd26a2719ea328964

c6c4f690f0d15b96034b4258bdfaf797432a3ec4f73fbc920384d27903143cb0

nefosferta[.]com

2be64efd0fa7739123b26e4b70e53c5c

318fdfec4575d1530a41c80274aa8caae7b7f631

ed38c454575879c2546e5fccace0b16a701c403dfe3c3833730d23b32e41f2fe

 

Table 5: Truebot IOCs Connected to Russia, and Panama Locations      

 Malicious Domain

IP Addresses

Files

SHA256

Dremmfyttrred[.]com

 

 

 

 

45.182.189[.]103

 

 

 

94.142.138[.]61

 

 

 

172.64.155[.]188

 

 

 

104.18.32[.]68

 

 

 

 

Update[.]exe

 

 

 

Document_26_apr_2443807[.]exe

 

 

 

3ujwy2rz7v[.]exe

 

 

 

 

fe746402c74ac329231ae1b5dffa8229b509f4c15a0f5085617f14f0c1579040

droogggdhfhf[.]com

 

3LXJyA6Gf[.]exe

7d75244449fb5c25d8f196a43a6eb9e453652b2185392376e7d44c21bd8431e7

 

MITRE ATT&CK TACTICS AND TECHNIQUES

See Tables 6-16 for all referenced cyber threat actor tactics and techniques for enterprise environments in this advisory. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Table 6: Initial Access    

Technique Title

ID

Use

Replication Through Removable Media

T1091

Cyber threat actors use removable media drives to deploy Raspberry Robin malware.

Drive-by Compromise

T1189

Cyber threat actors embed malicious links or attachments within web domains to gain initial access.

Exploit Public-Facing Application

T1190

Cyber threat actors are exploiting Netwrix vulnerability CVE-2022-31199 for initial access with follow-on capabilities of lateral movement through remote code execution.

Phishing

T1566.002

Truebot actors can send spear phishing links to gain initial access.

 

Table 7: Execution    

Technique Title

ID

Use

Command and Scripting Interpreter

T1059

Cyber threat actors have been observed dropping cobalt strike beacons as a reverse shell proxy to create persistence within the compromised network.

Cyber threat actors use FlawedGrace to receive PowerShell commands over a C2 channel to deploy additional tools.

Shared Modules

T1129

Cyber threat actors can deploy malicious payloads through obfuscated share modules.

User Execution: Malicious Link

T1204.001

Cyber threat actors trick users into clicking a link by making them believe they need to perform a Google Chrome software update.

 

Table 8: Persistence    

Technique Title

ID

Use

Hijack Execution Flow: DLL Side-Loading

1574.002

Cyber threat actors use Raspberry Robin, among other toolsets to side-load DLLs to maintain persistence.

 

Table 9: Privilege Escalation    

Technique Title

ID

Use

Boot or Logon Autostart Execution: Print Processors

T1547.012

FlawedGrace malware manipulates print spooler functions to achieve privilege escalation.

 

Table 10: Defense Evasion    

Technique Title

ID

Use

Obfuscated Files or Information

T1027

Truebot uses a .JSONIP extension (e.g., IgtyXEQuCEvAM.JSONIP), to create a GUID.

Obfuscated Files or Information: Binary Padding

T1027.001

Cyber threat actors embed around one gigabyte of junk code within the malware string to evade detection protocols.

Masquerading: Masquerade File Type

T1036.008

Cyber threat actors hide Truebot malware as legitimate appearing file formats.

Process Injection

T1055

Truebot malware has the ability to load shell code after establishing a C2 connection.

Indicator Removal: File Deletion

T1070.004

Truebot malware implements self-deletion TTPs throughout its attack cycle to evade detection.

Teleport exfiltration tool deletes itself after it has completed exfiltrating data to the C2 station.

Modify Registry

T1112

FlawedGrace is able to modify registry programs that control the order that documents are loaded to a print que.

Reflective Code Loading

T1620

Truebot malware has the capability to load shell code and deploy various tools to stealthily navigate an infected network.

 

 

Table 11: Credential Access    

Technique Title

ID

Use

OS Credential Dumping: LSASS Memory

T1003.001

Cyber threat actors use cobalt strike to gain valid credentials through LSASS memory dumping.

 

Table 12: Discovery    

Technique Title

ID

Use

System Network Configuration Discovery

T1016

Truebot malware scans and enumerates the affected system’s domain names.

Process Discovery

T1057

Truebot malware enumerates all running processes on the local host.

System Information Discovery

T1082

Truebot malware scans and enumerates the OS version information, and processor architecture.

Truebot malware enumerates the affected system’s computer names.

System Time Discovery

T1124

Truebot has the ability to discover system time metrics, which aids in enables synchronization with the compromised system’s internal clock to facilitate scheduling tasks.

Software Discovery: Security Software Discovery

T1518.001

Truebot has the ability to discover software security protocols, which aids in defense evasion.

Debugger Evasion

T1622

Truebot malware scans the compromised environment for debugger tools and enumerates them in effort to evade network defenses.

 

Table 13: Lateral Movement    

Technique Title

ID

Use

Exploitation of Remote Services

T1210

Cyber threat actors exploit CVE-2022-31199 Netwrix Auditor vulnerability and use its capabilities to move laterally within a compromised network.

Use Alternate Authentication Material: Pass the Hash

T1550.002

Cyber threat actors use cobalt strike to authenticate valid accounts

Remote Service Session Hijacking

T1563.001

Cyber threat actors use cobalt strike to hijack remote sessions using SSH and RDP hijacking methods.

Remote Service Session Hijacking: RDP Hijacking

T1563.002

Cyber threat actors use cobalt strike to hijack remote sessions using SSH and RDP hijacking methods.

Lateral Tool Transfer

T1570

Cyber threat actors deploy additional payloads to transfer toolsets and move laterally.

 

Table 14: Collection    

Technique Title

ID

Use

Data from Local System

T1005

Truebot malware checks the current version of the OS and the processor architecture and compiles the information it receives.

Truebot gathers and compiles compromised system’s host and domain names.

Screen Capture

T1113

Truebot malware takes snapshots of local host data, specifically processor architecture data, and sends that to a phase 2 encoded data string.

 

Table 15: Command and Control    

Technique Title

ID

Use

Application Layer Protocol

T1071

Cyber threat actors use teleport exfiltration tool to blend exfiltrated data with network traffic.

Non-Application Protocol

T1095

Cyber threat actors use Teleport and FlawedGrace to send data over custom communication protocol.

Ingress Transfer Tool

T1105

Cyber threat actors deploy various ingress transfer tool payloads to move laterally and establish C2 connections.

Encrypted Channel: Asymmetric Cryptography

T1573.002

Cyber threat actors use Teleport to create an encrypted channel using AES.

 

Table 16: Exfiltration    

Technique Title

ID

Use

Scheduled Transfer

T1029

Teleport limits the data it collects and syncs with outbound organizational data/network traffic.

Data Transfer Size Limits

T1030

Teleport limits the data it collects and syncs with outbound organizational data/network traffic.

Exfiltration Over C2 Channel

T1048

Cyber threat actors blend exfiltrated data with network traffic to evade detection.

Cyber threat actors use the Teleport tool to exfiltrate data over a C2 protocol.

 

DETECTION METHODS

CISA and authoring organizations recommend that organizations review and implement the following detection signatures, along with: Win/malicious_confidence100% (W), Trojan:Win32/Tnega!MSR, and Trojan.Agent.Truebot.Gen, as well as YARA rules below to help detect Truebot malware.

Detection Signatures
Figure 2: Snort Signature to Detect Truebot Malware

alert tcp any any -> any any (msg:”TRUEBOT: Client HTTP Header”; sid:x; rev:1; flow:established,to_server; content:”Mozilla/112.0 (compatible|3b 20 4d 53 49 45 20 31 31 2e 30 3b 20 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 30 29|”; http_header; nocase; classtype:http-header; metadata:service http;)

 

YARA Rules

CISA developed the following YARA to aid in detecting the presence of Truebot Malware.

Figure 3: YARA Rule for Detecting Truebot Malware

rule CISA_10445155_01 : TRUEBOT downloader

{

meta:

Author = "CISA Code & Media Analysis"

Incident = "10445155"

Date = "2023-05-17"

Last_Modified = "20230523_1500"

Actor = "n/a"

Family = "TRUEBOT"

Capabilities = "n/a"

Malware_Type = "downloader"

Tool_Type = "n/a"

Description = "Detects TRUEBOT downloader samples"

SHA256 = "7d75244449fb5c25d8f196a43a6eb9e453652b2185392376e7d44c21bd8431e7"

strings:

$s1 = { 64 72 65 6d 6d 66 79 74 74 72 72 65 64 2e 63 6f 6d }

$s2 = { 4e 73 75 32 4f 64 69 77 6f 64 4f 73 32 }

$s3 = { 59 69 50 75 6d 79 62 6f 73 61 57 69 57 65 78 79 }

$s4 = { 72 65 70 6f 74 73 5f 65 72 72 6f 72 2e 74 78 74 }

$s5 = { 4c 6b 6a 64 73 6c 66 6a 33 32 6f 69 6a 72 66 65 77 67 77 2e 6d 70 34 }

$s6 = { 54 00 72 00 69 00 67 00 67 00 65 00 72 00 31 00 32 }

$s7 = { 54 00 55 00 72 00 66 00 57 00 65 00 73 00 54 00 69 00 66 00 73 00 66 }

condition:

5 of them

}

  • Additional YARA rules for detecting Truebot malware can be referenced from GitHub.[9]

INCIDENT RESPONSE

The following steps are recommended if organizations detect a Truebot malware infection and compromise:

  1. Quarantine or take offline potentially affected hosts.
  2. Collect and review artifacts such as running processes/services, unusual authentications, and recent network connections.
  3. Provision new account credentials.
  4. Reimage compromised host.
  5. Report the compromise to CISA via CISA’s 24/7 Operations Center ([email protected] or 888-282-0870) or contact your local FBI field office. State, local, tribal, or territorial government entities can also report to MS-ISAC ([email protected] or 866-787-4722).

MITIGATIONS

CISA and the authoring organizations recommend organizations implement the below mitigations, including mandating phishing-resistant multifactor authentication (MFA) for all staff and services.

For additional best practices, see CISA’s Cross-Sector Cybersecurity Performance Goals (CPGs). The CPGs, developed by CISA and the National Institute of Standards and Technology (NIST), are a prioritized subset of IT and OT security practices that can meaningfully reduce the likelihood and impact of known cyber risks and common TTPs. Because the CPGs are a subset of best practices, CISA and co-sealers recommend software manufacturers implement a comprehensive information security program based on a recognized framework, such as the NIST Cybersecurity Framework (CSF).

  • Apply patches to CVE-2022-31199
  • Update Netwrix Auditor to version 10.5

Netwrix recommends using their Auditor application only on internally facing networks. System owners that don’t follow this recommendation, and use the application in externally facing instances, are at increased risk to having CVE-2022-31199 exploited on their systems.

Reduce threat of malicious actors using remote access tools by:

  • Implementing application controls to manage and control execution of software, including allowlisting remote access programs.
    • Application controls should prevent installation and execution of portable versions of unauthorized remote access and other software. A properly configured application allowlisting solution will block any unlisted application execution. Allowlisting is important because antivirus solutions may fail to detect the execution of malicious portable executables when the files use any combination of compression, encryption, or obfuscation.

See the National Security Agency’s Cybersecurity Information sheet, Enforce Signed Software Execution Policies, and additional guidance below:

  • Strictly limit the use of RDP and other remote desktop services. If RDP is necessary, rigorously apply best practices, for example [CPG 2.W]:
    • Audit the network for systems using RDP.
    • Close unused RDP ports.
    • Enforce account lockouts after a specified number of attempts.
    • Apply phishing-resistant multifactor authentication (MFA).
    • Log RDP login attempts.
  • Disable command-line and scripting activities and permissions [CPG 2.N].
  • Restrict the use of PowerShell by using Group Policy, and only grant to specific users on a case-by-case basis. Typically, only those users or administrators who manage the network or Windows operating systems (OSs) should be permitted to use PowerShell [CPG 2.E].
  • Update Windows PowerShell or PowerShell Core to the latest version and uninstall all earlier PowerShell versions. Logs from Windows PowerShell prior to version 5.0 are either non-existent or do not record enough detail to aid in enterprise monitoring and incident response activities [CPG 1.E, 2.S, 2.T].
  • Enable enhanced PowerShell logging [CPG 2.T, 2.U].
    • PowerShell logs contain valuable data, including historical OS and registry interaction and possible IOCs of a cyber threat actor’s PowerShell use.
    • Ensure PowerShell instances, using the latest version, have module, script block, and transcription logging enabled (enhanced logging).
    • The two logs that record PowerShell activity are the PowerShell Windows Event Log and the PowerShell Operational Log. The authoring organizations recommend turning on these two Windows Event Logs with a retention period of at least 180 days. These logs should be checked on a regular basis to confirm whether the log data has been deleted or logging has been turned off. Set the storage size permitted for both logs to as large as possible.
  • Configure the Windows Registry to require User Account Control (UAC) approval for any PsExec operations requiring administrator privileges to reduce the risk of lateral movement by PsExec.
  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 4.C].
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege (PoLP) [CPG 2.E].
  • Reduce the threat of credential compromise via the following:
    • Place domain admin accounts in the protected users’ group to prevent caching of password hashes locally.
    • Implement Credential Guard for Windows 10 and Server 2016 (Refer to Microsoft: Manage Windows Defender Credential Guard for more information). For Windows Server 2012R2, enable Protected Process Light for Local Security Authority (LSA).
    • Refrain from storing plaintext credentials in scripts.
  • Implement time-based access for accounts set at the admin level and higher [CPG 2.A, 2.E]. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory (AD) level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.

In addition, CISA, FBI, MS-ISAC, and CCCS recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:

  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).
  • Maintain offline backups of data and regularly maintain backup and restoration (daily or weekly at minimum). By instituting this practice, an organization minimizes the impact of disruption to business practices as they can retrieve their data [CPG 2.R]. 
  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
    • Use longer passwords consisting of at least 15 characters [CPG 2.B].
    • Store passwords in hashed format using industry-recognized password managers.
    • Add password user “salts” to shared login credentials.
    • Avoid reusing passwords [CPG 2.C].
    • Implement multiple failed login attempt account lockouts [CPG 2.G].
    • Disable password “hints.”
    • Refrain from requiring password changes more frequently than once per year.
      Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software.
  • Require phishing-resistant multifactor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems [CPG 2.H].
  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Organizations should patch vulnerable software and hardware systems within 24 to 48 hours of vulnerability disclosure. Prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to various subnetworks, restricting further lateral movement [CPG 2.F].
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections, as they have insight into common and uncommon network connections for each host [CPG 3.A].
  • Install, regularly update, and enable real time detection for antivirus software on all hosts.
  • Disable unused ports [CPG 2.V].
  • Consider adding an email banner to emails received from outside your organization [CPG 2.M].
  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.K, 2.L, 2.R].

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, CISA recommends exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA recommends testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Tables 5-13).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

CISA recommends continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

RESOURCES

REFERENCES

[1] Bishop Fox: Netwrix Auditor Advisory
[2] Talos Intelligence: Breaking the Silence – Recent Truebot Activity
[3] The DFIR Report: Truebot Deploys Cobalt Strike and FlawedGrace
[4] MAR-10445155-1.v1 .CLEAR Truebot Activity Infects U.S. and Canada Based Networks
[5] Red Canary: Raspberry Robin Delivery Vector
[6] Microsoft: Raspberry Robin Worm Part of a Larger Ecosystem Pre-Ransomware Activity
[7] Telsy: FlawedGrace RAT
[8] VMware Security Blog: Carbon Black’s Truebot Detection
[9] GitHub: DFIR Report – Truebot Malware YARA Rule

Additional Sources

Alarming Surge in TrueBot Activity Revealed with New Delivery Vectors (thehackernews.com)
Truebot Analysis Part 1
Truebot Analysis Part 2
Truebot Analysis Part 3
Truebot Exploits Netwrix Vulnerability
TrueBot malware delivery evolves, now infects businesses in the US and elsewhere 
Malpedia-Silence Downloader
Printer spooling: what is it and how to fix it? | PaperCut

ACKNOWLEDGEMENTS

VMware Carbon Black and Mandiant contributed to this CSA.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. CISA and authoring agencies do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA, and co-sealers.

Source…

Understanding Ransomware Threat Actors: LockBit


SUMMARY

In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. LockBit ransomware operation functions as a Ransomware-as-a-Service (RaaS) model where affiliates are recruited to conduct ransomware attacks using LockBit ransomware tools and infrastructure. Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs). This variance in observed ransomware TTPs presents a notable challenge for organizations working to maintain network security and protect against a ransomware threat.

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation. 

  • Australian Cyber Security Centre (ACSC)
  • Canadian Centre for Cyber Security (CCCS)
  • United Kingdom’s National Cyber Security Centre (NCSC-UK)
  • National Cybersecurity Agency of France (ANSSI)
  • Germany’s Federal Office for Information Security (BSI)
  • New Zealand’s Computer Emergency Response Team (CERT NZ) and National Cyber Security Centre (NCSC NZ) 

The authoring organizations encourage the implementation of the recommendations found in this CSA to reduce the likelihood and impact of future ransomware incidents.

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13.1. See the MITRE ATT&CK Tactics and Techniques section for tables of LockBit’s activity mapped to MITRE ATT&CK® tactics and techniques.

Introduction

The LockBit RaaS and its affiliates have negatively impacted organizations, both large and small, across the world. In 2022, LockBit was the most active global ransomware group and RaaS provider in terms of the number of victims claimed on their data leak site. [1] A RaaS cybercrime group maintains the functionality of a particular ransomware variant, sells access to that ransomware variant to individuals or groups of operators (often referred to as “affiliates”), and supports affiliates’ deployment of their ransomware in exchange for upfront payment, subscription fees, a cut of profits, or a combination of upfront payment, subscription fees, and a cut of profits. Some of the methods LockBit has used to successfully attract affiliates include, but are not limited to:

  • Assuring payment by allowing affiliates to receive ransom payments before sending a cut to the core group; this practice stands in stark contrast to other RaaS groups who pay themselves first and then disburse the affiliates’ cut.
  • Disparaging other RaaS groups in online forums.
  • Engaging in publicity-generating activities stunts, such as paying people to get LockBit tattoos and putting a $1 million bounty on information related to the real-world identity of LockBit’s lead who goes by the persona “LockBitSupp.”
  • Developing and maintaining a simplified, point-and-click interface for its ransomware, making it accessible to those with a lower degree of technical skill. [2, 3]

LockBit has been successful through innovation and ongoing development of the group’s administrative panel and the RaaS supporting functions. In parallel, affiliates that work with LockBit and other notable variants are constantly revising the TTPs used for deploying and executing ransomware.

Table 1 shows LockBit RaaS’s innovation and development.

Table 1: Evolution of LockBit RaaS

Date

Event

September 2019

First observed activity of ABCD ransomware, the predecessor to LockBit. [4]

January 2020

LockBit-named ransomware first seen on Russian-language based cybercrime forums.

June 2021

Appearance of LockBit version 2 (LockBit 2.0), also known as LockBit Red including StealBit, a built-in information-stealing tool.

October 2021

Introduction of LockBit Linux-ESXi Locker version 1.0 expanding capabilities to target systems to Linux and VMware ESXi. [5]

March 2022

Emergence of LockBit 3.0, also known as LockBit Black, that shares similarities with BlackMatter and Alphv (also known as BlackCat) ransomware.

September 2022

Non-LockBit affiliates able to use LockBit 3.0 after its builder was leaked. [2, 6]

January 2023

Arrival of LockBit Green incorporating source code from Conti ransomware. [7]

April 2023

LockBit ransomware encryptors targeting macOS seen on VirusTotal [8, 9]

LockBit 2.0, LockBit 3.0, LockBit Green, and LockBit Linux-ESXi Locker are still available for affiliates’ use on LockBit’s panel.

LockBit Statistics

Percentage of ransomware incidents attributed to LockBit:
  • Australia: From April 1, 2022, to March 31, 2023, LockBit made up 18% of total reported Australian ransomware incidents. This figure includes all variants of LockBit ransomware, not solely LockBit 3.0.
  • Canada: In 2022, LockBit was responsible for 22% of attributed ransomware incidents in Canada.[10]
  • New Zealand: In 2022, CERT NZ received 15 reports of LockBit ransomware, representing 23% of 2022 ransomware reports.
  • United States: In 2022, 16% of the State, Local, Tribal, and Tribunal (SLTT) government ransomware incidents reported to the MS-ISAC were identified as LockBit attacks. This included ransomware incidents impacting municipal governments, county governments, public higher education and K-12 schools, and emergency services (e.g., law enforcement).
Number of LockBit ransomware attacks in the U.S. since 2020:
  • About 1,700 attacks according to the FBI.
Total of U.S. ransoms paid to LockBit:
  • Approximately $91M since LockBit activity was first observed in the U.S. on January 5, 2020.
Earliest observed LockBit activity:
  • Australia: The earliest documented occurrence of LockBit 3.0 was in early August 2022.
  • Canada: The first recorded instance of LockBit activity in Canada was in March 2020.
  • New Zealand: The first recorded incident involving LockBit ransomware was in March 2021.
  • United States: LockBit activity was first observed on January 5, 2020.
Most recently observed LockBit activity:
  • Australia: April 21, 2023.
  • New Zealand: February 2023.
  • United States: As recently as May 25, 2023.
Operational activity related to LockBit in France

Since the first case in July 2020 to present, ANSSI has handled 80 alerts linked to the LockBit ransomware, which accounts for 11% of all ransomware cases handled by ANSSI in that period. In about 13% of those cases, ANSSI was not able to confirm nor deny the breach of its constituents’ networks – as the alerts were related to the threat actor’s online claims. So far, 69 confirmed incidents have been handled by ANSSI. Table 2 shows the LockBit activity observed by ANSSI versus overall ransomware activity tracked by the Computer Emergency Response Team-France (CERT-FR).

Table 2: ANSSI-Observed LockBit vs. Overall Ransomware Activity

Year

Number of Incidents

Percentage of CERT-FR’s Ransomware-Related Activity

2020 (from July)

4

2%

2021

20

10%

2022

30

27%

2023

15

27%

Total (2020-2023)

69

11%

Table 3 shows the number of instances different LockBit strains were observed by ANSSI from July 2020 to present.

Table 3: ANSSI-Observed LockBit Strain and Number of Instances

Name of the Strain*

Number of Instances

LockBit 2.0 (LockBit Red)

26

LockBit 3.0 (LockBit Black)

23

LockBit

21

LockBit Green

1

LockBit (pre-encryption)

1

Total

72**

* Name either obtained from ANSSI’s or the victim’s investigations
** Includes incidents with multiple strains

Figure 1: ANSSI-Observed LockBit Strains by Year

From the incidents handled, ANSSI can infer that LockBit 3.0 widely took over from LockBit 2.0 and the original LockBit strain from 2022. In two cases, victims were infected with as many as three different strains of LockBit (LockBit 2.0/Red, LockBit 3.0/Black, and LockBit Green).

Leak Sites

The authoring agencies observe data leak sites, where attackers publish the names and captured data of victims if they do not pay ransom or hush money. Additionally, these sites can be used to record alleged victims who have been threatened with a data leak. The term ‘victims’ may include those who have been attacked, or those who have been threatened or blackmailed (with the attack having taken place).

The leak sites only show the portion of LockBit affiliates’ victims subjected to secondary extortion. Since 2021, LockBit affiliates have employed double extortion by first encrypting victim data and then exfiltrating that data while threatening to post that stolen data on leak sites. Because LockBit only reveals the names and leaked data of victims who refuse to pay the primary ransom to decrypt their data, some LockBit victims may never be named or have their exfiltrated data posted on leak sites. As a result, the leak sites reveal a portion of LockBit affiliates’ total victims. For these reasons, the leak sites are not a reliable indicator of when LockBit ransomware attacks occurred. The date of data publication on the leak sites may be months after LockBit affiliates actually executed ransomware attacks.

Up to the Q1 2023, a total of 1,653 alleged victims were observed on LockBit leak sites. With the introduction of LockBit 2.0 and LockBit 3.0, the leak sites have changed, with some sources choosing to differentiate leak sites by LockBit versions and others ignoring any differentiation. Over time, and through different evolutions of LockBit, the address and layout of LockBit leak sites have changed and are aggregated under the common denominator of the LockBit name. The introduction of LockBit 2.0 at the end of the Q2 2021 had an immediate impact on the cybercriminal market due to multiple RaaS operations shutting down in May and June 2021 (e.g., DarkSide and Avaddon). LockBit competed with other RaaS operations, like Hive RaaS, to fill the gap in the cybercriminal market leading to an influx of LockBit affiliates. Figure 2 shows the alleged number of victims worldwide on LockBit leak sites starting in Q3 2020. Figure 2 shows the alleged number of victims worldwide on LockBit leak sites starting in Q3 2020.

Figure 2: Alleged Number of Victims Worldwide on LockBit Leak Sites

Tools

During their intrusions, LockBit affiliates have been observed using various freeware and open-source tools that are intended for legal use. When repurposed by LockBit, these tools are then used for a range of malicious cyber activity, such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration. Use of PowerShell and batch scripts are observed across most intrusions, which focus on system discovery, reconnaissance, password/credential hunting, and privilege escalation. Artifacts of professional penetration-testing tools such as Metasploit and Cobalt Strike have also been observed.

Table 4 shows a list of legitimate freeware and open-source tools LockBit affiliates have repurposed for ransomware operations. The legitimate freeware and open-source tools mentioned in this product are all publicly available and legal. The use of these tools by a threat actor should not be attributed to the freeware and open-source tools, absent specific articulable facts tending to show they are used at the direction or under the control of a threat actor.

Table 4: Freeware and Open-Source Tools Used by LockBit Affiliates

Tool

Intended Use

Repurposed Use by LockBit Affiliates

MITRE ATT&CK ID

7-zip

Compresses files into an archive.

Compresses data to avoid detection before exfiltration.

T1562

Impair Defenses

AdFind

Searches Active Directory (AD) and gathers information.

Gathers AD information used to exploit a victim’s network, escalate privileges, and facilitate lateral movement.

S0552

AdFind

Advanced Internet Protocol (IP) Scanner

Performs network scans and shows network devices.

Maps a victim’s network to identify potential access vectors.

T1046

Network Service Discovery

Advanced Port Scanner

Performs network scans.

Finds open Transmission Control Protocol (TCP) and User Data Protocol (UDP) ports for exploitation.

T1046

Network Service Discovery

AdvancedRun

Allows software to be run with different settings.

Enables escalation of privileges by changing settings before running software.

TA0004

Privilege Escalation

AnyDesk

Enables remote connections to network devices.

Enables remote control of victim’s network devices.

T1219

Remote Access Software

Atera Remote Monitoring & Management (RMM)

Enables remote connections to network devices.

Enables remote control of victim’s network devices.

T1219

Remote Access Software

Backstab

Terminates antimalware-protected processes.

Terminates endpoint detection and response (EDR)- protected processes.

T1562.001

Impair Defenses: Disable or Modify Tools

Bat Armor

Generates .bat files using PowerShell scripts.

Bypasses PowerShell execution policy.

T1562.001

Impair Defenses: Disable or Modify Tools

Bloodhound

Performs reconnaissance of AD for attack path management.

Enables identification of AD relationships that can be exploited to gain access onto a victim’s network.

T1482

Domain Trust Discovery

Chocolatey

Handles command-line package management on Microsoft Windows.

Facilitates installation of LockBit affiliate actors’ tools.

T1072

Software Deployment Tools

Defender Control

Disables Microsoft Defender.

Enables LockBit affiliate actors to bypass Microsoft Defender.

T1562.001

Impair Defenses: Disable or Modify Tools

ExtPassword

Recovers passwords from Windows systems.

Obtains credentials for network access and exploitation.

T1003

Operating System (OS) Credential Dumping

FileZilla

Performs cross-platform File Transfer Protocol (FTP) to a site, server, or host.

Enables data exfiltration over FTP to the LockBit affiliate actors’ site, server, or host.

T1071.002

Application Layer Protocol: File Transfer Protocols

FreeFileSync

Facilitates cloud-based file synchronization.

Facilitates cloud-based file synchronization for data exfiltration.

T1567.002

Exfiltration Over Web Service: Exfiltration to Cloud Storage

GMER

Removes rootkits.

Terminates and removes EDR software.

T1562.001

Impair Defenses: Disable or Modify Tools

Impacket

Collection of Python classes for working with network protocols.

Enables lateral movement on a victim’s network.

S0357

Impacket

LaZagne

Recovers system passwords across multiple platforms.

Collect credentials for accessing a victim’s systems and network.

S0349

LaZagne

Ligolo

Establishes SOCKS5 or TCP tunnels from a reverse connection for pen testing.

Enables connections to systems within the victim’s network via reverse tunneling.

T1095

Non-Application Layer Protocol

LostMyPassword

Recovers passwords from Windows systems.

Obtains credentials for network access and exploitation.

T1003

OS Credential Dumping

MEGA Ltd MegaSync

Facilitates cloud-based file synchronization.

Facilitates cloud-based file synchronization for data exfiltration.

T1567.002

Exfiltration Over Web Service: Exfiltration to Cloud Storage

Microsoft Sysinternals ProcDump

Monitors applications for central processing unit (CPU) spikes and generates crash dumps during a spike.

Obtains credentials by dumping the contents of Local Security Authority Subsystem Service (LSASS).

T1003.001

OS Credential Dumping: LSASS Memory

Microsoft Sysinternals PsExec

Executes a command-line process on a remote machine.

Enables LockBit affiliate actors to control victim’s systems.

S0029

PsExec

Mimikatz

Extracts credentials from a system.

Extracts credentials from a system for gaining network access and exploiting systems.

S0002

Mimikatz

Ngrok

Enables remote access to a local web server by tunnelling over the internet.

Enables victim network protections to be bypassed by tunnelling to a system over the internet.

S0508

Ngrok

PasswordFox

Recovers passwords from Firefox Browser.

Obtains credentials for network access and exploitation.

T1555.003

Credentials from Web Browsers

PCHunter

Enables advanced task management including system processes and kernels.

Terminates and circumvents EDR processes and services.

T1562.001

Impair Defenses: Disable or Modify Tools

PowerTool

Removes rootkits, as well as detecting, analyzing, and fixing kernel structure modifications.

Terminates and removes EDR software.

T1562.001

Impair Defenses: Disable or Modify Tools

Process Hacker

Removes rootkits.

Terminates and removes EDR software.

T1562.001

Impair Defenses: Disable or Modify Tools

PuTTY Link (Plink)

Automates Secure Shell (SSH) actions on Windows.

Enables LockBit affiliate actors to avoid detection.

T1572

Protocol Tunneling

Rclone

Manages cloud storage files using a command-line program.

Facilitates data exfiltration over cloud storage.

S1040

Rclone

Seatbelt

Performs numerous security-oriented checks.

 

Performs numerous security-oriented checks to enumerate system information.

T1082

System Information Discovery

ScreenConnect (also known as ConnectWise)

Enables remote connections to network devices for management.

Enables LockBit affiliate actors to remotely connect to a victim’s systems.

T1219

Remote Access Software

SoftPerfect Network Scanner

Performs network scans for systems management.

Enables LockBit affiliate actors to obtain information about a victim’s systems and network.

T1046

Network Service Discovery

Splashtop

Enables remote connections to network devices for management.

Enables LockBit affiliate actors to remotely connect to systems over Remote Desktop Protocol (RDP).

T1021.001

Remote Services: Remote Desktop Protocol

TDSSKiller

Removes rootkits.

Terminates and removes EDR software.

T1562.001

Impair Defenses: Disable or Modify Tools

TeamViewer

Enables remote connections to network devices for management.

Enables LockBit affiliate actors to remotely connect to a victim’s systems.

T1219

Remote Access Software

ThunderShell

Facilitates remote access via Hypertext Transfer Protocol (HTTP) requests.

Enables LockBit affiliate actors to remotely access systems while encrypting network traffic.

T1071.001

Application Layer Protocol: Web Protocols

WinSCP

Facilitates file transfer using SSH File Transfer Protocol for Microsoft Windows.

Enables data exfiltration via the SSH File Transfer Protocol.

T1048

Exfiltration Over Alternative Protocol

Common Vulnerabilities and Exposures (CVEs) Exploited

Based on secondary sources, it was noted that affiliates exploit older vulnerabilities like CVE-2021-22986, F5 iControl REST unauthenticated Remote Code Execution Vulnerability, as well as newer vulnerabilities such as:

  • CVE-2023-0669: Fortra GoAnyhwere Managed File Transfer (MFT) Remote Code Execution Vulnerability
  • CVE-2023-27350: PaperCut MF/NG Improper Access Control Vulnerability

LockBit affiliates have been documented exploiting numerous CVEs, including:

For further information on these CVEs, see CISA’s Known Exploited Vulnerabilities (KEV) Catalog.

Post Detonation TTPs

When LockBit affiliates target an organization responsible for managing other organizations’ networks, CERT NZ has observed LockBit affiliates attempt secondary ransomware extortion after detonation of the LockBit variant on the primary target. Once the primary target is hit, LockBit affiliates then attempt to extort the companies that are customers of the primary target. This extortion is in the form of secondary ransomware that locks down services those customers consume. Additionally, the primary target’s customers may be extorted by LockBit affiliates threatening to release those customers’ sensitive information.

MITRE ATT&CK Tactics and Techniques

Tables 5-16 show the LockBit affiliate tactics and techniques referenced in this advisory.

Table 5: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Initial Access

Technique Title

ID

Use

Drive-by Compromise

T1189

LockBit affiliates gain access to a system through a user visiting a website over the normal course of browsing.

Exploit Public-Facing Application

T1190

LockBit affiliates may exploit vulnerabilities (e.g., Log4Shell) in internet-facing systems to gain access to victims’ systems.

External Remote Services

T1133

LockBit affiliates exploit RDP to gain access to victims’ networks.

Phishing

T1566

LockBit affiliates use phishing and spearphishing to gain access to victims’ networks.

Valid Accounts

T1078

LockBit affiliates obtain and abuse credentials of existing accounts as a means of gaining initial access.

Table 6: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Execution

Technique Title

ID

Use

Execution

TA0002

LockBit 3.0 launches commands during its execution.

Command and Scripting Interpreter: Windows Command Shell

T1059.003

LockBit affiliates use batch scripts to execute malicious commands.

Software Deployment Tools

T1072

LockBit affiliates may use Chocolatey, a command-line package manager for Windows.

 

 

Technique Title

ID

Use

System Services: Service Execution

T1569.002

LockBit 3.0 uses PsExec to execute commands or payloads.

Table 7: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Persistence

Technique Title

ID

Use

Boot or Logon Autostart Execution

T1547

LockBit affiliates enables automatic logon for persistence.

Valid Accounts

T1078

LockBit affiliates may use a compromised user account to maintain persistence on the target network.

Table 8: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Privilege Escalation

Technique Title

ID

Use

Privilege Escalation

TA0004

LockBit affiliates will attempt to escalate to the required privileges if current account privileges are insufficient.

Abuse Elevation Control Mechanism

T1548

LockBit affiliates may use ucmDccwCOM Method in UACMe, a GitHub collection of User Account Control (UAC) bypass techniques.

Boot or Logon Autostart Execution

T1547

LockBit affiliates enable automatic logon for privilege escalation.

Domain Policy Modification: Group Policy Modification

T1484.001

LockBit affiliates may create Group Policy for lateral movement and can force group policy updates. 

Valid Accounts

T1078

LockBit affiliates may use a compromised user account to escalate privileges on a victim’s network.

Table 9: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Defense Evasion

Technique Title

ID

Use

Execution Guardrails: Environmental Keying

T1480.001

LockBit 3.0 will only decrypt the main component or continue to decrypt and/or decompress data if the correct password is entered.

Impair Defenses: Disable or Modify Tools

T1562.001

LockBit 3.0 affiliates use Backstab, Defender Control, GMER, PCHunter, PowerTool, Process Hacker or TDSSKiller to disable EDR processes and services.

 

LockBit 3.0 affiliates use Bat Armor to bypass the PowerShell execution Policy.

 

LockBit affiliates may deploy a batch script, 123.bat, to disable and uninstall antivirus software.

 

Lockbit 3.0 may modify and/or disable security tools including EDR and antivirus to avoid possible detection of malware, tools, and activities.

Indicator Removal: Clear Windows Event Logs

T1070.001

 

LockBit executable clears the Windows Event Logs files.

Indicator Removal: File Deletion

T1070.004

LockBit 3.0 will delete itself from the disk.

Obfuscated Files or Information

T1027

LockBit 3.0 will send encrypted host and bot information to its command and control (C2) servers.

Obfuscated Files or Information: Software Packing

T1027.002

LockBit affiliates may perform software packing or virtual machine software protection to conceal their code. Blister Loader has been used for such purpose.

Table 10: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Credential Access

Technique Title

ID

Use

Brute Force

T1110

LockBit affiliates may leverage VPN or RDP brute force credentials as an initial access.

Credentials from Password Stores: Credentials from Web Browsers

T1555.003

LockBit 3.0 actors use PasswordFox to recover passwords from Firefox Browser.

OS Credential Dumping

T1003

LockBit 3.0 actors use ExtPassword or LostMyPassword to recover passwords from Windows systems.

OS Credential Dumping: LSASS Memory

T1003.001

LockBit affiliates may use Microsoft Sysinternals ProDump to dump the contents of lsass.exe.

LockBit affiliates have used Mimikatz to dump credentials.

Table 11: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Discovery

Technique Title

ID

Use

Network Service Discovery

T1046

LockBit affiliates use SoftPerfect Network Scanner, Advanced IP Scanner, or Advanced Port Scanner to scan target networks.

LockBit affiliates may use SoftPerfect Network Scanner, Advanced Port Scanner, and AdFind to enumerate connected machines in the network.

System Information Discovery

T1082

LockBit affiliates will enumerate system information to include hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices.

System Location Discovery: System Language Discovery

T1614.001

LockBit 3.0 will not infect machines with language settings that match a defined exclusion list.

Table 12: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Lateral Movement

Technique Title

ID

Use

Lateral Movement

TA0008

LockBit affiliates will laterally move across networks and access domain controllers.

Remote Services: Remote Desktop Protocol

T1021.001

LockBit affiliates use Splashtop remote-desktop software to facilitate lateral movement.

Remote Services: Server Message Block (SMB)/Admin Windows Shares

T1021.002

LockBit affiliates may use Cobalt Strike and target SMB shares for lateral movement.

Table 13: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Collection

Technique Title

ID

Use

Archive Collected Data: Archive via Utility

T1560.001

LockBit affiliates may use 7-zip to compress and/or encrypt collected data prior to exfiltration.

Table 14: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Command and Control

Technique Title

ID

Use

Application Layer Protocol: File Transfer Protocols

T1071.002

LockBit affiliates may use FileZilla for C2.

Application Layer Protocol: Web Protocols

T1071.001

LockBit affiliates use ThunderShell as a remote access tool that communicates via HTTP requests.

Non-Application Layer Protocol

T1095

LockBit affiliates use Ligolo to establish SOCKS5 or TCP tunnels from a reverse connection.

Protocol Tunneling

T1572

LockBit affiliates use Plink to automate SSH actions on Windows.

Remote Access Software T1219 LockBit 3.0 actors use AnyDesk, Atera RMM, ScreenConnect or TeamViewer for C2.

Table 15: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Exfiltration

Technique Title

ID

Use

Exfiltration

TA0010

LockBit affiliates use StealBit, a custom exfiltration tool first used with LockBit 2.0, to steal data from a target network.

Exfiltration Over Web Service

T1567

LockBit affiliates use publicly available file sharing services to exfiltrate a target’s data. 

Exfiltration Over Web Service: Exfiltration to Cloud Storage

T1567.002

LockBit affiliates use (1) Rclone, an open-source command line cloud storage manager or FreeFileSync to exfiltrate and (2) MEGA, a publicly available file sharing service for data exfiltration.

Table 16: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Impact

Technique Title

ID

Use

Data Destruction T1485 LockBit 3.0 deletes log files and empties the recycle bin.
Data Encrypted for Impact T1486

LockBit 3.0 encrypts data on target systems to interrupt availability to system and network resources.

LockBit affiliates can encrypt Windows and Linux devices, as well as VMware instances. 

Defacement: Internal Defacement

T1491.001

LockBit 3.0 changes the host system’s wallpaper and icons to the LockBit 3.0 wallpaper and icons, respectively.

Inhibit System Recovery

T1490

LockBit 3.0 deletes volume shadow copies residing on disk.

Service Stop

T1489

LockBit 3.0 terminates processes and services.

Mitigations

The authoring organizations recommend implementing the mitigations listed below to improve their cybersecurity posture to better defend against LockBit’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

The listed mitigations are ordered by MITRE ATT&CK tactic. Mitigations that apply to multiple MITRE ATT&CK tactics are listed under the tactic that occurs earliest in an incident’s lifecycle. For example, account use polices are mitigations for initial access, persistence, privilege escalation, and credential access but would be listed under initial access mitigations.

Initial Access

  • Consider implementing sandboxed browsers to protect systems from malware originating from web browsing. Sandboxed browsers isolate the host machine from malicious code.
  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with NIST standards for developing and managing password policies [CPG 2.L].
    • Enforce use of longer passwords consisting of at least 15 characters in length [CPG 2.B, 2.C].
    • Store passwords in a salted and hashed format using industry-recognized password hashing algorithms.
    • Prevent use of commonly used or known-compromised passwords [CPG 2.C].
    • Implement multiple failed login attempt account lockouts [CPG 2.G].
    • Disable password “hints.”
    • Refrain from requiring password changes more frequently than once per year.
      Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software [CPG 2.Q].
  • Implement filters at the email gateway to filter out emails with known malicious indicators, such as known malicious subject lines, and block suspicious IP addresses at the firewall [CPG 2.M].
  • Install a web application firewall and configure with appropriate rules to protect enterprise assets.
  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement. Isolate web-facing applications to further minimize the spread of ransomware across a network [CPG 2.F].
  • Follow the least-privilege best practice by requiring administrators to use administrative accounts for managing systems and use simple user accounts for non-administrative tasks [CPG 2.E].
  • Enforce the management of and audit user accounts with administrative privileges. Configure access controls according to the principle of least privilege [CPG 2.E]. 
  • Implement time-based access for accounts set at the admin level and higher. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task.
  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Public-facing applications must be patched in a timely manner as vulnerabilities can often be exploited directly by the threat actor. By closely monitoring the threat landscape, threat actors often take advantage of vulnerabilities before systems are patched. Organizations should patch vulnerable software and hardware systems within 24 to 48 hours from when a vulnerability is disclosed. Prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
  • Restrict service accounts from remotely accessing other systems. Configure group policy to Deny log on locally, Deny log on through Terminal Services, and Deny access to this computer from the network for all service accounts to limit the ability for compromised service accounts to be used for lateral movement.
  • Block direct internet access for administration interfaces (e.g., application protocol interface (API)) and for remote access.
  • Require phishing-resistant multifactor authentication (MFA) for all services to the extent possible, particularly for webmail, virtual private networks, and privileged accounts that access critical systems [CPG 2.H].
  • Consolidate, monitor, and defend internet gateways.
  • Install, regularly update, and enable real-time detection for antivirus software on all hosts.
  • Raise awareness for phishing threats in your organization. Phishing is one of the primary infection vectors in ransomware campaigns, and all employees should receive practical training on the risks associated with the regular use of  email. With the rise of sophisticated phishing methods, such as using stolen email communication or artificial intelligence (AI) systems such as ChatGPT, the distinction between legitimate and malicious emails becomes more complex. This particularly applies to employees from corporate divisions that have to deal with a high volume of external email communication (e.g., staff recruitment) [CPG 2.I, 2.J].
  • Consider adding an external email warning banner for emails sent to or received from outside of your organization [CPG 2.M].
  • Review internet-facing services and disable any services that are no longer a business requirement to be exposed or restrict access to only those users with an explicit requirement to access services, such as SSL, VPN, or RDP. If internet-facing services must be used, control access by only allowing access from an admin IP range [CPG 2.X].
  •  Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
  • Regularly verify the security level of the Active Directory domain by checking for misconfigurations.

Execution

  • Develop and regularly update comprehensive network diagram(s) that describes systems and data flows within your organization’s network(s) [CPG 2.P].
  • Control and restrict network connections accordingly with a network flow matrix.
  • Enable enhanced PowerShell logging [CPG 2.T, 2.U].
    • PowerShell logs contain valuable data, including historical OS, registry interaction, and possibility of a threat actor’s PowerShell use.
    • Ensure PowerShell instances are configured to use the latest version, and have module, script block, and transcription logging enabled (enhanced logging).
    • The two logs that record PowerShell activity are the PowerShell Windows Event Log and the PowerShell Operational Log. It is recommended to turn on these two Windows Event Logs with a retention period of at least 180 days. These logs should be checked on a regular basis to confirm whether the log data has been deleted or logging has been turned off. Set the storage size permitted for both logs to as large as reasonably practical.
  • Configure the Windows Registry to require UAC approval for any PsExec operations requiring administrator privileges to reduce the risk of lateral movement by PsExec.

Privilege Escalation

  • Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally [CPG 2.N].
  • Enable Credential Guard to protect your Windows system credentials. This is enabled by default on Windows 11 Enterprise 22H2 and Windows 11 Education 22H2. Credential Guard prevents credential dumping techniques of the Local Security Authority (LSA) secrets. Be aware that enabling this security control has some downsides. In particular, you can no longer use New Technology Local Area Network (LAN) Manager (NTLM) classic authentication single sign-on, Kerberos unconstrained delegation, as well as Data Encryption Standard (DES) encryption.
  • Implement Local Administrator Password Solution (LAPS) where possible if your OS is older than Windows Server 2019 and Windows 10 as these versions do not have LAPS built in. NOTE: The authoring organizations recommend organizations upgrade to Windows Server 2019 and Windows 10 or greater.

Defense Evasion

  • Apply local security policies to control application execution (e.g., Software Restriction Policies (SRP), AppLocker, Windows Defender Application Control (WDAC)) with a strict allowlist.
  • Establish an application allowlist of approved software applications and binaries that are allowed to be executed on a system. This measure prevents unwanted software to be run. Usually, application allowlist software can also be used to define blocklists so that the execution of certain programs can be blocked, for example cmd.exe or PowerShell.exe [CPG 2.Q].

Credential Access

  • Restrict NTLM uses with security policies and firewalling.

Discovery

  • Disable unused ports. Disable ports that are not being used for business purposes (e.g., RDP-TCP Port 3389). Close unused RDP ports.

Lateral Movement

  • Identify Active Directory control paths and eliminate the most critical among them according to the business needs and assets.
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network [CPG 1.E]. EDR tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.

Command and Control

  • Implement a tiering model by creating trust zones dedicated to an organization’s most sensitive assets.
  • VPN access should not be considered as a trusted network zone. Organizations should instead consider moving to zero trust architectures.

Exfiltration

  • Block connections to known malicious systems by using a Transport Layer Security (TLS) Proxy. Malware often uses TLS to communicate with the infrastructure of the threat actor. By using feeds for known malicious systems, the establishment of a connection to a C2 server can be prevented.
  • Use web filtering or a Cloud Access Security Broker (CASB) to restrict or monitor access to public-file sharing services that may be used to exfiltrate data from a network.

Impact

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) [CPG 2.R].
  • Maintain offline backups of data, and regularly maintain backup and restoration (daily or weekly at the minimum). By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data [CPG 2.R]. ACSC recommends organizations follow the 3-2-1 backup strategy in which organizations have three copies of data (one copy of production data and two backup copies) on two different media, such as disk and tape, with one copy kept off-site for disaster recovery.
  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.K, 2.R].

Implement Mitigations for Defense-in-Depth

Implementing multiple mitigations within a defense-in-depth approach can help protect against ransomware, such as LockBit. CERT NZ explains How ransomware happens and how to stop it by applying mitigations, or critical controls, to provide a stronger defense to detect, prevent, and respond to ransomware before an organization’s data is encrypted. By understanding the most common attack vectors, organizations can identify gaps in network defenses and implement the mitigations noted in this advisory to harden organizations against ransomware attacks. In Figure 3, a ransomware attack is broken into three phases:

  • Initial Access where the cyber actor is looking for a way into a network.
  • Consolidation and Preparation when the actor is attempting to gain access to all devices.
  • Impact on Target where the actor is able to steal and encrypt data and then demand ransom.

Figure 3 shows the mitigations/critical controls, as various colored hexagons, working together to stop a ransomware attacker from accessing a network to steal and encrypt data. In the Initial Access phase, mitigations working together to deny an attacker network access include securing internet-exposed services, patching devices, implementing MFA, disabling macros, employing application allowlisting, and using logging and alerting. In the Consolidation and Preparation phase, mitigations working together to keep an attacker from accessing network devices are patching devices, using network segmentation, enforcing the principle of least privilege, implementing MFA, and using logging and alerting. Finally, in the Impact on Target phase, mitigations working together to deny or degrade an attacker’s ability to steal and/or encrypt data includes using logging and alerting, using and maintaining backups, and employing application allowlisting.

Critical Controls Key

Figure 3: Stopping Ransomware Using Layered Mitigations

Validate Security Controls

In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Tables 5-16).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

Resources

  • ACSC:
  • CISA:
  • CISA, NSA, FBI, and MS-ISAC:
    • See the #StopRansomware Guide developed through the Joint Ransomware Task Force (JRTF) to provide a one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover, including step-by-step approaches to address potential attacks.
  • FBI and CISA:
  • MS-ISAC:
  • NCSC-UK
  • BSI:
  • CCCS:
  • CERT NZ:
  • NCSC NZ:

Reporting

The authoring organizations do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the authoring organizations urge you to promptly report ransomware incidents to your country’s respective authorities.

  • Australia: Australian organizations that have been impacted or require assistance in regard to a ransomware incident can contact ACSC via 1300 CYBER1 (1300 292 371), or by submitting a report to cyber.gov.au.
  • Canada: Canadian victims of ransomware are encouraged to consider reporting cyber incidents to law enforcement (e.g., local police or the Canadian Anti-Fraud Centre) as well as to the Canadian Centre for Cyber Security online via My Cyber Portal.
  • France:
  • Germany: German victims of ransomware are encouraged to consider reporting cyber incidents to law enforcement (e.g., local police or the Central Contact Point for Cybercrime as well as to the Federal Office for Information Security (BSI) via the Reporting and Information Portal.
  • New Zealand: New Zealand organizations and businesses can report security incidents to the NCSC at [email protected] or call 04 498 7654, or to CERT NZ through https://www.cert.govt/nz/it-specialists/report-an-incident/ or to [email protected].
  • United States:
    • Report ransomware incidents to a local FBI Field Office or CISA’s 24/7 Operations Center at [email protected], cisa.gov/report, or (888) 282-0870. When available, please include the information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact.
    • For SLTTs, email [email protected] or call (866) 787-4722.
  • United Kingdom: UK organizations should report any suspected compromises to NCSC.

Disclaimer

The information in this report is being provided “as is” for informational purposes only. The authoring organizations do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring organizations.

References

[1] LockBit, BlackCat, and Royal Dominate the Ransomware Scene

[2] Ransomware Diaries: Volume 1

[3] What is LockBit ransomware and how does it operate?

[4] Ransomware Spotlight: LockBit

[5] Analysis and Impact of LockBit Ransomware’s First Linux and VMware ESXi Variant

[6] A first look at the builder for LockBit 3.0 Black

[7] LockBit ransomware gang releases LockBit Green version

[8] LockBit Ransomware Now Targeting Apple macOS Devices

[9] Apple’s Macs Have Long Escaped Ransomware. That May be Changing

[10] Intelligence agency says ransomware group with Russian ties poses ‘an enduring threat’ to Canada

Source…

#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability


SUMMARY

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

Actions to take today to mitigate cyber threats from CL0P ransomware: 

  • Take an inventory of assets and data, identifying authorized and unauthorized devices and software.
  • Grant admin privileges and access only when necessary, establishing a software allow list that only executes legitimate applications.
  • Monitor network ports, protocols, and services, activating security configurations on network infrastructure devices such as firewalls and routers.
  • Regularly patch and update software and applications to their latest versions, and conduct regular vulnerability assessments.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.

According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software’s managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conducted zero-day-exploit-driven campaigns against Accellion File Transfer Appliance (FTA) devices in 2020 and 2021, and Fortra/Linoma GoAnywhere MFT servers in early 2023.

FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of CL0P ransomware and other ransomware incidents.

Download the PDF version of this report:

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.

Appearing in February 2019, and evolving from the CryptoMix ransomware variant, CL0P was leveraged as a Ransomware as a Service (RaaS) in large-scale spear-phishing campaigns that used a verified and digitally signed binary to bypass system defenses. CL0P was previously known for its use of the “double extortion” tactic of stealing and encrypting victim data, refusing to restore victim access and publishing exfiltrated data on Tor via the CL0P^_-LEAKS website. In 2019, TA505 actors leveraged CL0P ransomware as the final payload of a phishing campaign involving a macro-enabled document that used a Get2 malware dropper for downloading SDBot and FlawedGrace. In recent campaigns beginning 2021, CL0P preferred to rely mostly on data exfiltration over encryption.

Beyond CL0P ransomware, TA505 is known for frequently changing malware and driving global trends in criminal malware distribution. Considered to be one of the largest phishing and malspam distributors worldwide, TA505 is estimated to have compromised more than 3,000 U.S.-based organizations and 8,000 global organizations.

TA505 has operated:

  • A RaaS and has acted as an affiliate of other RaaS operations,
  • As an initial access broker (IAB), selling access to compromised corporate networks,
  • As a customer of other IABs,
  • And as a large botnet operator specializing in financial fraud and phishing attacks.

In a campaign from 2020 to 2021, TA505 used several zero-day exploits to install a web shell named DEWMODE on internet-facing Accellion FTA servers. Similarly, the recent exploitation of MOVEit Transfer, a SQL injection vulnerability was used to install the web shell, which enabled TA505 to execute operating system commands on the infected server and steal data.

In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as CVE-2023-0669, to target the GoAnywhere MFT platform. The group claimed to have exfiltrated data from the GoAnywhere MFT platform that impacted approximately 130 victims over the course of 10 days. Lateral movement into the victim networks from the GoAnywhere MFT was not identified, suggesting the breach was limited to the GoAnywhere platform itself. Over the next several weeks, as the exfiltrated data was parsed by the group, ransom notes were sent to upper-level executives of the victim companies, likely identified through open source research. The ransom notes threatened to publish the stolen files on the CL0P data leak site if victims did not pay the ransom amount.

Figure 1: CL0P Ransom Note

Hello, this is the CL0P hacker group. As you may know, we recently carried out a hack, which was reported in the news on site [redacted].

We want to inform you that we have stolen important information from your GoAnywhere MFT resource and have attached a full list of files as evidence.

We deliberately did not disclose your organization and wanted to negotiate with you and your leadership first. If you ignore us, we will sell your information on the black market and publish it on our blog, which receives 30-50 thousand unique visitors per day. You can read about us on [redacted] by searching for CLOP hacker group.

You can contact us using the following contact information:

unlock@rsv-box[.]com

and

unlock@support-mult[.]com

CL0P’s toolkit contains several malware types to collect information, including the following:

  • FlawedAmmyy/FlawedGrace remote access trojan (RAT) collects information and attempts to communicate with the Command and Control (C2) server to enable the download of additional malware components [T1071], [T1105].
  • SDBot RAT propagates the infection, exploiting vulnerabilities and dropping copies of itself in removable drives and network shares [T1105]. It is also capable of propagating when shared though peer-to-peer (P2P) networks. SDBot is used as a backdoor [T1059.001] to enable other commands and functions to be executed in the compromised computer. This malware uses application shimming for persistence and to avoid detection [T1546.011].
  • Truebot is a first-stage downloader module that can collect system information and take screenshots [T1113], developed and attributed to the Silence hacking group. After connecting to the C2 infrastructure, Truebot can be instructed to load shell code [T1055] or DLLs [T1574.002], download additional modules [T1129], run them, or delete itself [T1070]. In the case of TA505, Truebot has been used to download FlawedGrace or Cobalt Strike beacons.
  • Cobalt Strike is used to expand network access after gaining access to the Active Directory (AD) server [T1018].
  • DEWMODE is a web shell written in PHP designed to target Accellion FTA devices and interact with the underlying MySQL database and is used to steal data from the compromised device [1505.003].
  • LEMURLOOT is a web shell written in C# designed to target the MOVEit Transfer platform. The web shell authenticates incoming http requests via a hard-coded password and can run commands that will download files from the MOVEit Transfer system, extract its Azure system settings, retrieve detailed record information, and create, insert, or delete a particular user. When responding to the request, the web shell returns data in a gzip compressed format.

CVE-2023-34362 MOVEIT TRANSFER VULNERABILITY

MOVEit is typically used to manage an organization’s file transfer operations and has a web application that supports MySQL, Microsoft SQL Server, and Azure SQL database engines. In May 2023, the CL0P ransomware group exploited a SQL injection zero-day vulnerability CVE-2023-34362 to install a web shell named LEMURLOOT on MOVEit Transfer web applications [T1190] [1]. The web shell was initially observed with the name human2.aspx in an effort to masquerade as the legitimate human.aspx file present as part of MOVEit Transfer software. Upon installation, the web shell creates a random 36 character password to be used for authentication. The web shell interacts with its operators by awaiting HTTP requests containing a header field named X-siLock-Comment, which must have a value assigned equal to the password established upon the installation of the web shell. After authenticating with the web shell, operators pass commands to the web shell that can:

  • Retrieve Microsoft Azure system settings and enumerate the underlying SQL database.
  • Store a string sent by the operator and then retrieve a file with a name matching the string from the MOVEit Transfer system.
  • Create a new administrator privileged account with a randomly generated username and LoginName and RealName values set to “Health Check Service.”
  • Delete an account with LoginName and RealName values set to ‘Health Check Service.’

Progress Software announced the discovery of CVE-2023-34362 MOVEit Transfer vulnerability and issued guidance on known affected versions, software upgrades, and patching. Based on evidence of active exploitation, CISA added this vulnerability to the Known Exploited Vulnerabilities (KEVs) Catalog on June 2, 2023. This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [2]:

  • MOVEit Transfer 2023.0.0
  • MOVEit Transfer 2022.1.x
  • MOVEit Transfer 2022.0.x
  • MOVEit Transfer 2021.1.x
  • MOVEit Transfer 2021.0.x
  • MOVEit Transfer 2020.1.x
  • MOVEit Transfer 2020.0.x

Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks. For IOCs related to the MOVEit campaign, see table 2.

DETECTION METHODS

Below, are open source deployable YARA rules that may be used to detect malicious activity of the MOVEit Transfer Zero Day Vulnerability. For more information, visit GitHub or the resource section of this CSA. [1] [3]:

rule M_Webshell_LEMURLOOT_DLL_1 {
    meta:
        disclaimer = "This rule is meant for hunting and is not tested to run in a production environment"
        description = "Detects the compiled DLLs generated from human2.aspx LEMURLOOT payloads."
        sample = "c58c2c2ea608c83fad9326055a8271d47d8246dc9cb401e420c0971c67e19cbf"
        date = "2023/06/01"
        version = "1"
    strings:
        $net = "ASP.NET"
        $human = "Create_ASP_human2_aspx"
        $s1 = "X-siLock-Comment" wide
        $s2 = "X-siLock-Step3" wide
        $s3 = "X-siLock-Step2" wide
        $s4 = "Health Check Service" wide
        $s5 = "attachment; filename={0}" wide
    condition:
        uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and
        filesize < 15KB and
        $net and
        (
            ($human and 2 of ($s*)) or
            (3 of ($s*))
        )
}

 

rule M_Webshell_LEMURLOOT_1 {
    meta:
        disclaimer = "This rule is meant for hunting and is not tested to run in a production environment"
        description = "Detects the LEMURLOOT ASP.NET scripts"
        md5 = "b69e23cd45c8ac71652737ef44e15a34"
        sample = "cf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45x"
        date = "2023/06/01"
        version = "1"
    strings:
        $head = "<%@ Page"
        $s1 = "X-siLock-Comment"
        $s2 = "X-siLock-Step"
        $s3 = "Health Check Service"
        $s4 = /pass, \"[a-z0-9]{8}-[a-z0-9]{4}/
        $s5 = "attachment;filename={0}"
    condition:
        filesize > 5KB and filesize < 10KB and
        (
            ($head in (0..50) and 2 of ($s*)) or
            (3 of ($s*))
        )
}

If a victim rebuilds the web server but leaves the database intact, the CL0P user accounts will still exist and can be used for persistent access to the system.

Victims can use the following SQL query to audit for active administrative accounts, and should validate that only intended accounts are present.

SELECT * FROM [<database name>].[dbo].[users] WHERE Permission=30 AND Status="active" and Deleted='0'

rule MOVEit_Transfer_exploit_webshell_aspx {

    meta:

        date = "2023-06-01"
        description = "Detects indicators of compromise in MOVEit Transfer exploitation."
        author = "Ahmet Payaslioglu - Binalyze DFIR Lab"
        hash1 = "44d8e68c7c4e04ed3adacb5a88450552"
        hash2 = "a85299f78ab5dd05e7f0f11ecea165ea"
        reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/"
        reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/"
        reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643"
        verdict = "dangerous"
          mitre = "T1505.003"
        platform = "windows"
        search_context = "filesystem"
        
    strings:
        $a1 = "MOVEit.DMZ"
        $a2 = "Request.Headers[\"X-siLock-Comment\"]"
        $a3 = "Delete FROM users WHERE RealName="Health Check Service""
        $a4 = "set[\"Username\"]"
        $a5 = "INSERT INTO users (Username, LoginName, InstID, Permission, RealName"
        $a6 = "Encryption.OpenFileForDecryption(dataFilePath, siGlobs.FileSystemFactory.Create()"
        $a7 = "Response.StatusCode = 404;"
    condition:
        
        filesize < 10KB
        and all of them 
}

rule MOVEit_Transfer_exploit_webshell_dll {

    meta:

        date = "2023-06-01"
        description = "Detects indicators of compromise in MOVEit Transfer exploitation."
        author = "Djordje Lukic - Binalyze DFIR Lab"
        hash1 = "7d7349e51a9bdcdd8b5daeeefe6772b5"
        hash2 = "2387be2afe2250c20d4e7a8c185be8d9"
        reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/"
        reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/"
        reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643"
        verdict = "dangerous"
          mitre = "T1505.003"
        platform = "windows"
        search_context = "filesystem"
        
    strings:
        $a1 = "human2.aspx" wide
        $a2 = "Delete FROM users WHERE RealName="Health Check Service"" wide
        $a3 = "X-siLock-Comment" wide
    condition:
        
        uint16(0) == 0x5A4D and filesize < 20KB
        and all of them 
}

 

MOVEit Campaign Indicators of Compromise

Files

Hash

LEMURLOOT

Web Shell

e.g. human2.aspx

0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9

0ea05169d111415903a1098110c34cdbbd390c23016cd4e179dd9ef507104495

110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286

1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2

2413b5d0750c23b07999ec33a5b4930be224b661aaf290a0118db803f31acbc5

2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59

348e435196dd795e1ec31169bd111c7ec964e5a6ab525a562b17f10de0ab031d

387cee566aedbafa8c114ed1c6b98d8b9b65e9f178cf2f6ae2f5ac441082747a

38e69f4a6d2e81f28ed2dc6df0daf31e73ea365bd2cfc90ebc31441404cca264

3a977446ed70b02864ef8cfa3135d8b134c93ef868a4cc0aa5d3c2a74545725b

3ab73ea9aebf271e5f3ed701286701d0be688bf7ad4fb276cb4fbe35c8af8409

3c0dbda8a5500367c22ca224919bfc87d725d890756222c8066933286f26494c

4359aead416b1b2df8ad9e53c497806403a2253b7e13c03317fc08ad3b0b95bf

48367d94ccb4411f15d7ef9c455c92125f3ad812f2363c4d2e949ce1b615429a

58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166

5b566de1aa4b2f79f579cdac6283b33e98fdc8c1cfa6211a787f8156848d67ff

6015fed13c5510bbb89b0a5302c8b95a5b811982ff6de9930725c4630ec4011d

702421bcee1785d93271d311f0203da34cc936317e299575b06503945a6ea1e0

769f77aace5eed4717c7d3142989b53bd5bac9297a6e11b2c588c3989b397e6b

7c39499dd3b0b283b242f7b7996205a9b3cf8bd5c943ef6766992204d46ec5f1

93137272f3654d56b9ce63bec2e40dd816c82fb6bad9985bed477f17999a47db

98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8

9d1723777de67bc7e11678db800d2a32de3bcd6c40a629cd165e3f7bbace8ead

9e89d9f045664996067a05610ea2b0ad4f7f502f73d84321fb07861348fdc24a

a1269294254e958e0e58fc0fe887ebbc4201d5c266557f09c3f37542bd6d53d7

a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986

b1c299a9fe6076f370178de7b808f36135df16c4e438ef6453a39565ff2ec272

b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03

b9a0baf82feb08e42fa6ca53e9ec379e79fbe8362a7dac6150eb39c2d33d94ad

bdd4fa8e97e5e6eaaac8d6178f1cf4c324b9c59fc276fd6b368e811b327ccf8b

c56bcb513248885673645ff1df44d3661a75cfacdce485535da898aa9ba320d4

c77438e8657518221613fbce451c664a75f05beea2184a3ae67f30ea71d34f37

cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621

cf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45

d477ec94e522b8d741f46b2c00291da05c72d21c359244ccb1c211c12b635899

d49cf23d83b2743c573ba383bf6f3c28da41ac5f745cde41ef8cd1344528c195

daaa102d82550f97642887514093c98ccd51735e025995c2cc14718330a856f4

e8012a15b6f6b404a33f293205b602ece486d01337b8b3ec331cd99ccadb562e

ea433739fb708f5d25c937925e499c8d2228bf245653ee89a6f3d26a5fd00b7a

ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90c

f0d85b65b9f6942c75271209138ab24a73da29a06bc6cc4faeddcb825058c09d

fe5f8388ccea7c548d587d1e2843921c038a9f4ddad3cb03f3aa8a45c29c6a2f

 

GoAnywhere Campaign Indicators of Compromise

Files

Hash

Description

larabqFa.exe
Qboxdv.dll

0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3

Truebot

%TMP%\7ZipSfx.000\Zoom.exe
 

1285aa7e6ee729be808c46c069e30a9ee9ce34287151076ba81a0bea0508ff7e

Spawns a PowerShell subprocess which executes a malicious DLL file

%TMP%\7ZipSfx.000\ANetDiag.dll

2c8d58f439c708c28ac4ad4a0e9f93046cf076fc6e5ab1088e8943c0909acbc4

Obfuscated malware which also uses long sleeps and  debug detection to evade analysis

AVICaptures.dll

a8569c78af187d603eecdc5faec860458919349eef51091893b705f466340ecd

Truebot

kpdphhajHbFerUr.exe
gamft.dll

c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c

Truebot

dnSjujahur.exe
Pxaz.dll

c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d

Truebot

7ZSfxMod_x86.exe
ZoomInstaller.exe
Zoom.exe

d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7

Fake Zoom installer – Truebot

update.jsp

eb9f5cbe71f9658d38fb4a7aa101ad40534c4c93ee73ef5f6886d89159b0e2c2

Java Server Pages (JSP) web shell with some base64 obfuscation

%TMP%\<folder>\extracted_at_0xe5c8f00.exe

f2f08e4f108aaffaadc3d11bad24abdd625a77e0ee9674c4541b562c78415765

Employs sandbox detection and string obfuscation – appears to be a collection of C# hack tools

UhfdkUSwkFKedUUi.exe
gamft.dll

ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885

Truebot

Email Address

Description

unlock@rsv-box[.]com

CL0P communication email

unlock@support-multi[.]com

CL0P communication email

rey14000707@gmail[.]com

Login/Download

gagnondani225@gmail[.]com

Email

Malicious Domain

http://hiperfdhaus[.]com

http://jirostrogud[.]com

http://qweastradoc[.]com

http://qweastradoc[.]com/gate.php

http://connectzoomdownload[.]com/download/ZoomInstaller.exe

https://connectzoomdownload[.]com/download/ZoomInstaller.exe

http://zoom[.]voyage/download/Zoom.exe

http://guerdofest[.]com/gate.php

Certificate Name

Status

Date Valid

Thumbprint

Serial Number

Savas Investments PTY LTD

Valid Issuer: Sectigo Public Code Signing CA R36

10/7/2022 – 10/7/2023

8DCCF6AD21A58226521

E36D7E5DBAD133331C181

00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02

MOVEit Campaign Infrastructure

IP Addresses

May/June 2023

GoAnywhere Campaign Infrastructure

IP Addresses

January/February 2023

104.194.222[.]107

100.21.161[.]34

138.197.152[.]201

104.200.72[.]149

146.0.77[.]141

107.181.161[.]207

146.0.77[.]155

141.101.68[.]154 

146.0.77[.]183

141.101.68[.]166 

148.113.152[.]144

142.44.212[.]178

162.244.34[.]26

143.31.133[.]99

162.244.35[.]6

148.113.159[.]146

179.60.150[.]143

148.113.159[.]213

185.104.194[.]156

15.235.13[.]184

185.104.194[.]24

15.235.83[.]73

185.104.194[.]40

162.158.129[.]79 

185.117.88[.]17

166.70.47[.]90

185.162.128[.]75

172.71.134[.]76 

185.174.100[.]215

173.254.236[.]131

185.174.100[.]250

185.104.194[.]134

185.181.229[.]240

185.117.88[.]2

185.181.229[.]73

185.174.100[.]17

185.183.32[.]122

185.33.86[.]225

185.185.50[.]172

185.33.87[.]126

188.241.58[.]244

185.80.52[.]230

193.169.245[.]79

185.81.113[.]156

194.33.40[.]103

192.42.116[.]191

194.33.40[.]104

195.38.8[.]241

194.33.40[.1]64

198.137.247[.]10

198.12.76[.]214

198.199.74[.]207

198.27.75[.]110

198.199.74[.]207:1234/update.jsp

206.221.182[.]106

198.245.13[.]4

209.127.116[.]122

20.47.120[.]195

209.127.4[.]22

208.115.199[.]25

209.222.103[.]170

209.222.98[.]25

209.97.137[.]33

213.121.182[.]84

45.227.253[.]133

216.144.248[.]20

45.227.253[.]147

23.237.114[.]154

45.227.253[.]50

23.237.56[.]234

45.227.253[.]6

3.101.53[.]11

45.227.253[.]82

44.206.3[.]111

45.56.165[.]248

45.182.189[.]200

5.149.248[.]68

45.182.189[.]228

5.149.250[.]74

45.182.189[.]229

5.149.250[.]92

5.149.250[.]90

5.188.86[.]114

5.149.252[.]51

5.188.86[.]250

5.188.206[.]76

5.188.87[.]194

5.188.206.76[:]8000/se1.dll

5.188.87[.]226

5.34.178[.]27

5.188.87[.]27

5.34.178[.]28

5.252.23[.]116

5.34.178[.]30

5.252.25[.]88

5.34.178[.]31

5.34.180[.]205

5.34.180[.]48

62.112.11[.]57

50.7.118[.]90

62.182.82[.]19

54.184.187[.]134

62.182.85[.]234

54.39.133[.]41

66.85.26[.]215

63.143.42[.]242

66.85.26[.]234

68.156.159[.]10

66.85.26[.]248

74.218.67[.]242

79.141.160[.]78

76.117.196[.]3

79.141.160[.]83

79.141.160[.]78

84.234.96[.]104

79.141.161[.]82

84.234.96[.]31

79.141.173[.]94

89.39.104[.]118

81.56.49[.]148

89.39.105[.]108

82.117.252[.]141

91.202.4[.]76

82.117.252[.]142

91.222.174[.]95

82.117.252[.]97

91.229.76[.]187

88.214.27[.]100

93.190.142[.]131

88.214.27[.]101

 

91.222.174[.]68

 

91.223.227[.]140

 

92.118.36[.]210

 

92.118.36[.]213

 

92.118.36[.]249

 

96.10.22[.]178

 

96.44.181[.]131

 

5.252.23[.]116

 

5.252.25[.]88

 

84.234.96[.]104

 

89.39.105[.]108

 

138.197.152[.]201

 

148.113.152[.]144

 

198.12.76[.]214

 

209.97.137[.]33

 

209.222.103[.]170

 

MITRE ATT&CK TECHNIQUES

See tables below for referenced CL0P tactics and techniques used in this advisory.

Table 1. ATT&CK Techniques for Enterprise: Initial Access

Initial Access

   

Technique Title

ID

Use

Exploit Public-Facing Application

T1190

CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application.

Phishing

T1566

CL0P actors send a large volume of spear-phishing emails to employees of an organization to gain initial access.

Table 2. ATT&CK Techniques for Enterprise: Execution

Execution

   

Technique Title

ID

Use

Command and Scripting Interpreter: PowerShell

T1059.001

CL0P actors use SDBot as a backdoor to enable other commands and functions to be executed in the compromised computer.

Command and Scripting Interpreter

T1059.003

CL0P actors use TinyMet, a small open-source Meterpreter stager to establish a reverse shell to their C2 server.

Shared Modules

T1129

CL0P actors use Truebot to download additional modules.

Table 3. ATT&CK Techniques for Enterprise: Persistence

Persistence

   

Technique Title

ID

Use

Server Software Component: Web Shell

T1505.003

DEWMODE is a web shell designed to interact with a MySQL database, and is used to exfiltrate data from the compromised network.

Event Triggered Execution: Application Shimming

T1546.011

CL0P actors use SDBot malware for application shimming for persistence and to avoid detection.

Table 4. ATT&CK Techniques for Enterprise: Privilege Escalation

Privilege Escalation 

   

Technique Title

ID

Use

Exploitation for Privilege Escalation

T1068

CL0P actors were gaining access to MOVEit Transfer databases prior to escalating privileges within compromised network.

Table 5. ATT&CK Techniques for Enterprise: Defense Evasion

Defense Evasion

   

Technique Title

ID

Use

Process Injection

T1055

CL0P actors use Truebot to load shell code.

Indicator Removal

T1070

CL0P actors delete traces of Truebot malware after it is used.

Hijack Execution Flow: DLL Side-Loading

T1574.002

CL0P actors use Truebot to side load DLLs.

Table 6. ATT&CK Techniques for Enterprise: Discovery

Discovery

   

Technique Title

ID

Use

Remote System Discovery

T1018

CL0P actors use Cobalt Strike to expand network access after gaining access to the Active Directory (AD) servers.

Table 7. ATT&CK Techniques for Enterprise: Lateral Movement

Lateral Movement

   

Technique Title

ID

Use

Remote Services: SMB/Windows Admin Shares

T1021.002

CL0P actors have been observed attempting to compromise the AD server using Server Message Block (SMB) vulnerabilities with follow-on Cobalt Strike activity.

Remote Service Session Hijacking: RDP Hijacking

T1563.002

CL0P ransomware actors have been observed using Remote Desktop Protocol (RDP) to interact with compromised systems after initial access.

Table 8. ATT&CK Techniques for Enterprise: Collection

Collection

   

Technique Title

ID

Use

Screen Capture

T1113

CL0P actors use Truebot to take screenshots in effort to collect sensitive data.

Table 9. ATT&CK Techniques for Enterprise: Command and Control

Command and Control

   

Technique Title

ID

Use

Application Layer Protocol

T1071

CL0P actors use FlawedAmmyy remote access trojan (RAT) to communicate with the Command and Control (C2).

Ingress Tool Transfer

T1105

CL0P actors are assessed to use FlawedAmmyy remote access trojan (RAT) to the download of additional malware components.

CL0P actors use SDBot to drop copies of itself in removable drives and network shares.

Table 10. ATT&CK Techniques for Enterprise: Exfiltration

Exfiltration

   

Technique Title

ID

Use

Exfiltration Over C2 Channel

T1041

CL0P actors exfiltrate data for C2 channels.

 

MITIGATIONS

The authoring agencies recommend organizations implement the mitigations below to improve their organization’s security posture in response to threat actors’ activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections to reduce the risk of compromise by CL0P ransomware.

  • Reduce threat of malicious actors using remote access tools by:
    • Auditing remote access tools on your network to identify currently used and/or authorized software.
    • Reviewing logs for execution of remote access software to detect abnormal use of programs running as a portable executable [CPG 2.T].
    • Using security software to detect instances of remote access software only being loaded in memory.
    • Requiring authorized remote access solutions only be used from within your network over approved remote access solutions, such as virtual private networks (VPNs) or virtual desktop interfaces (VDIs).
    • Blocking both inbound and outbound connections on common remote access software ports and protocols at the network perimeter.
  • Implement application controls to manage and control execution of software, including allowlisting remote access programs.
    • Application controls should prevent installation and execution of portable versions of unauthorized remote access and other software. A properly configured application allowlisting solution will block any unlisted application execution. Allowlisting is important because antivirus solutions may fail to detect the execution of malicious portable executables when the files use any combination of compression, encryption, or obfuscation.
  • Strictly limit the use of RDP and other remote desktop services. If RDP is necessary, rigorously apply best practices, for example [CPG 2.W]:
  • Disable command-line and scripting activities and permissions [CPG 2.N].
  • Restrict the use of PowerShell, using Group Policy, and only grant to specific users on a case-by-case basis. Typically, only those users or administrators who manage the network or Windows operating systems (OSs) should be permitted to use PowerShell [CPG 2.E].
  • Update Windows PowerShell or PowerShell Core to the latest version and uninstall all earlier PowerShell versions. Logs from Windows PowerShell prior to version 5.0 are either non-existent or do not record enough detail to aid in enterprise monitoring and incident response activities [CPG 1.E, 2.S, 2.T].
  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 4.C].
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].
  • Reduce the threat of credential compromise via the following:
    • Place domain admin accounts in the protected users’ group to prevent caching of password hashes locally.
    • Refrain from storing plaintext credentials in scripts.
  • Implement time-based access for accounts set at the admin level and higher [CPG 2.A, 2.E].

In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors: 

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
  • Maintain offline backups of data and regularly maintain backup and restoration (daily or weekly at minimum). By instituting this practice, an organization limits the severity of disruption to its business practices [CPG 2.R].
  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
    • Use longer passwords consisting of at least eight characters and no more than 64 characters in length [CPG 2.B].
    • Store passwords in hashed format using industry-recognized password managers.
    • Add password user “salts” to shared login credentials.
    • Avoid reusing passwords [CPG 2.C].
    • Implement multiple failed login attempt account lockouts [CPG 2.G].
    • Disable password “hints.”
    • Refrain from requiring password changes more frequently than once per year. Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software.
  • Require multifactor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems [CPG 2.H].
  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Prioritize patching known exploited vulnerabilities in internet-facing systems [CPG 1.E].
  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement [CPG 2.F].
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host [CPG 3.A].
  • Install, regularly update, and enable real time detection for antivirus software on all hosts.
  • Disable unused ports [CPG 2.V].
  • Consider adding an email banner to emails received from outside your organization [CPG 2.M].
  • Disable hyperlinks in received emails.
  • Ensure all backup data is encrypted, immutable (i.e., ensure backup data cannot be altered or deleted), and covers the entire organization’s data infrastructure [CPG 2.K, 2.L, 2.R].

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring authorities of this CSA recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory. 
To get started:

  1. Select an ATT&CK technique described in this advisory (see table 2).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

RESOURCES

REFERENCE
[1] Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant
[2] MOVEit Transfer Critical Vulnerability (May 2023) – Progress Community
[3] MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)

REPORTING

The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with CL0P group actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, report the incident to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, or CISA at cisa.gov/report.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.

Source…