Threat Briefing — Apr 19, 2024

Weekly Threat Briefing - Apr 15 - Apr 19

TLP: CLEAR - This information may be shared publicly

8 minutes read
eSentire's Threat Response Unit (TRU) compiles the following weekly intelligence overview, providing cybersecurity leaders with expert analysis and insights on the most important events of the past week along with important security tips.

Noteworthy News

Patches for Exploited Palo Alto Networks Critical Vulnerability

Bottom Line: Due to the wide use of Palo Alto Network appliances, vulnerabilities found in their products are valued highly by attackers. As wide-spread exploitation of CVE-2024-3400 (CVSS: 10) has been observed in the wild, it is important for customers using the firewall appliance to apply mitigations and closely follow Palo Alto Network’s updates regarding the fixes to the impacted PAN-OS.

On April 12th, 2024, Palo Alto Networks disclosed a critical, actively exploited vulnerability in Palo Alto Networks’ firewalls which was identified by Volexity. Tracked as CVE-2024-3400 (CVSS:10), this is a command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. Exploitation of CVE-2024-3400 would allow a remote, unauthenticated attacker to execute arbitrary code with root privileges on the firewall. CVE-2024-3400 specifically impacts PAN-OS versions 10.2, 11.0, and 11.1. The following “hotfixes” were released on April 14th to address the vulnerability: PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, and PAN-OS 11.1.2-h3. Palo Alto Networks Panorama appliances, Cloud NGFW, and Prisma Access solutions are not impacted.

Palo Alto’s Unit42 has released a report including details on observed attacks and known Indicators of Compromise (IoCs); the current campaign is being tracked under the name Operation MidnightEclipse. After initial exploitation, threat actors have been observed deploying reverse shells and the UPSTYLE backdoor, as well as executing a variety of commands on the firewall, including copying and exfiltrating configuration files. Volexity tracks the threat actor group behind Operation MidnightEclipse as UAT0218.

Additionally, on April 12th, the CTO of TrustedSec shared details of a real-world exploit that enables attackers to download the firewall’s configuration file. On the same day, threat researcher Yutaka Sejiyama identified over 82,000 firewalls vulnerable to CVE-2024-3400, 40% of which are located in the United States.

On April 16th, watchTowr released a technical analysis of CVE-2024-3400. The analysis revealed that manipulation of the SESSID cookie can lead to arbitrary file writes and potential command execution, showcasing an attack vector where the telemetry settings increase vulnerability. Rather than releasing traditional Proof-of-Concept (PoC) exploit code, watchTowr chose to demonstrate the exploit's viability through a hypothetical scenario that explains the step-by-step manipulation process. The goal of this method is to both inform security professionals about the severity and mechanics of the exploit and to prompt rapid remediation efforts without equipping potential attackers with a ready-made exploit script.

In response to the increase in attacks, CISA added CVE-2024-3400 to its Known Exploited Vulnerabilities (KEV) catalog on April 12th, ordering U.S federal agencies to secure their devices within seven days of the addition, by April 19th. eSentire has released multiple advisories for CVE-2024-3400, including the initial disclosure of the vulnerability and subsequent exploitation observed in the wild.

eSentire Threat Intelligence Analysis:

The rapid exploitation of CVE-2024-3400 displays threat actors' abilities to leverage vulnerabilities found in high value target products for potential gain. As POC exploit code is available, it is likely the vulnerability will be a notable exploit that attackers will continue to leverage. Since the disclosure of CVE-2024-3400, there has been a significant increase in real world attacks utilizing the vulnerability, though attacks leveraging the exploit have been observed since as far back as March 26th.

While crucial for informing and protecting the cybersecurity community, the information provided in watchTowr’s report inevitably carries the risk of aiding threat actors. Such detailed disclosures, especially those involving step-by-step exploitation methods or revealing specific weak points in software, can serve as a blueprint for malicious actors. This accessibility of information can lower the barrier for entry for less skilled attackers to exploit these vulnerabilities, potentially leading to an increase in the number of threat actors attempting to leverage the exploit.

As patches for the vulnerability are available and widespread exploitation has been observed, it is highly recommended that any organization using Palo Alto firewall products apply the fixes immediately and review impacted products for signs of compromise. Alternative mitigations have been provided by Palo Alto if patches cannot be applied immediately.

APT44: Unearthing Sandworm

Bottom Line: The promotion of Sandworm to APT44 reflects its significant role and operational maturity within Russia's cyber strategy. This designation acknowledges the group's broad impact on global cybersecurity, highlighting its sophisticated capabilities and persistent threat to critical infrastructure, governmental, and military networks worldwide.

On April 17th, Mandiant, now part of Google Cloud, released a report on Sandworm, a prolific Russian state-backed threat group. Given the active and ever-present nature of the Sandworm group, Mandiant has decided to graduate this group to a named Advanced Persistent Threat: APT44. Alongside this report, they released a comprehensive analysis providing insights into the group’s operations. Additionally, on July 12th, 2023, Mandiant released a report titled “The GRU's Disruptive Playbook.” The activity in this report was originally attributed to UNC3810 but is now attributed to APT44 as UNC3810 has been merged into APT44.

This group has been attributed to Unit 74455, the Main Centre for Special Technologies (GTsST) within the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU), more commonly known as the Main Intelligence Directorate (GRU). Active since 2009, APT44 has played a central role in Russia's cyber operations against Ukraine, extending its activities globally to align with Russia's political, military, and economic interests.

The groups targets include government agencies, critical infrastructure operators, and organizations within the defense, energy, media, and civil society sectors across the globe. APT44's operations are often aimed at undermining democratic processes, stealing sensitive information, and creating disruptions that align with the military and political objectives of the Russian government. The group's extensive targeting also reflects an effort to influence public opinion and political outcomes in countries perceived as adversaries by the Kremlin, particularly during election cycles and times of international tension.

APT44 employs a wide range of sophisticated tools and techniques to conduct its operations globally. The group often initiates its cyberattacks through phishing and credential harvesting, targeting vulnerabilities in widely used public-facing applications like VPNs, email servers, and routers. For espionage and data theft, APT44 is known for distributing trojanized software installers via torrent files, particularly targeting Ukrainian and Russian-language forums; DCRAT was employed in attacks against telecommunications entities in Ukraine. APT44 also utilizes 'Living Off the Land' (LOTL) techniques, exploiting existing network tools and utilities to maintain stealth and persistence within compromised networks. The group’s arsenal includes destructive malware such as NotPetya (EternalPetya), which caused significant disruption in Ukraine in 2017, along with more recent wiper malware such as Industroyer, CaddyWiper, and PartyTicket. Furthermore, software supply chain compromises are a particular strength of APT44, allowing them to infiltrate multiple organizations through a single attack vector. Recent examples include attacks that compromised software developers leading to downstream deployment of wiper malware in critical infrastructure networks.

Additionally, APT44 uses information operations to augment its cyber activities, attempting to manipulate public perception and enhance the psychological impact of its attacks. One primary method APT44 employs is hack-and-leak operations, where sensitive documents or data are leaked to discredit organizations or influence public opinion. For instance, APT44 has targeted electoral systems in various countries, attempting to interfere with democratic processes by leaking politically sensitive information or by deploying malware that manipulates election data. Such actions not only sow distrust in the electoral processes but also attempt to tilt political opinions in favor of outcomes that benefit Russian strategic interests. APT44 also utilizes front personas and hacktivist identities to amplify the perceived impact of their operations. These personas operate primarily on platforms like Telegram, claiming responsibility for cyberattacks and data leaks. For example, the group has cultivated various hacktivist-branded Telegram channels such as XakNet Team, CyberArmyofRussia_Reborn, and Solntsepek. These channels are strategically used to disseminate information and claims about the group’s cyber operations. This tactic serves multiple purposes: it boosts the visibility of the group’s activities, creates a narrative of widespread disruption attributed to Russian cyber capabilities, and attempts to foster a perception of popular support for the conflict or Russian policies.

Using a combination of disruptive cyberattacks and sophisticated information operations, the group aims to advance Russia’s global interests.

eSentire Threat Intelligence Analysis:

APT44 exemplifies the integration of cyber tactics with broader military and geopolitical strategies. Backed by Russian military intelligence, the group not only targets critical infrastructure sectors such as energy, defense, and government but also engages in sophisticated information warfare aimed at disrupting political processes and manipulating public opinion. These actions disrupt services, erode public trust, and impose heavy financial burdens on affected entities.

eSentire’s Threat Intelligence team agrees with Mandiant’s assessment that “APT44 will almost certainly continue to present one of the widest and highest severity cyber threats globally.” Having been a major player in the cyber threat arena for more than ten years, the group has pioneered numerous tactics that have established benchmarks for future cyber attacks. Historical trends, including attempts to manipulate elections, indicate that the group's future activities are likely to be driven by nationalist motivations.

The war in Ukraine demonstrates how conventional military engagements are increasingly intertwined with cyber warfare, economic sanctions, and information campaigns, highlighting a complex geopolitical landscape where the boundaries between military and non-military strategies blur. Threat actors like APT44 have played a significant role, utilizing disruptive cyberattacks against Ukrainian infrastructure to supplement physical military operations. When discussing APT44’s future and the conflict Mandiant states, “[a]s Russia’s war continues, we anticipate Ukraine will remain the principal focus of APT44 operations. However, as history indicates, the group’s readiness to conduct cyber operations in furtherance of the Kremlin’s wider strategic objectives globally is ingrained in its mandate.” Western political dynamics, upcoming elections, and tensions within Russia’s near abroad are likely factors that will shape the group's future operations.

Defending against sophisticated cyber threat groups like APT44 requires a multi-layered, defense-in-depth security strategy. Organizations, especially those within critical infrastructure sectors and government entities, need to prioritize the detection and mitigation of threats through advanced cybersecurity frameworks. This includes implementing robust network defenses, regular system audits, and comprehensive employee training on phishing and other common attack vectors. Additionally, advanced Endpoint Detection and Response (EDR) solutions are crucial for identifying, investigating, and responding to potential threats in real-time. Ultimately, enhancing resilience against APT44 involves not only strengthening technical defenses but also fostering a culture of cybersecurity awareness and collaboration at all levels.

The ongoing threat posed by APT44 highlights the necessity for robust cybersecurity defenses and international cooperation. Understanding the group's Tactics, Techniques, and Procedures (TTPs) helps in developing targeted security measures and strategies to mitigate the impact of such state-sponsored cyber activities. As APT44 continues to evolve, so too must the global response to its potential to disrupt international security and stability.

Cyber Threats and Iran-Israel Tensions

Bottom Line: The backdrop of this cyber conflict is the ongoing geopolitical tension between Iran and Israel, with both nations experiencing and engaging in various forms of conflict, including cyber warfare. While this conflict remains localized to the region, there is potential for advanced adversarial cyber capabilities to spread to other geographical regions.

On April 15th, the Flashpoint Intel Team released a report detailing cyber activity surrounding Iran's aerial attack on Israel on April 13th, 2024. This event was a response to an earlier attack on the Iranian Consulate in Syria. Cyber threat groups have exploited these tensions, using social media to enhance their notoriety by making bold claims about their cyber capabilities.

In their report, Flashpoint highlighted three groups and their alleged attacks. Firstly, Handala Hack, a pro-Palestinian threat group, active since 2023, claimed to have accessed Israeli radar systems on the same day as Iran's aerial attacks, though the actual impact of their cyber activities is debatable. Nethunt3r, another pro-Palestinian threat group, allegedly breached the Israeli Ministry of Defense (MOD) and leaked documents, though the validity of these documents has not been verified. Lastly, Cyber Aveng3rs, a pro-Iranian threat group, has claimed responsibility for attacks on Israel's railway and power systems, however, there is no confirmed evidence to support these claims.

In the early hours of April 19th, Iranian state media reported on explosions and the downing of drones in Isfahan, Iran. Notably, the incident was referred to as an attack by "infiltrators", rather than by Israel, in a potential attempt to remove the need for retaliation. A senior Iranian official told Reuters, “[t]he foreign source of the incident has not been confirmed. We have not received any external attack, and the discussion leans more towards infiltration than attack. ”

eSentire Threat Intelligence Analysis:

The cyber conflict between Iran and Israel, set against a backdrop of regional tensions, offers a revealing glimpse into the future of warfare where cyber operations play a critical role. The development of cyber capabilities in these nations has been shaped by events like the Stuxnet attack, which is believed to have impacted Iran's nuclear program and jumpstarted its investment into both offensive and defensive cyber capabilities.

Israel is currently navigating a delicate balance in its response to Iranian provocations, under considerable pressure from the United States and allies to refrain from military retaliation. The U.S. stance, aimed at preventing a larger regional conflict, has been reinforced by the imposition of new sanctions against Iran. Both Israel and Iran are keen to avoid appearing vulnerable, yet they are equally cautious about escalating tensions to an uncontrollable level. In this context, cyber attacks could emerge as a strategically viable option. These operations are inherently less escalatory than traditional military strikes and are less likely to provoke a kinetic response. Cyberattacks can serve not only as tactical tools within broader military strategies but also as strategic mechanisms for psychological warfare, aiming to destabilize and intimidate.

In the evolving landscape of the Iran-Israel conflict, several cyber threat groups have come into the spotlight, claiming responsibility for various attacks on critical infrastructure and state systems. Groups like Handala Hack and Cyber Aveng3rs have been mentioned in reports, alleging significant breaches such as hacking into Israeli radar systems and other critical infrastructures. Despite the lack of confirmation, these threat actors are using the increased international media attention to elevate their notoriety. These unverified claims complicate the cybersecurity landscape by blurring the lines between actual threats and propaganda. This uncertainty benefits the threat actors as it forces the targeted nations to respond to potential threats, draining resources and causing psychological stress.

Additionally, there is a considerable risk that state-sponsored cyber warfare could spill over into the private sector, significantly impacting businesses worldwide. Cyberattacks aimed at government or military targets can sometimes unintentionally, or intentionally, disrupt businesses, causing an impact that reaches well beyond their original political motives. Companies in critical infrastructure sectors, such as telecommunications, are especially at risk due to their heavy dependence on digital systems. A notable instance of this is the targeting of a Ukrainian telecommunications company by APT44 (also known as Sandworm), a group associated with Russia's GRU military intelligence. This attack was used as part of a broader strategy to disrupt communications and gain strategic advantages.

Thus, The Iran-Israel conflict exemplifies modern, hybrid warfare and serves as a critical case study for countries worldwide, urging a revaluation of current cyber policies and practices in anticipation of future challenges.

About the threat briefings:

The threat briefing is a weekly intelligence overview for non-technical users. The Threat Intelligence team at eSentire investigates, analyzes, and organizes the most important events of the past week along with important security tips and redistributes the findings for quick reading. The main goal of this briefing is to improve the overall awareness of readers regarding cyber security.

eSentire Threat Response Unit (TRU)
eSentire Threat Response Unit (TRU)

Our industry-renowned Threat Response Unit (TRU) is an elite team of threat hunters and researchers, that supports our 24/7 Security Operations Centers (SOCs), builds detection models across our XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. TRU has been recognized for its threat hunting, original research and content development capabilities. TRU is strategically organized into cross-functional groups to protect you against advanced and emerging threats, allowing your organization to gain leading threat intelligence and incredible cybersecurity acumen.

Previous Briefings