Newsletter
REAL HACKER NEWS
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
REAL HACKER NEWS
No Result
View All Result
Home APPLICATIONS

Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack

Real Hacker Staff by Real Hacker Staff
March 18, 2023
in APPLICATIONS
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Related articles

Delete After Reading Combines an Adventure and Puzzle Game With Fun Results

Delete After Reading Combines an Adventure and Puzzle Game With Fun Results

March 21, 2023
Google Calendar may soon let you add custom birthday reminders

Google Calendar may soon let you add custom birthday reminders

March 21, 2023


Mar 18, 2023Ravie LakshmananNetwork Security / Cyber Espionage

The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a suspected Chinese hacking group.

Threat intelligence firm Mandiant, which made the attribution, said the activity cluster is part of a broader campaign designed to deploy backdoors onto Fortinet and VMware solutions and maintain persistent access to victim environments.

The Google-owned threat intelligence and incident response firm is tracking the malicious operation under its uncategorized moniker UNC3886, a China-nexus threat actor.

“UNC3886 is an advanced cyber espionage group with unique capabilities in how they operate on-network as well as the tools they utilize in their campaigns,” Mandiant researchers said in a technical analysis.

“UNC3886 has been observed targeting firewall and virtualization technologies which lack EDR support. Their ability to manipulate firewall firmware and exploit a zero-day indicates they have curated a deeper-level of understanding of such technologies.”

It’s worth noting that the adversary was previously tied to another intrusion set targeting VMware ESXi and Linux vCenter servers as part of a hyperjacking campaign designed to drop backdoors such as VIRTUALPITA and VIRTUALPIE.

The latest disclosure from Mandiant comes as Fortinet revealed that government entities and large organizations were victimized by an unidentified threat actor by leveraging a zero-day bug in Fortinet FortiOS software to result in data loss and OS and file corruption.

The vulnerability, tracked as CVE-2022-41328 (CVSS score: 6.5), concerns a path traversal bug in FortiOS that could lead to arbitrary code execution. It was patched by Fortinet on March 7, 2023.

According to Mandiant, the attacks mounted by UNC3886 targeted Fortinet’s FortiGate, FortiManager, and FortiAnalyzer appliances to deploy two different implants such as THINCRUST and CASTLETAP. This, in turn, was made possible owing to the fact that the FortiManager device was exposed to the internet.

THINCRUST is a Python backdoor capable of executing arbitrary commands as well as reading and writing from and to files on disk.

The persistence afforded by THINCRUST is subsequently leveraged to deliver FortiManager scripts that weaponize the FortiOS path traversal flaw to overwrite legitimate files and modify firmware images.

This includes a newly added payload called “/bin/fgfm” (referred to as CASTLETAP) that beacons out to an actor-controlled server so as to accept incoming instructions that allow it to run commands, fetch payloads, and exfiltrate data from the compromised host.

“Once CASTLETAP was deployed to the FortiGate firewalls, the threat actor connected to ESXi and vCenter machines,” the researchers explained. “The threat actor deployed VIRTUALPITA and VIRTUALPIE to establish persistence, allowing for continued access to the hypervisors and the guest machines.”

Alternatively, on FortiManager devices that implement internet access restrictions, the threat actor is said to have pivoted from a FortiGate firewall compromised with CASTLETAP to drop a reverse shell backdoor named REPTILE (“/bin/klogd”) on the network management system to regain access.

WEBINAR

Discover the Hidden Dangers of Third-Party SaaS Apps

Are you aware of the risks associated with third-party app access to your company’s SaaS apps? Join our webinar to learn about the types of permissions being granted and how to minimize risk.

RESERVE YOUR SEAT

Also employed by UNC3886 at this stage is a utility dubbed TABLEFLIP, a network traffic redirection software to connect directly to the FortiManager device regardless of the access-control list (ACL) rules put in place.

This is far from the first time Chinese adversarial collectives have targeted networking equipment to distribute bespoke malware, with recent attacks taking advantage of other vulnerabilities in Fortinet and SonicWall devices.

The revelation also comes as threat actors are developing and deploying exploits faster than ever before, with as many as 28 vulnerabilities exploited within seven days of public disclosure — a 12% rise over 2021 and an 87% rise over 2020, according to Rapid7.

This is also significant, not least because China-aligned hacking crews have become “particularly proficient” at exploiting zero-day vulnerabilities and deploying custom malware to steal user credentials and maintain long-term access to target networks.

“The activity […] is further evidence that advanced cyber espionage threat actors are taking advantage of any technology available to persist and traverse a target environment, especially those technologies that do not support EDR solutions,” Mandiant said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: AttackChineseCyberEspionageExploitflawFortinethackersZeroDay
Share76Tweet47

Related Posts

Delete After Reading Combines an Adventure and Puzzle Game With Fun Results

Delete After Reading Combines an Adventure and Puzzle Game With Fun Results

by Real Hacker Staff
March 21, 2023
0

The game has a bit of something for everyone and includes an adventure story to stoke your imagination, puzzles, and...

Google Calendar may soon let you add custom birthday reminders

Google Calendar may soon let you add custom birthday reminders

by Real Hacker Staff
March 21, 2023
0

Saving important dates like birthdays and anniversaries has long been a feature supported by Google Contacts, with the added benefits...

Don’t wait for the M3 iMac, the M1 just hit its lowest-ever price

Don’t wait for the M3 iMac, the M1 just hit its lowest-ever price

by Real Hacker Staff
March 21, 2023
0

The M1 iMac has been out for a little while now, and while it looks like there may be a...

Best free photo editing apps in 2023

Best free photo editing apps in 2023

by Real Hacker Staff
March 21, 2023
0

The best iPhones, iPads, and Macs all come packaged with some nice, basic editing software within the Photos app. For...

UGreen 65W Nexode GaN Charger review: the frequent flyer

UGreen 65W Nexode GaN Charger review: the frequent flyer

by Real Hacker Staff
March 21, 2023
0

The Ugreen 65W Nexode GaN charger has the kind of name that is often lost amongst the sea of charging...

Load More
  • Trending
  • Comments
  • Latest

eSIMs Will Transform the Way You Think About Mobile Data and Security

March 7, 2023

XMOS Launches XVF3800 High-Performance Voice Processor for Enterprise and Consumer Voice Conferencing Platforms

March 7, 2023

Sennheiser Starts Shipping EW-DX Digital Wireless Microphone Series

November 22, 2022

Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities

December 7, 2022

Hello world!

0
US Commodities Regulator Beefs Up Bitcoin Futures Review

US Commodities Regulator Beefs Up Bitcoin Futures Review

0
Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

0
India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

0
Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

March 22, 2023
Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

March 22, 2023
ARRI Hi-5 SUP 2.0 – Newsshooter

ARRI Hi-5 SUP 2.0 – Newsshooter

March 22, 2023
Police raid on Russian human rights group draws condemnation | Human Rights News

Police raid on Russian human rights group draws condemnation | Human Rights News

March 21, 2023

Recent News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

March 22, 2023
Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

March 22, 2023

Categories

  • APPLICATIONS
  • AUDIO
  • CAMERA
  • COMPUTERS
  • GAMING
  • LAPTOP
  • REVIEWS
  • SECURITY
  • SMARTPHONES
  • Uncategorized
REAL HACKER NEWS

We bring you the best news on Internet new gadgets hacking and technology from around the world

  • Contact
  • Cookie Privacy Policy
  • Terms and Conditions
  • Privacy Policy
  • Disclaimer
  • DMCA

© 2003 Real Hacker News

No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO

© 2003 Real Hacker News

Go to mobile version