Article Details
Scrape Timestamp (UTC): 2024-01-20 10:28:00.826
Source: https://thehackernews.com/2024/01/chinese-hackers-silently-weaponized.html
Original Article Text
Click to Toggle View
Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years. An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and Fortinet appliances has been linked to the abuse of a critical vulnerability in VMware vCenter Server as a zero-day since late 2021. "UNC3886 has a track record of utilizing zero-day vulnerabilities to complete their mission without being detected, and this latest example further demonstrates their capabilities," Google-owned Mandiant said in a Friday report. The vulnerability in question is CVE-2023-34048 (CVSS score: 9.8), an out-of-bounds write that could be put to use by a malicious actor with network access to vCenter Server. It was fixed by the Broadcom-owned company on October 24, 2023. The virtualization services provider, earlier this week, updated its advisory to acknowledge that "exploitation of CVE-2023-34048 has occurred in the wild." UNC3886 first came to light in September 2022 when it was found to leverage previously unknown security flaws in VMware to backdoor Windows and Linux systems, deploying malware families like VIRTUALPITA and VIRTUALPIE. The latest findings from Mandiant show that the zero-day weaponized by the nation-state actor targeting VMware was none other than CVE-2023-34048, allowing it to gain privileged access to the vCenter system, and enumerate all ESXi hosts and their respective guest virtual machines attached to the system. The next phase of the attack involves retrieving cleartext "vpxuser" credentials for the hosts and connecting to them in order to install the VIRTUALPITA and VIRTUALPIE malware, thereby enabling the adversary to directly connect to the hosts. This ultimately paves for the exploitation of another VMware flaw, (CVE-2023-20867, CVSS score: 3.9), to execute arbitrary commands and transfer files to and from guest VMs from a compromised ESXi host, as revealed by Mandiant in June 2023. VMware vCenter Server users are recommended to update to the latest version to mitigate any potential threats. In recent years, UNC3886 has also taken advantage of CVE-2022-41328 (CVSS score: 6.5), a path traversal flaw in Fortinet FortiOS software, to deploy THINCRUST and CASTLETAP implants for executing arbitrary commands received from a remote server and exfiltrating sensitive data. These attacks specifically single out firewall and virtualization technologies owing to the fact that they lack support for endpoint detection and response (EDR) solutions in order to persist within target environments for extended periods of time. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.
Daily Brief Summary
An sophisticated cyber espionage group with ties to China, designated as UNC3886, has been exploiting a critical VMware vCenter Server vulnerability (CVE-2023-34048) as a zero-day since late 2021.
This vulnerability is a severe out-of-bounds write with a CVSS score of 9.8, and allows privileged access to vCenter, with potential to compromise attached ESXi hosts and guest virtual machines.
UNC3886 employs stealth tactics and zero-day vulnerabilities, aiming to bypass detection
recently confirmed by Mandiant.
VMware patched the flaw on October 24, 2023, following Mandiant's disclosures of UNC3886's stealthy exploitation of previously unknown VMware vulnerabilities.
The hackers deployed VIRTUALPITA and VIRTUALPIE malwares to maintain access to Windows and Linux systems through backdoors installed on compromised VMware setups.
Apart from VMware vulnerabilities, UNC3886 leverage a Fortinet FortiOS flaw (CVE-2022-41328) to implant THINCRUST and CASTLETAP, for command execution and data exfiltration.
VMware vCenter Server users are strongly recommended to update their systems to the latest version to protect against these threats.
These series of attacks underscore the group's focus on exploiting vulnerabilities in firewall and virtualization technologies that typically lack support for endpoint detection and response (EDR) systems.