Article Details

Scrape Timestamp (UTC): 2024-01-31 07:32:38.728

Source: https://thehackernews.com/2024/01/chinese-hackers-exploiting-critical-vpn.html

Original Article Text

Click to Toggle View

Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware. A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices have been exploited to deliver a Rust-based payload called KrustyLoader that's used to drop the open-source Sliver adversary simulation tool. The security vulnerabilities, tracked as CVE-2023-46805 (CVSS score: 8.2) and CVE-2024-21887 (CVSS score: 9.1), could be abused in tandem to achieve unauthenticated remote code execution on susceptible appliances. As of January 26, patches for the two flaws have been delayed, although the software company has released a temporary mitigation through an XML file. Volexity, which first shed light on the shortcomings, said they have been weaponized as zero-days since December 3, 2023, by a Chinese nation-state threat actor it tracks under the name UTA0178. Google-owned Mandiant has assigned the moniker UNC5221 to the group. Following public disclosure earlier this month, the vulnerabilities have come under broad exploitation by other adversaries to drop XMRig cryptocurrency miners as well as Rust-based malware. Synacktiv's analysis of the Rust malware, codenamed KrustyLoader, has revealed that it functions as a loader to download Sliver from a remote server and execute it on the compromised host. Sliver, developed by cybersecurity company BishopFox, is a Golang-based cross-platform post-exploitation framework that has emerged as a lucrative option for threat actors in comparison to other well-known alternatives like Cobalt Strike. That said, Cobalt Strike continues to be the top offensive security tool observed among attacker-controlled infrastructure in 2023, followed by Viper, and Meterpreter, according to a report published by Recorded Future earlier this month. "Both Havoc and Mythic have also become relatively popular but are still observed in far lower numbers than Cobalt Strike, Meterpreter, or Viper," the company said. "Four other well-known frameworks are Sliver, Havoc, Brute Ratel (BRc4), and Mythic." Webinar: Decoding the 2024 Customer Data Platform Report Explore the trends, challenges, and opportunities shaping the future of customer data management.

Daily Brief Summary

CYBERCRIME // Nation-State Hackers Leverage Ivanti VPN Flaws for Malware

Hackers have exploited zero-day flaws in Ivanti Connect Secure VPNs to implement the KrustyLoader malware.

Identified vulnerabilities CVE-2023-46805 and CVE-2024-21887 enable remote code execution without authentication.

Ivanti has yet to release patches but has provided a temporary mitigation solution.

The Chinese nation-state actor UTA0178, also known as UNC5221, has been utilizing these vulnerabilities since early December 2023.

The Rust-based KrustyLoader serves as a tool for downloading and executing the Sliver post-exploitation framework on affected hosts.

Since the public disclosure of the Ivanti flaws, a broader range of attackers has exploited them, also to deploy cryptocurrency mining malware.

While Cobalt Strike remains dominant, alternative post-exploitation tools like Sliver, Viper, and Meterpreter show increased usage among cyber attackers.

Recorded Future's recent report emphasizes the evolving landscape of offensive security tools utilized by threat actors.