Article Details

Scrape Timestamp (UTC): 2024-02-28 05:52:23.671

Source: https://thehackernews.com/2024/02/cybersecurity-agencies-warn-ubiquiti.html

Original Article Text

Click to Toggle View

Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28's MooBot Threat. In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other countries are urging users of Ubiquiti EdgeRouter to take protective measures, weeks after a botnet comprising infected routers was felled by law enforcement as part of an operation codenamed Dying Ember. The botnet, named MooBot, is said to have been used by a Russia-linked threat actor known as APT28 to facilitate covert cyber operations and drop custom malware for follow-on exploitation. APT28, affiliated with Russia's Main Directorate of the General Staff (GRU), is known to be active since at least 2007. APT28 actors have "used compromised EdgeRouters globally to harvest credentials, collect NTLMv2 digests, proxy network traffic, and host spear-phishing landing pages and custom tools," the authorities said [PDF]. The adversary's use of EdgeRouters dates back to 2022, with the attacks targeting aerospace and defense, education, energy and utilities, governments, hospitality, manufacturing, oil and gas, retail, technology, and transportation sectors in the Czech Republic, Italy, Lithuania, Jordan, Montenegro, Poland, Slovakia, Turkey, Ukraine, the U.A.E., and the U.S. MooBot attacks entail targeting routers with default or weak credentials to deploy OpenSSH trojans, with APT28 acquiring this access to deliver bash script and other ELF binaries to collect credentials, proxy network traffic, host phishing pages, and other tooling. This includes Python scripts to upload account credentials belonging to specifically targeted webmail users, which are collected via cross-site scripting and browser-in-the-browser (BitB) spear-phishing campaigns. APT28 has also been linked to the exploitation of CVE-2023-23397 (CVSS score: 9.8), a now-patched critical privilege escalation flaw in Microsoft Outlook that could enable the theft of NT LAN Manager (NTLM) hashes and mount a relay attack without requiring any user interaction. Another tool in its malware arsenal is MASEPIE, a Python backdoor capable of executing arbitrary commands on victim machines utilizing compromised Ubiquiti EdgeRouters as command-and-control (C2) infrastructure. "With root access to compromised Ubiquiti EdgeRouters, APT28 actors have unfettered access to Linux-based operating systems to install tooling and to obfuscate their identity while conducting malicious campaigns," the agencies noted. Organizations are recommended to perform a hardware factory reset of the routers to flush file systems of malicious files, upgrade to the latest firmware version, change default credentials, and implement firewall rules to prevent exposure of remote management services. The revelations are a sign that nation-state hackers are increasingly using routers as a launchpad for attacks, using them to create botnets such as VPNFilter, Cyclops Blink, and KV-botnet and conduct their malicious activities. The bulletin arrives a day after the Five Eyes nations called out APT29 – the threat group affiliated with Russia's Foreign Intelligence Service (SVR) and the entity behind the attacks on SolarWinds, Microsoft, and HPE – for employing service accounts and dormant accounts to access cloud environments at target organizations. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.

Daily Brief Summary

NATION STATE ACTIVITY // APT28 Exploits Ubiquiti EdgeRouters for Malicious Cyber Operations

U.S. and allied cybersecurity agencies warn of threats by Russia-linked APT28 targeting Ubiquiti EdgeRouter devices.

The advisory follows the recent takedown of the MooBot botnet, utilized by APT28 for various covert cyber operations.

APT28 has exploited routers to harvest credentials, proxy traffic, and host phishing pages, affecting diverse global sectors.

The threat actor has been active since at least 2007 and uses compromised routers to install and operate custom malware.

Users are advised to reset their hardware to factory settings, update firmware, change default credentials, and implement firewall rules.

Nation-state hackers are increasingly focusing on routers to create botnets for malicious activity and gain access to targeted networks.

The intelligence bulletin coincides with a Five Eyes alert on APT29's cloud access tactics, underscoring the ongoing threat of Russian cyber espionage.