CVE-2024-20358 – Cisco Adaptive Security Appliance and Firepower Threat Defense Software Vulnerability
April 25, 2024DarkCrystal RAT aka DCRat – Active IOCs
April 26, 2024CVE-2024-20358 – Cisco Adaptive Security Appliance and Firepower Threat Defense Software Vulnerability
April 25, 2024DarkCrystal RAT aka DCRat – Active IOCs
April 26, 2024Severity
High
Analysis Summary
Cybersecurity experts have found evidence of a persistent attack campaign that uses phishing emails to spread SSLoad malware. The campaign dubbed FROZEN#SHADOW also includes the use of the ConnectWise ScreenConnect remote desktop software and Cobalt Strike.
SSLoad is engineered to surreptitiously enter networks, obtain confidential data, and relay its discoveries to its administrators. To be persistent and evade detection, SSLoad installs several backdoors and payloads once inside the system. Phishing emails with links that download a JavaScript file that starts the infection process are used in attack chains to target companies in Asia, Europe, and the Americas at random.
The researchers said, “The malware is typically introduced into the system through phishing email campaigns.”
Earlier this month, Palo Alto Networks uncovered at least two different methods by which SSLoad is distributed, one which entails the use of website contact forms to embed booby-trapped URLs and another involving macro-enabled Microsoft Word documents. Notably, the latter serves as a delivery mechanism for Cobalt Strike, whilst the former has been utilized to spread a distinct malware known as Latrodectus, which is most likely IcedID's replacement.
When the obfuscated JavaScript file ("out_czlrh.js") is launched and executed using wscript.exe, it connects to a network share to retrieve an MSI installer file ("slack.msi"), which is then executed by msiexec.exe. On the other hand, the MSI installer makes contact with an attacker-controlled domain to retrieve and launch the SSLoad malware payload using rundll32.exe. Subsequently, it sends information about the compromised machine to a command-and-control (C2) server.
The threat actors can remotely take over the host by using Cobalt Strike, a genuine adversary simulation program, to download and install ScreenConnect after the first reconnaissance phase. The threat actors started trying to obtain credentials and gather other important system facts when they had complete access to the system. At this point, they began searching the target host's files for credentials and other potentially private information.
The attackers have also been shown to switch to different systems within the network, such as the domain controller, and eventually get access to the victim's Windows domain by making a domain administrator account of their own. They could access any linked machine within the domain with this degree of access. This is ultimately the worst-case situation for any firm because it would take a great deal of time and money to address the attackers' degree of persistence.
Impact
- Sensitive Data Theft
- Unauthorized Remote Access
- Credential Theft
- Privilege Escalation
Indicators of Compromise
Domain Name
- mmtixmm.org
- wireoneinternet.info
- skinnyjeanso.com
- titnovacrion.top
- simplyfitphilly.com
- kasnackamarch.info
- sokingscrosshotel.com
- danteshpk.com
- stratimasesstr.com
- winarkamaps.com
- globalsolutionunlimitedltd.com
- maramaravilha.com
- krd6.com
MD5
- ce3f73098f8f6f84fc02d94e04d997a0
- 50c9e63975fb626c2448aaaf193ca6aa
- cbab7dbd7e1fa98731e98dee1d9232b4
- d042eb3c92ea00515531b950b2814e85
- 9419f4e9d33b9e32b4fa1cb6e6028814
- 712cad85bf511a91632fcb91b11fc828
- 328c81abf8f654ec75c1e92a42eb311d
- 2a5dbaef204dbfb69182afd3055759f9
- f46e75eb89214e2fbb850b9d29b9f515
- b28a478eb5b99efcdc7caf428bffb89a
SHA-256
- db265ea1732935f61e8d0f7a20a8adc54e20af71b3cf4a737714cd3377c838f6
- fad25892e5179a346cdbdbba1e40f53bd6366806d32b57fa4d7946ebe9ae8621
- f8fc9b40b946b742d6044f291914439727e1a7f53ea87562446f682b26cce65a
- e8979741f0355a47dae575ead8c829df47f282b4533ec1be4d63086515f9c449
- 9fc48724cb9f70f774f7ed9e809e49979bd089dfd641896d8d5e3026f049b0af
- 8f7a90b540f38712c9c1a5359c6333bbe1091102d6f621b22321e08352c84cfc
- 09e7f7428e6ecc68ef036c0751f53985882f6760cf3892f1d26af44f3b9730de
- f5bf914415faf7587958bbdc3312536fd9abea647f1541d44d2e757f0e683650
- 9856b816a9d14d3b7db32f30b07624e4bcda7f1e265a7bb7a3e3476bfd54a759
- 3bca1dcaef4430272b9029c9a4bc8be0d45ecff66e8de8679ed30d8afab00f6f
SHA1
- 1c2be6b4de1a51fede475aa4778fee9ae4e3b6d7
- 1df86a1625b0fddd885e8763f416948d8e3863b5
- 5d5864f42ab23e1f3a7fd3ded9ed31dac32bfea3
- fd19c966e5eee62f05ee44df25bcd79493567a09
- 7ba89be2538e558a416fa7730b683a1a71ec223b
- ba4aa429f298d10cd92f91af89d979142dd1da49
- c9b14c63d98a363e1b604aad59bb8f4142326feb
- fa55affc926adc1c5495a85d30df5a17f079bce1
- 1f35835a08f96fd9198864b8ded5baa1a27db710
- d394c7b8fe15753bfbff79fb4f648f6f8bae70f9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Ensure that all systems, software, and applications are up-to-date with the latest security patches. Regularly check for and apply updates to eliminate known vulnerabilities that attackers could exploit.
- Educate employees about phishing emails, social engineering tactics, and safe online behavior. Effective training can reduce the likelihood of users inadvertently initiating an attack.
- Regularly back up critical data and systems to offline or isolated storage. Test the backup restoration process to ensure that it is effective in case of an attack.
- Deploy strong endpoint protection solutions that include advanced threat detection, behavior monitoring, and real-time protection against malware and ransomware.
- Employ robust email filtering and anti-phishing solutions to detect and prevent malicious attachments and links from reaching user inboxes.
- Conduct regular penetration testing and security assessments to identify vulnerabilities and weaknesses in your network and systems. Address any findings promptly.
- Thoroughly assess third-party vendors and software before integrating them into your environment. Ensure they have strong security practices and adhere to cybersecurity standards.