The CSA and FBI have collaboratively conducted various types of analysis over hacking activity. There have been speculations on Russian State-Sponsored threat actors and their targets over Ukraine and other parts of the world.
Recently, they have exploited an NGO that was using Cisco’s Duo MFA which had enabled access to cloud and email accounts for stealing documents.
The FBI has also listed the steps to mitigate, Techniques, tactics and Procedures, Indicators of Compromise that can be used to protect against Russian State-Sponsored Hackers.
In early May 2021, the FBI noted that the Russian State-Sponsored hackers were targeting an NGO and exploited a flaw in that system relating to MFA and to move inside the network.
The Hackers initially gained access to the network via compromised credentials. Later, they enrolled in a new device for the compromised account. Hackers were using Brute force techniques to extract credentials of an account. Accounts with very simple and predictable passwords were compromised.
Due to long inactivity on the compromised account, MFA is disabled and especially the accounts were not removed from the active directory. Hackers leveraged these accounts and took over them.
For privilege escalation, they used a known vulnerability called “PrintNightmare” and gained access to the system.
After escalating privileges, they managed to change the C:\windows\system32\drivers\etc\hosts file to modify MFA. They redirected the hosts’ file and changed the Duo Server IP to localhost.
This prevented the validation of devices associated with the accounts. Another interesting thing is, Duo has a default value as “Fail Open”. This has disabled MFA authentication for the device while connecting to VPN.
Once they got access to the Virtual Private Network, they used Remote Desktop Protocol to connect to Windows Domain Controller. They used these accounts to move laterally around the organisation.
The following processes might indicate that the systems can be compromised.
Hosts file modifications include
127.0.0.1 api-<redacted>.duosecurity[.]com
The following IP addresses were identified that were used by the threat actors.
The FBI has posted the complete steps to mitigate and check for compromised accounts. Some of them are
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Europol has published a groundbreaking report titled "Leveraging Legitimacy: How the EU’s Most Threatening Criminal Networks…
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National…
In a joint cybersecurity advisory, the FBI, CISA, NSA, and partner agencies from Canada, the…
A high-severity vulnerability has been discovered in the popular web framework, Next.js, which allows attackers…
In a decisive move to bolster cloud security, the Cybersecurity and Infrastructure Security Agency (CISA)…
Fortinet, a global leader in cybersecurity solutions, has issued an urgent security advisory addressing two…