Thursday, January 30, 2025
HomeCyber Security NewsLUCR-3 Attacking Fortune 2000 Companies Using Victims' Own Tools & Apps

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools & Apps

Published on

SIEM as a Service

Follow Us on Google News

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This threat actor surpasses Scatter Spider, Oktapus, UNC3944, and Storm-0875.

LUCR-3 is targeting Fortune 2000 companies in various sectors, which include Software, Retail, Hospitality, Manufacturing, and Telecoms. The threat actor uses existing identities for initial access instead of relying on Malware.

Attributes of LUCR-3

As part of the initial access, the threat actor performs recon on the victim identities to choose the user who will have necessary access for their exploitation.

More often, they rely on social engineering, smashing, or buying the credentials that are available on the deep web marketplace. Most of their victims have been identified as Admins, Developers, Engineers, and the Security team.

LuCR-3
AWS Attacker Lifecycle (Source: Permisio)

The credentials they use are legitimate for connecting to the target network and applications. With these credentials, they perform MFA bypass using various techniques like SIM Swapping, Push Fatigue, Phishing attacks, or buying a social engineer access through insider threats. They also modify MFA settings by registering a new device or adding alternative MFA options. 

R-SaaS & R-AWS (Recon SaaS & Recon AWS)

Moreover, this threat actor has a unique way of understanding the organizations by following a regular employee method – Viewing and searching the documents available on SharePoint, OneDrive, knowledge applications, ticketing solutions, and chat applications that provide in-depth knowledge about the victim organization. This method is carried out in the case of SaaS applications.

In the case of AWS, they leverage the billing and AWS management console for understanding the cloud infrastructure.

They also use Systems Manager (SSM) to run AWS-GatherSoftwareInventory, which will provide complete information about all the EC2 instances and the software running on them.

Persistence in all environments

For gaining persistent access into the compromised systems, the threat actor relies on previously available tools like device registration, alternate MFA, and strong authentication type (from 6 [PhoneAppOTP] to 7 [OneWaySMS]). 

In the case of AWS, the threat actor creates a user, access, and login profile (or updates a login profile). A complete report about this threat actor has been published by Permisio, which provides detailed information about the infiltration, extraction, and other details. 

As part of Defense evasion, LUCR-3 uses GuardDuty disabling, stopping the logging and serial console access. In certain cases, they also send emails relating to helpdesk tickets, the creation of authentication keys, access tokens, and OAuth.

Indicators of Compromise

NameType
P0_AWS_ACCESSKEY_CREATED_1Alert
P0_AWS_CLOUDTRAIL_LOGGING_STOPPED_1Alert
P0_AWS_CLOUDTRAIL_TRAIL_DELETED_1Alert
P0_AWS_EC2_ROOT_USER_SSH_1Alert
P0_AWS_EC2_SERIAL_CONSOLE_ACCESS_ENABLED_1Alert
P0_AWS_GUARDDUTY_STATUS_CHANGED_1Alert
P0_AWS_NEW_USER_CREATED_1Alert
P0_AWS_S3_BROWSER_USERAGENT_1Alert
P0_AWS_SM_GETSECRETVALUE_CLOUDSHELL_1Alert
P0_AZUREAD_MFA_FACTOR_ROTATION_1Alert
P0_AZUREAD_MFA_FACTOR_ROTATION_BY_ADMIN_1Alert
P0_GIT_CLONE_ALLAlert
P0_IDP_MFA_DEVICE_DOWNGRADEAlert
P0_IDP_MFA_ECOSYSTEM_SWITCHAlert
P0_IDP_MFA_EXTERNAL_EMAILAlert
P0_IDP_MFA_MANYUSERS_1DEVICEAlert
P0_INTEL_LUCR3Alert
P0_OKTA_MFA_FACTOR_ROTATION_1Alert
P0_OKTA_MFA_FACTOR_ROTATION_BY_ADMIN_1Alert
P0_SAAS_CREDENTIAL_SEARCHAlert

Source: Permisio

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...