Wednesday, August 17, 2022
Advertisement
Firnco
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
Firnco
No Result
View All Result
Home Cloud Computing

Threat Activity Cluster #5: Pistachio

July 22, 2022
in Cloud Computing
Reading Time: 4 mins read
0
Threat Activity Cluster #5: Pistachio
74
SHARES
1.2k
VIEWS
Share on Twitter



This blog was originally published by Alert Logic here.

Written by Josh Davies and Gareth Protheroe, Alert Logic.

The ice cream blog series continues by documenting another activity cluster first observed in our dataset in 2019. This threat cluster has been well documented in the security community with, APT41, Lead, Wicked Panda, and Vanadinite demonstrating significant overlap in activity, making it likely that each reports activity involving the same threat group. We are grateful for the contributions of these and other threat researchers who have helped inform the security community’s understanding of this actor.


To catch up on the rest of the series, click the links below:


This prominent APT has a footprint across numerous organizations. During our constant threat hunts, we have gleaned information that may complement the existing understanding of this group, due to our unique insight into 40PB of customer threat data ingested monthly. This blog will share our perspective of this advanced persistent threat.

APTs are difficult to detect and even harder to track, as they recycle and modify indicators and TTPs to evade detection and increase their success rate. Therefore, the activity we have observed is better understood as this flavor having a tendency to perform documented actions, rather than there being a definitive pattern. This is a distinct difference from previous threat flavors documented in this series.

A sophisticated threat deserves a sophisticated flavor, so our identifier for this activity cluster is Pistachio.

Exploit

Alert Logic threat hunters identified Pistachio during our emerging threat process when active exploits of CVE-2019-19781 and CVE-2021-26084 first surfaced in January 2020 and September 2021, respectively.

This flavor would target exposed confluence servers and Citrix ADC systems, usually preferring to compromise windows-based systems used by organizations in the healthcare, telecom, technology, and video game industries. The confluence and Citrix ADC exploits allowed for full remote code execution, effectively granting the group complete control of the vulnerable server.

Installation and C2

In the instances where Pistachio was observed among customers, the flavor gained initial access and then abused certutil.exe as part of a “living off the land” attack, using the native command line program intended for certificate services to download a batch script (x.bat) from a host controlled by the group.

The batch script runs commands via PowerShell to download further programs, including a dynamic link library (DLL), which is then installed as a windows service.

The malicious service DLL is unpackaged to launch Cobalt Strike to establish command and control (C2) of the compromised machine. The flavor also uses the known hacker tool, Metasploit, usually to advance further into the network. The C2 profiles observed were intended to look like benign internet traffic and were unlikely to be caught or blacklisted when viewed in isolation.

Utilizing the native programs (certutil and PowerShell) helps to bypass preventative controls (such as EDR) as the attacker masquerades as a legitimate program.

It is worth noting that the certutil abuse and subsequent file download(s) was caught in routine threat hunting activities, not as part of a focused emerging threat, threat hunt. Searching for signs of compromise like this helped provide early warning of the Citrix and Confluence emerging threat.

While those exploits were brand new at the time, threat actors cannot rely entirely on novel tactics throughout the kill chain. This demonstrates the necessity to hunt across the kill chain and the complementary relationship of pairing advanced detection capabilities with preventative tools.

Flavor Infrastructure

Flavor infrastructure is where we have seen the greatest variance. Pistachio frequently moves onto new attacker infrastructure to carry out actions across the kill chain. Monitoring attacker IPs has proven to be inefficient long term, as they are usually only active during small windows.

Pistachio appears to have the ability and resources to take over new hosts and use these in their campaigns. This includes using routers, or an organization’s compromised hosts to take control of more infrastructure, both internally and externally. This is a stark contrast to previous actors we have observed, such as Strawberry, who simply spin up new hosts within the same AWS hosted VPC.

Pistachio, under its many other names, has been determined by other threat researchers as likely a Chinese state sponsored group based on targeted intrusions tending to align with Chinese Communist Party Objectives. Our team has no data to support this attribution, but it has assisted our understanding of the activity cluster.

The geo-locational data of the IP addresses recorded in our dataset and opensource intelligence contain a vast variety of countries with a significant lack of Chinese addresses. The geo-locational data, coupled with the frequent renewal of attacker infrastructure, has led our threat hunters to theorize that there may be a concerted effort to use fewer Chinese IP addresses in order to mask attribution.


About the Authors

Josh Davies is a Product Manager at Alert Logic by HelpSystems. Formerly a Security Analyst and Solutions Architect, Josh has extensive experience working with mid-market and enterprise organisations; conducting incident response and threat hunting activities as an analyst before working with organisations to identify appropriate security solutions for challenges across cloud, on-premises and hybrid environments.

Gareth Protheroe is a Sans certified (GCTI) senior security analyst at Alert Logic by HelpSystems. Gareth has a background in chemical science and currently spearheads Alert Logic’s threat hunting activities conducted by the SOC and threat intelligence teams.



Source link

Tweet19

Recommended For You

Raise and shift Home windows programs to boxes

August 17, 2022
Raise and shift Home windows programs to boxes

There’s an previous adage steadily shared through builders construction on Microsoft platforms: “How are you able to inform if a Microsoft product is in a position for high...

Read more

Kubescape boosts Kubernetes scanning functions

August 17, 2022
Kubescape boosts Kubernetes scanning functions

ARMO, developer of Kubescape, an open supply safety platform for Kubernetes, has added two new vulnerability scanning purposes to the platform.Code repository scanning and container symbol registry scanning...

Read more

AWS Direct Attach vs VPN

August 17, 2022
AWS Direct Attach vs VPN

AWS Direct Attach vs VPN AWS VPN Connection makes use of IPSec to ascertain encrypted community connectivity between the intranet and VPC over the Web. AWS Direct Attach...

Read more

7 unsightly YAML gotchas to steer clear of—and how one can steer clear of them

August 17, 2022
7 unsightly YAML gotchas to steer clear of—and how one can steer clear of them

The YAML (“YAML Ain't Markup Language”) configuration language sits on the center of many fashionable packages together with Kubernetes, Ansible, CircleCI, and Salt. In spite of everything, YAML...

Read more

MAAS (Steel-as-a-Provider) Complete HA Set up — Crying Cloud

August 17, 2022
MAAS (Steel-as-a-Provider) Complete HA Set up — Crying Cloud

This used to be the method I used for putting in MAAS in an HA configuration. Your set up adventure would possibly range, according to configuration alternatives. This...

Read more
Next Post
Microsoft Inspire 2022 – Cloud Marathoner’s Journey

Microsoft Inspire 2022 – Cloud Marathoner's Journey

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

For cyber insurance coverage, some expertise ends up in upper premiums

For cyber insurance coverage, some expertise ends up in upper premiums

August 16, 2022
Optimize Your Hybrid Multicloud for Velocity & Agility – Interconnections

Optimize Your Hybrid Multicloud for Velocity & Agility – Interconnections

August 4, 2022
Google Workspace Updates: Google Workspace Updates Weekly Recap

Google Workspace Updates: Google Workspace Updates Weekly Recap

July 29, 2022

Browse by Category

  • Black Hat
  • Breach
  • Cloud Computing
  • Cloud Security
  • Critical Infrastructure
  • Cybersecurity News
  • Government
  • Hacks
  • InfoSec Insider
  • IoT
  • Malware
  • Malware Alerts
  • Mobile Security
  • News
  • Podcasts
  • Privacy
  • Sponsored
  • Tutorials & Certification
  • Vulnerabilities
  • Web Security
Firnco

© 2022 | Firnco.com

66 W Flagler Street, suite 900 Miami, FL 33130

  • About Us
  • Home
  • Privacy Policy

305-647-2610 [email protected]

No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification

© 2022 | Firnco.com

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?