Microsoft has published extensive information on new malware it calls FoggyWeb, deployed by Russia-linked threat actors Nobelium who are said to be behind the devastating SolarWinds supply chain attack on corporate and government IT systems worldwide.
FoggyWeb is backdoor used against Active Directory Federation Services servers, which provide single sign-on for users. The malware can be used to remotely exfiltrate sensitive information from AD FS servers compromised by Nobelium. This includes the AD FS server configuration database, decrypted token-signing, and decryption certificates.
FoggyWeb was widely observed and is a highly targeting backdoor capable of exfiltrating sensitive information from a compromised AD FS server. It’s also uses the command & control server to download the additional malicious component and execute into the compromised servers.
Post compromising process, attackers dropping two files in which one has stored a FoggyWeb while other files act as a loader responsible for loading the encrypted FoggyWeb backdoor and decrypting the backdoor using Lightweight Encryption Algorithm (LEA).
Attackers also loading the AD FS service executable with the help of DLL search order hijacking technique.
FoggyWeb can also receive further malware from Nobelium command and control servers and run these on compromised AD FS instances. Customers believed to be attacked by Nobelium and FoggyWeb have been alerted by Microsoft, which recommends that AD FS users take a range of measures to secure their servers.
The company said FoggyWeb is detected by its Defender 365 anti-malware utility.
Mitigations by Microsoft
- ADFS admin rights to be ensured
- Reduce local Administrators’ group membership on all AD FS servers.
- Use MFA as mandate
- Limit on-network access via host firewall.
- Ensure AD FS Admins use isolated workstations to protect their credentials.
- Place AD FS server computer objects in a top-level OU that doesn’t also host other servers.
- Protect signing keys or certificates in a hardware security module (HSM) attached to AD FS.
- Set logging to the highest level and send the AD logs to a SIEM to correlate with AD authentication as well as Azure AD.
- Remove unnecessary protocols and Windows features.
- Use a long (>25 characters) and complex password for the AD FS service account. Group Managed Service Account (gMSA) as the service account recommended, as it removes the need for managing the service account password over time by managing it automatically.
- When federated with Azure AD follow the best practices for securing and monitoring the AD FS trust with Azure AD.
Indicators Of Compromise
|Type||Threat Name||Threat Type||Indicator|