Researchers discovered Chinese state-backed APT Volt Typhoon has been spotted using a critical vulnerability in Zoho’s ManageEngine ADSelfService Plus, a single sign-on and password management solution.
Volt Typhoon came in to limelight recently and the reports detailed a number of Volt Typhoon’s TTPs, including its use of internet-exposed Fortinet FortiGuard devices for initial intrusion, and the hiding of network activity via compromised routers, firewalls, and VPN hardware.
The recent campaign outlined by researchers suggests that Volt Typhoon is flexible, the group utilized CVE-2021-40539 in ManageEngine for intrusion, then masked its Web shell as a legitimate process and erased logs as it went along.
Researchers sensed that the suspicious activity seemed to be emanating from its unidentified client’s network. The unrecognized entity appeared to be performing extensive information-gathering, testing network connectivity, listing processes, gathering user information, and much more. It “indicated a familiarity with the target environment, due to the rapid succession of their commands, as well as having specific internal hostnames and IPs to ping, remote shares to mount, and plaintext credentials to use for WMI.
It turned out that the attacker Volt Typhoon had deployed a webshell to the network a whole six months prior.
With initial access, the attackers were able to drop a Web shell that was attempting to masquerade as a legitimate file of ManageEngine ADSelfService Plus by setting its title to ManageEngine ADSelfService Plus and adding links to legitimate enterprise help desk software.
The group proceeded to enumerate admin credentials and move laterally in the network. The evidence tampering was extensive, nearly eliminating all traces of malicious activity. However, the attackers forgot to erase the Java source code and compiled Class files from their targeted Apache Tomcat Web server.
- Mitigate the risk of compromised valid accounts by enforcing strong MFA
- Reduce the attack surface.
- Block credential stealing from the Windows local security authority subsystem (lsass.exe).
- Block process creations originating from PSExec and WMI commands.
- Block execution of potentially obfuscated scripts.
- Harden the LSASS process by enabling Protective Process Light (PPL) for LSASS on Windows 11 devices. New, enterprise-joined Windows 11 (22H2 update) installs have this feature enabled by default. In addition,
- Enable Windows Defender Credential Guard, which is also turned on by default for organizations using the Enterprise edition of Windows 11.
- Turn on cloud-delivered protection
- Run endpoint detection and response (EDR) in block mode
Indicators of Compromise