openthreatner / conll /text_33.conll
priamai's picture
Experimental files
8543b6e verified
raw
history blame
11 kB
Russian O
APT29 O
hackers O
' O
stealthy O
malware O
undetected O
for O
years O
O
By O
Ionut O
Ilascu O
O
January O
27 O
, O
2022 O
09:23 O
AM O
0 O
O
Cozy O
Bear O
Russian O
hackers O
camouflage O
new O
malware O
as O
legitimate O
files O
O
EXCLUSIVE O
: O
Hackers O
associated O
with O
the O
Russian O
Federation O
Foreign O
Intelligence O
Service O
( O
SVR O
) O
continued O
their O
incursions O
on O
networks O
of O
multiple O
organizations O
after O
the O
SolarWinds O
supply O
- O
chain O
compromise O
using O
two O
recently O
discovered O
sophisticated O
threats O
. O
O
The O
malicious O
implants O
are O
a O
variant O
of O
the O
GoldMax O
backdoor O
for O
Linux O
systems O
and O
a O
completely O
new O
malware O
family O
that O
cybersecurity O
company O
CrowdStrike O
now O
tracks O
as O
TrailBlazer O
. O
O
Both O
threats O
have O
been O
used O
in O
StellarParticle O
campaigns O
since O
at O
least O
mid-2019 O
but O
were O
identified O
only O
two O
years O
later O
, O
during O
incident O
response O
investigations O
. O
O
StellarParticle O
attacks O
have O
been O
attributed O
to O
the O
APT29 O
hacking O
group O
has O
been O
running O
cyber O
espionage O
campaigns O
for O
more O
than O
12 O
years O
and O
is O
also O
known O
as O
CozyBear O
, O
The O
Dukes O
, O
and O
Yttrium O
. O
O
Stealing O
cookies O
for O
MFA O
bypass O
O
In O
a O
report O
shared O
exclusively O
with O
BleepingComputer O
, O
cybersecurity O
company O
CrowdStrike O
today O
describes O
in O
detail O
the O
latest O
tactics O
, O
techniques O
, O
and O
procedures O
( O
TTPs O
) O
observed O
in O
cyberattacks O
from O
the O
Cozy O
Bear O
state O
- O
sponsored O
hackers O
. O
O
While O
some O
of O
the O
techniques O
are O
somewhat O
common O
today O
, O
Cozy O
Bear O
has O
been O
using O
them O
long O
before O
they O
became O
popular O
: O
O
credential O
hopping O
O
hijacking O
Office O
365 O
( O
O365 O
) O
Service O
Principal O
and O
Application O
O
bypassing O
multi O
- O
factor O
authentication O
( O
MFA O
) O
by O
stealing O
browser O
cookies O
O
stealing O
credentials O
using O
Get O
- O
ADReplAccount O
O
Credential O
hopping O
was O
the O
first O
stage O
of O
the O
attack O
, O
allowing O
the O
threat O
actor O
to O
log O
into O
Office O
365 O
from O
an O
internal O
server O
that O
the O
hackers O
reached O
through O
a O
compromised O
public O
- O
facing O
system O
. O
O
source O
: O
CrowdStrike O
O
CrowdStrike O
says O
that O
this O
technique O
is O
hard O
to O
spot O
in O
environments O
with O
little O
visibility O
into O
identity O
usage O
since O
hackers O
could O
use O
more O
than O
one O
domain O
administrator O
account O
. O
O
Bypassing O
MFA O
to O
access O
cloud O
resources O
by O
stealing O
browser O
cookies O
has O
been O
used O
since O
before O
2020 O
. O
CrowdStrike O
says O
that O
APT29 O
kept O
a O
low O
profile O
after O
decrypting O
the O
authentication O
cookies O
, O
likely O
offline O
, O
by O
using O
the O
Cookie O
Editor O
extension O
for O
Chrome O
to O
replay O
them O
; O
they O
deleted O
the O
extension O
afterward O
. O
O
O
This O
extension O
permitted O
bypassing O
MFA O
requirements O
, O
as O
the O
cookies O
, O
replayed O
through O
the O
Cookie O
Editor O
extension O
, O
allowed O
the O
threat O
actor O
to O
hijack O
the O
already O
MFA O
- O
approved O
session O
of O
a O
targeted O
user O
O
- O
CrowdStrike O
O
This O
allowed O
them O
to O
move O
laterally O
on O
the O
network O
and O
reach O
the O
next O
stage O
of O
the O
attack O
, O
connecting O
to O
the O
victim O
s O
O365 O
tenant O
for O
the O
next O
stage O
of O
the O
attack O
. O
O
CrowdStrike O
s O
report O
describes O
the O
steps O
that O
APT29 O
took O
to O
achieve O
persistence O
in O
a O
position O
that O
allowed O
them O
to O
read O
any O
email O
and O
SharePoint O
or O
OneDrive O
files O
of O
the O
compromised O
organization O
. O
O
GoldMax O
for O
Linux O
and O
TrailBlazer O
O
During O
their O
incident O
response O
work O
on O
APT29 O
StellarParticle O
attacks O
, O
CrowdStrike O
s O
researchers O
used O
the O
User O
Access O
Logging O
( O
UAL O
) O
database O
to O
identify O
earlier O
malicious O
account O
usage O
, O
which O
led O
to O
finding O
the O
GoldMax O
for O
Linux O
and O
TrailBlazer O
malware O
. O
O
CrowdStrike O
says O
that O
TrailBlazer O
is O
a O
completely O
new O
malware O
family O
, O
while O
GoldMax O
for O
Linux O
backdoor O
O
is O
almost O
identical O
in O
functionality O
and O
implementation O
to O
the O
previously O
identified O
May O
2020 O
Windows O
variant O
. O
O
O
The O
researchers O
believe O
that O
the O
little O
differences O
are O
between O
the O
two O
GoldMax O
versions O
are O
due O
to O
the O
continuous O
improvements O
from O
the O
developer O
for O
long O
- O
term O
detection O
evasion O
. O
O
GoldMax O
was O
likely O
used O
for O
persistence O
( O
a O
crontab O
with O
a O
O
@reboot O
O
line O
for O
a O
non O
- O
root O
user O
) O
over O
long O
periods O
in O
StellarParticle O
campaigns O
. O
The O
backdoor O
stayed O
undetected O
by O
posing O
as O
a O
legitimate O
file O
in O
a O
hidden O
directory O
. O
O
The O
TrailBlazer O
implant O
also O
hid O
under O
the O
name O
of O
a O
legitimate O
file O
and O
it O
was O
configured O
for O
persistence O
using O
the O
Windows O
Management O
Instrumentation O
( O
WMI O
) O
Event O
Subscriptions O
, O
a O
relatively O
new O
technique O
in O
2019 O
, O
the O
earliest O
known O
date O
for O
its O
deployment O
on O
victim O
systems O
. O
O
TrailBlazer O
managed O
to O
keep O
communication O
with O
the O
command O
and O
control O
( O
C2 O
) O
server O
covert O
by O
masking O
it O
as O
legitimate O
Google O
Notifications O
HTTP O
requests O
. O
O
CrowdStrike O
notes O
that O
the O
implant O
has O
modular O
functionality O
and O
O
a O
very O
low O
prevalence O
O
and O
that O
it O
shares O
similarities O
with O
other O
malware O
families O
used O
by O
the O
same O
threat O
actor O
, O
such O
as O
GoldMax O
and O
Sunburst O
( O
both O
used O
in O
the O
SolarWinds O
supply O
- O
chain O
attack O
) O
. O
O
Tim O
Parisi O
, O
Director O
of O
Professional O
Services O
at O
CrowdStrike O
, O
told O
BleepingComputer O
that O
the O
covert O
activity O
of O
the O
two O
malware O
pieces O
delayed O
the O
discovery O
of O
the O
two O
malware O
pieces O
, O
as O
the O
researchers O
found O
them O
in O
mid-2021 O
. O
O
Recon O
and O
move O
to O
Office O
365 O
O
After O
gaining O
access O
to O
a O
target O
organization O
s O
infrastructure O
and O
established O
persistence O
, O
APT29 O
hackers O
took O
every O
opportunity O
to O
collect O
intelligence O
that O
would O
allow O
them O
to O
further O
the O
attack O
. O
O
One O
constant O
tactic O
was O
to O
draw O
information O
from O
the O
victim O
s O
internal O
knowledge O
repositories O
, O
the O
so O
- O
called O
wikis O
. O
These O
documents O
can O
hold O
sensitive O
details O
specific O
to O
various O
services O
and O
products O
in O
the O
organization O
. O
O
O
This O
information O
included O
items O
such O
as O
product O
/ O
service O
architecture O
and O
design O
documents O
, O
vulnerabilities O
and O
step O
- O
by O
- O
step O
instructions O
to O
perform O
various O
tasks O
. O
Additionally O
, O
the O
threat O
actor O
viewed O
pages O
related O
to O
internal O
business O
operations O
such O
as O
development O
schedules O
and O
points O
of O
contact O
. O
In O
some O
instances O
these O
points O
of O
contact O
were O
subsequently O
targeted O
for O
further O
data O
collection O
O
- O
CrowdStrike O
O
Parisi O
told O
us O
that O
accessing O
company O
wikis O
was O
a O
common O
APT29 O
reconnaissance O
activity O
in O
the O
investigated O
StellarParticle O
attacks O
. O
O
CrowdStrike O
s O
deep O
dive O
into O
APT29 O
s O
StellarParticle O
campaigns O
offers O
details O
on O
how O
the O
threat O
actor O
connected O
to O
the O
victim O
s O
O365 O
tenant O
through O
the O
Windows O
Azure O
Active O
Directory O
PowerShell O
Module O
, O
and O
performed O
enumeration O
queries O
for O
roles O
, O
members O
, O
users O
, O
domains O
, O
accounts O
, O
or O
a O
service O
principal O
's O
credentials O
. O
O
When O
analyzing O
the O
log O
entries O
, O
the O
researchers O
noticed O
that O
the O
threat O
actor O
also O
executed O
the O
AddServicePrincipalCredentials O
command O
. O
O
O
CrowdStrike O
analyzed O
the O
configuration O
settings O
in O
the O
victim O
s O
O365 O
tenant O
and O
discovered O
that O
a O
new O
secret O
had O
been O
added O
to O
a O
built O
- O
in O
Microsoft O
Azure O
AD O
Enterprise O
Application O
, O
Microsoft O
StaffHub O
Service O
Principal O
, O
which O
had O
Application O
level O
permissions O
O
- O
CrowdSrike O
O
The O
adversary O
had O
added O
a O
new O
secret O
to O
the O
application O
and O
set O
its O
validity O
for O
more O
than O
10 O
years O
, O
the O
researchers O
note O
. O
O
The O
permission O
level O
obtained O
this O
way O
let O
hackers O
access O
all O
mail O
and O
SharePoint O
/ O
OneDrive O
files O
in O
the O
company O
and O
allowed O
them O
to O
O
create O
new O
accounts O
and O
assign O
administrator O
privileges O
to O
any O
account O
in O
the O
organization O
. O
O
O
Maintaining O
persistence O
O
Once O
Cozy O
Bear O
/ O
APT29 O
established O
persistence O
in O
a O
target O
organization O
they O
would O
maintain O
it O
for O
as O
long O
as O
possible O
, O
sometimes O
helped O
by O
the O
poor O
security O
hygiene O
of O
the O
compromised O
organization O
. O
O
The O
longest O
time O
the O
threat O
actor O
spent O
inside O
an O
organization O
was O
two O
years O
, O
Parisi O
told O
BleepingComputer O
. O
Persisting O
this O
long O
would O
not O
be O
possible O
without O
some O
effort O
from O
the O
hackers O
, O
since O
organizations O
often O
rotate O
credentials O
as O
a O
security O
precaution O
. O
O
To O
prevent O
losing O
access O
, O
Cozy O
Bear O
hackers O
would O
periodically O
refresh O
the O
stolen O
credentials O
by O
stealing O
new O
ones O
, O
oftentimes O
via O
Mimikatz O
. O
O
In O
at O
least O
one O
case O
, O
though O
, O
the O
administrators O
of O
the O
compromised O
company O
reset O
their O
passwords O
to O
the O
same O
ones O
, O
thus O
defeating O
the O
purpose O
of O
credential O
rotation O
. O
O
Cozy O
Bear O
hackers O
are O
some O
of O
the O
most O
sophisticated O
threat O
actors O
in O
the O
cyber O
espionage O
world O
, O
with O
top O
skills O
to O
infiltrate O
and O
stay O
undetected O
on O
a O
company O
's O
infrastructure O
for O
long O
periods O
. O
O
During O
the O
StellarParticle O
attacks O
, O
they O
demonstrated O
expert O
knowledge O
in O
Azure O
, O
Office O
365 O
, O
and O
Active O
Directory O
management O
. O