www.cisa.gov Open in urlscan Pro
2a02:26f0:6c00:28e::447a  Public Scan

Submitted URL: https://us-cert.cisa.gov/ncas/alerts/aa20-275a
Effective URL: https://www.cisa.gov/uscert/ncas/alerts/aa20-275a
Submission: On April 27 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://search.us-cert.gov/search

<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-xs searchbox" method="get"><input name="utf8" type="hidden" value="✓"><input id="affiliate-desktop" name="affiliate" type="hidden" value="us-cert">
  <div class="form-group"><label class="sr-only" for="query-desktop">Enter Search Terms(s):</label>
    <div class="input-group"><input autocomplete="off" class="form-control form-control-custom input-lg" id="query-desktop" name="query" placeholder="Search" type="text">
      <div class="input-group-addon input-group-addon-custom"><button class="submit input-lg"><img alt="search icon" data-entity-type="" data-entity-uuid="" src="/sites/default/files/cert/search-icon.png" title="search icon"></button></div>
    </div>
  </div>
</form>

GET https://search.us-cert.gov/search

<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-lg hidden-md searchbox" method="get"><input name="utf8" type="hidden" value="✓"><input id="affiliate-mobile" name="affiliate" type="hidden" value="us-cert">
  <div class="form-group"><label class="sr-only" for="query-mobile">Enter Search Terms(s):</label>
    <div class="input-group"><input autocomplete="off" class="form-control form-control-custom input-lg" id="query-mobile" name="query" placeholder="Search" type="text">
      <div class="input-group-addon input-group-addon-custom"><button class="submit input-lg"><img alt="search icon" data-entity-type="" data-entity-uuid="" src="/sites/default/files/cert/search-icon.png" title="search icon"></button></div>
    </div>
  </div>
</form>

https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify

<form action="https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify"><label class="visually-hidden" for="email-address-field">Enter your email address</label> <input class="signup-form" id="email-address-field" name="email"
    placeholder=" Enter your email address" title="Enter your email address" type="text"><br><input class="btn btn-primary" name="submit" title="Sign up for alerts" type="submit" value="Sign Up">&nbsp;</form>

Text Content

Skip to main content

An official website of the United States government Here's how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share
sensitive information only on official, secure websites.
Enter Search Terms(s):

CISA.gov Services Report

--------------------------------------------------------------------------------

Toggle navigation

Enter Search Terms(s):

CISA.gov
Services
Report


CERTMAIN MENU

 * Alerts and Tips
 * Resources
 * Report
 * Industrial Control Systems

--------------------------------------------------------------------------------


TLP:WHITE
TLP:WHITE
 1. National Cyber Awareness System    >
 2. Alerts    >
 3. Potential for China Cyber Response to Heightened U.S.–China Tensions

More Alerts


ALERT (AA20-275A)


POTENTIAL FOR CHINA CYBER RESPONSE TO HEIGHTENED U.S.–CHINA TENSIONS

Original release date: October 01, 2020 | Last revised: October 20, 2020



SUMMARY

This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge
(ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced
threat actor techniques.

Note: on October 20, 2020, the National Security Agency (NSA) released a
cybersecurity advisory providing information on publicly known vulnerabilities
exploited by Chinese state-sponsored cyber actors to target computer networks
holding sensitive intellectual property, economic, political, and military
information. This Alert has been updated to include information on
vulnerabilities exploited by Chinese state-sponsored actors (see Table 4).

In light of heightened tensions between the United States and China, the
Cybersecurity and Infrastructure Security Agency (CISA) is providing specific
Chinese government and affiliated cyber threat actor tactics, techniques, and
procedures (TTPs) and recommended mitigations to the cybersecurity community to
assist in the protection of our Nation’s critical infrastructure. In addition to
the recommendations listed in the Mitigations section of this Alert, CISA
recommends organizations take the following actions.

 1. Adopt a state of heightened awareness. Minimize gaps in personnel
    availability, consistently consume relevant threat intelligence, and update
    emergency call trees.
 2. Increase organizational vigilance. Ensure security personnel monitor key
    internal security capabilities and can identify anomalous behavior. Flag any
    known Chinese indicators of compromise (IOCs) and TTPs for immediate
    response.
 3. Confirm reporting processes. Ensure personnel know how and when to report an
    incident. The well-being of an organization’s workforce and cyber
    infrastructure depends on awareness of threat activity. Consider reporting
    incidents to CISA to help serve as part of CISA’s early warning system (see
    the Contact Information section below).
 4. Exercise organizational incident response plans. Ensure personnel are
    familiar with the key steps they need to take during an incident. Do they
    have the accesses they need? Do they know the processes? Are various data
    sources logging as expected? Ensure personnel are positioned to act in a
    calm and unified manner.


TECHNICAL DETAILS

CHINA CYBER THREAT PROFILE

China has a history of using national military and economic resources to
leverage offensive cyber tactics in pursuing its national interests. The “Made
in China 2025” 10-year plan outlines China’s top-level policy priorities.[1],[2]
China may seek to target the following industries deemed critical to U.S.
national and economic interests: new energy vehicles, next generation
information technology (IT), biotechnology, new materials, aerospace, maritime
engineering and high-tech ships, railway, robotics, power equipment, and
agricultural machinery.[3] China has exercised its increasingly sophisticated
capabilities to illegitimately obtain U.S. intellectual property (IP), suppress
both social and political perspectives deemed dangerous to China, and harm
regional and international opponents.

The U.S. Intelligence Community and various private sector threat intelligence
organizations have identified the Chinese People’s Liberation Army (PLA) and
Ministry of State Security (MSS) as driving forces behind Chinese
state-sponsored cyberattacks–either through contractors in the Chinese private
sector or by the PLA and MSS entities themselves. China continues to engage in
espionage-related activities that include theft of sensitive information such as
innovation capital, IP, and personally identifiable information (PII). China has
demonstrated a willingness to push the boundaries of their activities to secure
information critical to advancing their economic prowess and competitive
advantage.

CHINESE CYBER ACTIVITY

According to open-source reporting, offensive cyber operations attributed to the
Chinese government targeted, and continue to target, a variety of industries and
organizations in the United States, including healthcare, financial services,
defense industrial base, energy, government facilities, chemical, critical
manufacturing (including automotive and aerospace), communications, IT,
international trade, education, videogaming, faith-based organizations, and law
firms.

Additionally, numerous Department of Justice (DOJ) indictments over several
years provide evidence to suggest Chinese threat actors continuously seek to
illegally obtain and exfiltrate U.S. IP. Their targets also include western
companies with operations inside China.

Public reporting that associates Chinese actors with a range of high-profile
attacks and offensive cyber activity includes:

 * February 2013 – Cyber Threat Intelligence Researchers Link Advanced
   Persistent Threat (APT) 1 to China: a comprehensive report publicly exposed
   APT1 as part of China’s military cyber operations and a multi-year effort
   that exfiltrated IP from roughly 141 companies spanning 20 major
   industries.[4(link is external)] APT1 established access to the victims’
   networks and methodically exfiltrated IP across a large range of industries
   identified in China’s 12th 5-Year Plan. A year later, the DOJ indicted
   Chinese cyber threat actors assigned to PLA Unit 61398 for the first time
   (also highlighted in the report).[5]
 * April 2017 – Chinese APTs Targeting IP in 12 Countries: CISA announced
   Chinese state-backed APTs carried out a multi-year campaign of cyber-enabled
   IP theft that targeted global technology service providers and their
   customers. The threat actors leveraged stolen administrative credentials
   (local and domain) and placed sophisticated malware on critical systems in an
   effort to steal the IP and sensitive data of companies located in at least 12
   countries.[6]
 * December 2018 – Chinese Cyber Threat Actors Indicted for Compromising Managed
   Service Providers (MSPs): DOJ indicted two Chinese cyber threat actors
   believed to be associated with APT10, who targeted MSPs and their large
   customer base through phishing and spearphishing campaigns aimed at
   exfiltrating sensitive business data and, possibly, PII.[7] CISA also briefed
   stakeholders on Chinese APT groups who targeted MSPs and their customers to
   steal data and further operationalize commercial and economic espionage.[8]
 * February 2020 – China’s Military Indicted for 2017 Equifax Hack: DOJ indicted
   members of China’s PLA for stealing large amounts of PII and IP. The Chinese
   cyber threat actors exploited a vulnerability in the company’s dispute
   resolution website to enter the network, conduct reconnaissance, upload
   malware, and steal credentials to extract the targeted data. The breach
   impacted roughly half of all American citizens and stole Equifax’s trade
   secrets.[9]
 * May 2020 – China Targets COVID-19 Research Organizations: the Federal Bureau
   of Investigation (FBI) and CISA reported the targeting and compromise of U.S.
   organizations conducting COVID-19-related research by cyber actors affiliated
   with China.[10] Large-scale password spraying campaigns were a commonly
   observed tactic in illicitly obtaining IP related to vaccines, treatments,
   and testing from networks and personnel affiliated with COVID-19-related
   research.[11],[12]

COMMON TTPS OF PUBLICLY KNOWN CHINESE THREAT ACTORS

The section below provides common, publicly known, TTPs employed by Chinese
threat actors, which map to the MITRE ATT&CK framework. Where possible, the
tables include actions for detection and mitigation. This section is not
exhaustive and does not detail all TTPs or detection and mitigation actions.   

PRE-ATT&CK TTPS

Chinese threat actors commonly use the techniques listed in table 1 to achieve
reconnaissance (Technical Information Gathering [TA0015]), staging (Stage
Capabilities [TA0026]), and testing (Test Capabilities [TA0025]) before
executing an attack. PRE-ATT&CK techniques can be difficult to detect and
mitigate, however, defenders should be aware of the use of these techniques.

Table 1: Chinese threat actor PRE-ATT&CK techniques

Technique Description Acquire and/or Use 3rd Party Software Services [T1330]
Staging and launching attacks from software as a service solutions that cannot
be easily tied back to the APT Compromise 3rd Party Infrastructure to Support
Delivery [T1334] Compromising infrastructure owned by other parties to
facilitate attacks (instead of directly purchasing infrastructure) Domain
Registration Hijacking [T1326] Changing the registration of a domain name
without the permission of its original registrant and then using the legitimate
domain as a launch point for malicious purposes Acquire Open-Source Intelligence
(OSINT) Data Sets and Information [T1247] Gathering data and information from
publicly available sources, including public-facing websites of the target
organization Conduct Active Scanning [T1254] Gathering information on target
systems by scanning the systems for vulnerabilities. Adversaries are likely
using tools such as Shodan to identify vulnerable devices connected to the
internet Analyze Architecture and Configuration Posture [T1288] Analyzing
technical scan results to identify architectural flaws, misconfigurations, or
improper security controls in victim networks Upload, Install, and Configure
Software/Tools [T1362] Placing malware on systems illegitimately for use during
later stages of an attack to facilitate exploitability and gain remote access

ENTERPRISE ATT&CK TTPS

Chinese threat actors often employ publicly known TTPs against enterprise
networks. To orchestrate attacks, they use commonly implemented security testing
tools and frameworks, such as:

 * Cobalt Strike and Beacon
 * Mimikatz
 * PoisonIvy
 * PowerShell Empire
 * China Chopper Web Shell

Table 2 lists common, publicly known, TTPs used by Chinese threat actors against
enterprise networks and provides options for detection and mitigation based on
the MITRE ATT&CK framework.

Table 2: Common Chinese threat actor techniques, detection, and mitigation

Technique / Sub-Technique Detection Mitigation Obfuscated Files or Information
[T1027]
 * Detect obfuscation by analyzing signatures of modified files.
 * Flag common syntax used in obfuscation.

 * Use antivirus/antimalware software to analyze commands after processing.

Phishing: Spearphishing Attachment [T1566.001] and Spearphishing Link
[T1566.002]
 * Use network intrusion detection systems (NIDS) and email gateways to detect
   suspicious attachments in email entering the network.
 * Use detonation chambers to inspect email attachments in isolated
   environments.

 * Quarantine suspicious files with antivirus solutions.
 * Use network intrusion prevention systems to scan and remove malicious email
   attachments.
 * Train users to identify phishing emails and notify IT.

System Network Configuration Discovery [T1016]
 * Monitor for processes and command-line arguments that could be used by an
   adversary to gather system and network information.

 * This technique is difficult to mitigate with preventative controls;
   organizations should focus on detecting and responding to malicious activity
   to limit impact.

Command and Scripting Interpreter: Windows Command Shell [T1059.003]
 * Identify normal scripting behavior on the system then monitor processes and
   command-line arguments for suspicious script execution behavior.

 * Only permit execution of signed scripts.
 * Disable any unused shells or interpreters.
   
    

User Execution: Malicious File [T1204.002]
 * Monitor execution of command-line arguments for applications (including
   compression applications) that may be used by an adversary to execute a user
   interaction.
 * Set antivirus software to detect malicious documents and files downloaded and
   installed on endpoints.

 * Use execution prevention to prevent the running of executables disguised as
   other files.
 * Train users to identify phishing attacks and other malicious events that may
   require user interaction.

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
[T1547.001]
 * Monitor the start folder for additions and changes.
 * Monitor registry for changes to run keys that do not correlate to known
   patches or software updates.

 * This technique is difficult to mitigate with preventative controls;
   organizations should focus on detecting and responding to malicious activity
   to limit impact.

Command and Scripting Interpreter: PowerShell [T1059.001]
 * Enable PowerShell logging.
 * Monitor for changes in PowerShell execution policy as a method of identifying
   malicious use of PowerShell.
 * Monitor for PowerShell execution generally in environments where PowerShell
   is not typically used.

 * Set PowerShell execution policy to execute only signed scripts.
 * Disable PowerShell if not needed by the system.
 * Disable WinRM service to help prevent use of PowerShell for remote execution.
 * Restrict PowerShell execution policy to administrators.

Hijack Execution Flow: DLL Side-Loading [T1574.002]
 * Track Dynamic Link Library (DLL) metadata, and compare DLLs that are loaded
   at process execution time against previous executions to detect usual
   differences unrelated to patching.

 * Use the program sxstrace.exe to check manifest files for side-loading
   vulnerabilities in software.
 * Update software regularly including patches for DLL side-loading
   vulnerabilities.

Ingress Tool Transfer [T1105]
 * Monitor for unexpected file creation or files transfer into the network from
   external systems, which may be indicative of attackers staging tools in the
   compromised environment.
 * Analyze network traffic for unusual data flows (i.e., a client sending much
   more data than it receives from a server).

 * Use network intrusion detection and prevention systems to identify traffic
   for specific adversary malware or unusual data transfer over protocols such
   as File Transfer Protocol.

Remote System Discovery [T1018]
 * Monitor processes and command-line arguments for actions that could be taken
   to gather system and network information.
 * In cloud environments, usage of commands and application program interfaces
   (APIs) to request information about remote systems combined with additional
   unexpected commands may be a sign of malicious use.

 * This technique is difficult to mitigate with preventative controls;
   organizations should focus on detecting and responding to malicious activity
   to limit impact.

Software Deployment Tools [T1072]
 * Identify the typical use pattern of third-party deployment software, then
   monitor for irregular deployment activity.

 * Isolate critical network systems access using group policies, multi-factor
   authentication (MFA), and firewalls.
 * Patch deployment systems regularly.
 * Use unique and limited credentials for access to deployment systems.

Brute Force: Password Spraying [T1110.003]
 * Monitor logs for failed authentication attempts to valid accounts.

 * Use MFA.
 * Set account lockout policies after a certain number of failed login attempts.

Network Service Scanning [T1046]
 * Use NIDS to identify scanning activity.

 * Close unnecessary ports and services.
 * Segment network to protect critical servers and devices.

Email Collection [T1114]
 * Monitor processes and command-line arguments for actions that could be taken
   to gather local email files.

 * Encrypt sensitive emails.
 * Audit auto-forwarding email rules regularly.
 * Use MFA for public-facing webmail servers.

Proxy: External Proxy [T1090.002]
 * Analyze network data for uncommon data flows, such as a client sending
   significantly more data than it receives from an external server.

 * Use NIDS and prevention systems to identify traffic for specific adversary
   malware using network signatures.

Drive-by Compromise [T1189]
 * Use Firewalls and proxies to inspect URLs for potentially known-bad domains
   or parameters.
 * Monitor network intrusion detection systems (IDS) to detect malicious
   scripts, and monitor endpoints for abnormal behavior.

 

 * Isolate and sandbox impacted systems and applications to restrict the spread
   of malware.
 * Leverage security applications to identify malicious behavior during
   exploitation.
 * Restrict web-based content through ad-blockers and script blocking
   extensions.

Server Software Component: Web Shell [T1505.003]
 * Analyze authentication logs, files, netflow/enclave netflow, and leverage
   process monitoring to discover anomalous activity.

 * Patch vulnerabilities in internet facing applications.
 * Leverage file integrity monitoring to identify file changes.
 * Configure server to block access to the web accessible directory through
   principle of least privilege.

Application Layer Protocol: File Transfer Protocols [T1071.002] and DNS
[T1071.004]
 * Analyze network data for uncommon data flows (e.g., a client sending
   significantly more data than it receives from a server).
 * Analyze packet contents to detect application layer protocols that do not
   follow the expected protocol standards regarding syntax, structure, or any
   other variable adversaries could leverage to conceal data.

 * Leverage NIDS and NIPS using network signatures to identify traffic for
   specific adversary malware.

ADDITIONAL APT ACTIVITY

The TTPs listed above have been repeatedly used across the spectrum of Chinese
threat actors. The mitigations referenced in this alert can help reduce
vulnerability to these TTPs; however, defenders should also maintain heightened
awareness of threats actors that are more innovative in their approach, making
it difficult to detect and respond to compromise. Publicly reported
examples[13(link is external)] include:

 * APT3 (known as UPS Team) is known for deploying zero-day attacks that target
   Internet Explorer, Firefox, and Adobe Flash Player. The group’s custom
   implants and changing Command and Control (C2) infrastructure make them
   difficult to track. APT3 exploits use Rivest Cypher 4 (RC4) encryption to
   communicate and bypass address space layout randomization (ASLR)/Data
   Execution Prevention (DEP) by using Return Oriented Programming (ROP)
   chains.[14]
 * APT10 (known as MenuPass Group) has established accessed to victim networks
   through compromised service providers, making it difficult for network
   defenders to identify the malicious traffic.
 * APT19 (known as Codoso and Deep Panda) is known for developing custom Rich
   Text Format (RTF) and macro-enabled Microsoft Office documents for both
   implants and payloads. The group has backdoored software, such as software
   serial generators, and has an elite use of PowerShell for C2 over Hyper Text
   Transfer Protocol (HTTP)/Hyper Text Transfer Protocol Secure (HTTPS).[15]
 * APT40 (known as Leviathan) has targeted external infrastructure with success,
   including internet-facing routers and virtual private networks.
 * APT41 (known as Double Dragon) has exploited vulnerabilities in Citrix
   NetScaler/ADC, Cisco routers, and Zoho ManageEngine Desktop Central to
   compromise victims.[16]


MITIGATIONS


RECOMMENDED ACTIONS

The following list provides actionable technical recommendations for IT security
professionals to reduce their organization’s overall vulnerability. These
recommendations are not exhaustive; rather they focus on the actions that will
greatly reduce stakeholders’ attack surface.

 1. Patch systems and equipment promptly and diligently. Establishing and
    consistently maintaining a thorough patching cycle continues to be the best
    defense against adversary TTPs. Focus on patching critical and high
    vulnerabilities that allow for remote code execution or denial-of-service on
    externally-facing (i.e., internet) equipment. Certain
    vulnerabilities—including CVE-2012-0158 in Microsoft products [17],
    CVE-2019-19781 in Citrix devices [18], and CVE-2020-5902 in BIG-IP Traffic
    Management User Interface [19]—have presented APTs with prime targets to
    gain initial access. Chinese APTs often use existing exploit code to target
    routinely exploited vulnerabilities [20], which present an opportunistic
    attack that requires limited resources. See table 3 for patch information on
    CVEs that have been routinely exploited by Chinese APTs. See table 4 for
    patch information on vulnerabilities that the National Security Agency (NSA)
    has stated are actively used by Chinese state-sponsored cyber actors.

Table 3: Patch information for vulnerabilities routinely exploited by Chinese
APT actors

Vulnerability Vulnerable Products Patch Information CVE-2012-0158

Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003
Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2;
BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and
R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0

 * Microsoft Security Bulletin MS12-027: Vulnerability in Windows Common
   Controls Could Allow Remote Code Execution(link is external)

CVE-2020-5902
 * Big-IP devices (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS,
   FPS, GTM, Link Controller, PEM, SSLO, CGNAT)

 * F5 Security Advisory: K52145254: TMUI RCE vulnerability CVE-2020-5902(link is
   external)

CVE-2019-19781  
 * Citrix Application Delivery Controller
 * Citrix Gateway
 * Citrix SDWAN WANOP

 

 
 * Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway versions
   11.1 and 12.0(link is external)
 * Citrix blog post: security updates for Citrix SD-WAN WANOP release 10.2.6 and
   11.0.3(link is external)
 * Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway versions
   12.1 and 13.0(link is external)
 * Citrix blog post: firmware updates for Citrix ADC and Citrix Gateway version
   10.5(link is external)

CVE-2019-11510  
 * Pulse Connect Secure 9.0R1 - 9.0R3.3, 8.3R1 - 8.3R7, 8.2R1 - 8.2R12, 8.1R1 -
   8.1R15
 * Pulse Policy Secure 9.0R1 - 9.0R3.1, 5.4R1 - 5.4R7, 5.3R1 - 5.3R12, 5.2R1 -
   5.2R12, 5.1R1 - 5.1R15

 * Pulse Secure Out-of-Cycle Advisory: Multiple vulnerabilities resolved in
   Pulse Connect Secure / Pulse Policy Secure 9.0RX(link is external)

CVE-2019-16920
 * D-Link products DIR-655C, DIR-866L, DIR-652, DHP-1565, DIR-855L, DAP-1533,
   DIR-862L, DIR-615, DIR-835, and DIR-825

 * D-Link Security Advisory: DAP-1533 Rv Ax, DGL-5500 Rv Ax, DHP-1565 Rv Ax,
   DIR-130 Rv Ax, DIR-330 Rv Ax, DIR-615 Rv Ix, (non-US) DIR-652 Rv Bx, DIR-655
   Rv Cx, DIR-825 Rv Cx, DIR-835 Rv Ax, DIR-855L Rv Ax, (non-US) DIR-862 Rv Ax,
   DIR-866L Rv Ax :: CVE-2019-16920 :: Unauthenticated Remote Code Execution
   (RCE) Vulnerability(link is external)

CVE-2019-16278
 * Nostromo 1.9.6 and below

 * Nostromo 1.9.6 Directory Traversal/ Remote Command Execution(link is
   external)
 * Nostromo 1.9.6 Remote Code Execution(link is external)

 

CVE-2019-1652
 * Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers

 * Cisco Security Advisory: Cisco Small Business RV320 and RV325 Routers Command
   Injection Vulnerability(link is external)

CVE-2019-1653
 * Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers

 * Cisco Security Advisory: Cisco Small Business RV320 and RV325 Routers
   Information Disclosure Vulnerability(link is external)

CVE-2020-10189
 * Zoho ManageEngine Desktop Central before 10.0.474

 * ManageEngine Desktop Central remote code execution vulnerability
   (CVE-2020-10189)(link is external)

 

Table 4: Patch information for NSA listed vulnerabilities used by Chinese
state-sponsored cyber actors [21]

Vulnerability Vulnerable Products Patch Information CVE-2020-8193
 * Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18,
   12.0-63.21, 11.1-64.14 and 10.5-70.18
 * Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7

 * Citrix Security Bulletin CTX276688(link is external)

CVE-2020-8195
 * Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18,
   12.0-63.21, 11.1-64.14 and 10.5-70.18
 * Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7

 * Citrix Security Bulletin CTX276688(link is external)

CVE-2020-8196
 * Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18,
   12.0-63.21, 11.1-64.14 and 10.5-70.18
 * Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7

 

 * Citrix Security Bulletin CTX276688(link is external)

CVE-2019-0708
 * Windows 7 for 32-bit Systems Service Pack 1
 * Windows 7 for x64-based Systems Service Pack 1
 * Windows Server 2008 for 32-bit Systems Service Pack 2
 * Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 for Itanium-Based Systems Service Pack 2
 * Windows Server 2008 for x64-based Systems Service Pack 2
 * Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
   installation)

 * Microsoft Security Advisory for CVE-2019-0708(link is external)

CVE-2020-15505
 * MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0,
   10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0
 * Sentry versions 9.7.2 and earlier, and 9.8.0;
 * Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier

 * MobileIron Blog: MobileIron Security Updates Available(link is external)

CVE-2020-1350
 * Windows Server 2008 for 32-bit Systems Service Pack 2
 * Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 for x64-based Systems Service Pack 2
 * Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
   installation)
 * Windows Server 2012
 * Windows Server 2012 (Server Core installation)
 * Windows Server 2012 R2
 * Windows Server 2012 R2 (Server Core installation)
 * Windows Server 2016
 * Windows Server 2016 (Server Core installation)
 * Windows Server 2019
 * Windows Server 2019 (Server Core installation)
 * Windows Server, version 1903 (Server Core installation)
 * Windows Server, version 1909 (Server Core installation)
 * Windows Server, version 2004 (Server Core installation)

 
 * Microsoft Security Advisory for CVE-2020-1350(link is external)

 

CVE-2020-1472
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
   installation)
 * Windows Server 2012
 * Windows Server 2012 (Server Core installation)
 * Windows Server 2012 R2
 * Windows Server 2016
 * Windows Server 2019
 * Windows Server 2019 (Server Core installation)
 * Windows Server, version 1903  (Server Core installation)
 * Windows Server, version 1909  (Server Core installation)
 * Windows Server, version 2004   (Server Core installation)

 

 * Microsoft Security Advisory for CVE-2020-1472(link is external)
   
    

CVE-2020-1040
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
   installation)
 * Windows Server 2012
 * Windows Server 2012 (Server Core installation)
 * Windows Server 2012 R2
 * Windows Server 2012 R2 (Server Core installation)
 * Windows Server 2016
 * Windows Server 2016 (Server Core installation)

 * Microsoft Security Advisory for CVE-2020-1040(link is external)

CVE-2018-6789
 * Exim before 4.90.1

 * Exim page for CVE-2020-6789
 * Exim patch information for CVE-2020-6789

CVE-2020-0688
 * Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30
 * Microsoft Exchange Server 2013 Cumulative Update 23
 * Microsoft Exchange Server 2016 Cumulative Update 14
 * Microsoft Exchange Server 2016 Cumulative Update 15
 * Microsoft Exchange Server 2019 Cumulative Update 3
 * Microsoft Exchange Server 2019 Cumulative Update 4

 * Microsoft Security Advisory for CVE-2020-0688(link is external)

CVE-2018-4939
 * ColdFusion Update 5 and earlier versions
 * ColdFusion 11 Update 13 and earlier versions

 * Adobe Security Bulletin APSB18-14(link is external)

CVE-2015-4852
 * Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0

 * Oracle Critical Patch Update Advisory - October 2016(link is external)

CVE-2020-2555
 * Oracle Coherence product of Oracle Fusion Middleware Middleware; versions
   3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0.

 * Oracle Critical Patch Update Advisory - January 2020(link is external)

CVE-2019-3396
 * Atlassian Confluence Server before version 6.6.12, from version 6.7.0 before
   6.12.3, from version 6.13.0 before 6.13.3), and from version 6.14.0 before
   6.14.2

 * Jira Atlassian Confluence Sever and Data Center: Remote code execution via
   Widget Connector macro - CVE-2019-3396(link is external)

CVE-2019-11580
 * Atlassian Crowd and Crowd Data Center from version 2.1.0 before 3.0.5, from
   version 3.1.0 before 3.1.6, from version 3.2.0 before 3.2.8, from version
   3.3.0 before 3.3.5, and from version 3.4.0 before 3.4.4

 * Jira Atlassian Crowd: Crowd - pdkinstall development plugin incorrectly
   enabled - CVE-2019-11580(link is external)

CVE-2020-10189
 * Zoho ManageEngine Desktop Central before 10.0.474

 * ManageEngine Desktop Central remote code execution vulnerability
   (CVE-2020-10189)(link is external)

CVE-2019-18935
 * Progress Telerik UI for ASP.NET AJAX through 2019.3.1023

 * Telerik: ASP.NET AJAX: Allows JavaScriptSerializer Deserialization(link is
   external)

CVE-2020-0601
 * Windows 10 for 32-bit Systems
 * Windows 10 for x64-based Systems
 * Windows 10 Version 1607 for 32-bit Systems
 * Windows 10 Version 1607 for x64-based Systems
 * Windows 10 Version 1709 for 32-bit Systems
 * Windows 10 Version 1709 for ARM64-based Systems
 * Windows 10 Version 1709 for x64-based Systems
 * Windows 10 Version 1803 for 32-bit Systems
 * Windows 10 Version 1803 for ARM64-based Systems
 * Windows 10 Version 1803 for x64-based Systems
 * Windows 10 Version 1809 for 32-bit Systems
 * Windows 10 Version 1809 for ARM64-based Systems
 * Windows 10 Version 1809 for x64-based Systems
 * Windows 10 Version 1903 for 32-bit Systems
 * Windows 10 Version 1903 for ARM64-based Systems
 * Windows 10 Version 1903 for x64-based Systems
 * Windows 10 Version 1909 for 32-bit Systems
 * Windows 10 Version 1909 for ARM64-based Systems
 * Windows 10 Version 1909 for x64-based Systems
 * Windows Server 2016
 * Windows Server 2016 (Server Core installation)
 * Windows Server 2019
 * Windows Server 2019 (Server Core installation)
 * Windows Server, version 1803 (Server Core Installation)
 * Windows Server, version 1903 (Server Core installation)
 * Windows Server, version 1909 (Server Core installation)

 * Microsoft Security Advisory for CVE-2020-0601(link is external)

CVE-2019-0803
 * Windows 10 for 32-bit Systems
 * Windows 10 for x64-based Systems
 * Windows 10 Version 1607 for 32-bit Systems
 * Windows 10 Version 1607 for x64-based Systems
 * Windows 10 Version 1703 for 32-bit Systems
 * Windows 10 Version 1703 for x64-based Systems
 * Windows 10 Version 1709 for 32-bit Systems
 * Windows 10 Version 1709 for ARM64-based Systems
 * Windows 10 Version 1709 for x64-based Systems
 * Windows 10 Version 1803 for 32-bit Systems
 * Windows 10 Version 1803 for ARM64-based Systems
 * Windows 10 Version 1803 for x64-based Systems
 * Windows 10 Version 1809 for 32-bit Systems
 * Windows 10 Version 1809 for ARM64-based Systems
 * Windows 10 Version 1809 for x64-based Systems
 * Windows 7 for 32-bit Systems Service Pack 1
 * Windows 7 for x64-based Systems Service Pack 1
 * Windows 8.1 for 32-bit systems
 * Windows 8.1 for x64-based systems
 * Windows RT 8.1
 * Windows Server 2008 for 32-bit Systems Service Pack 2
 * Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 for Itanium-Based Systems Service Pack 2
 * Windows Server 2008 for x64-based Systems Service Pack
 * Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
   installation)
 * Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1
 * Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
   installation)
 * Windows Server 2012
 * Windows Server 2012 (Server Core installation)
 * Windows Server 2012 R2
 * Windows Server 2012 R2 (Server Core installation)
 * Windows Server 2016
 * Windows Server 2016 (Server Core installation)
 * Windows Server 2019
 * Windows Server 2019 (Server Core installation)
 * Windows Server, version 1803 (Server Core Installation)

 * Microsoft Security Advisory for CVE-2019-0803(link is external)

 

CVE-2017-6327
 * Symantec Messaging Gateway before 10.6.3-267

 * Broadcom Security Updates Detial for CVE-2017-6327 and CVE-2017-6328 (link is
   external)

CVE-2020-3118
 * ASR 9000 Series Aggregation Services Routers
 * Carrier Routing System (CRS)
 * IOS XRv 9000 Router
 * Network Convergence System (NCS) 540 Series Routers
 * NCS 560 Series Routers
 * NCS 1000 Series Routers
 * NCS 5000 Series Routers
 * NCS 5500 Series Routers
 * NCS 6000 Series Routers

 * Cisco Security Advisory cisco-sa-20200205-iosxr-cdp-rce(link is external)

CVE-2020-8515
 * DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta,
   1.4.2.1_Beta, and 1.4.4_Beta devices

 * Draytek Security Advisory: Vigor3900 / Vigor2960 / Vigor300B Router Web
   Management Page Vulnerability (CVE-2020-8515)(link is external)

 

 2. Implement rigorous configuration management programs. Audit configuration  
    management programs to ensure they can track and mitigate emerging threats.
    Review system configurations for misconfigurations and security weaknesses.
    Implementing a robust configuration and patch management program hinders
    sophisticated APT operations by limiting the effectiveness of opportunistic
    attacks.
     
 3. Disable unnecessary ports, protocols, and services. Review network security
    device logs and determine whether to shut off unnecessary ports and
    protocols. Monitor common ports and protocols for C2 activity. Turn off or
    disable any unnecessary services or functionality within devices (e.g.,
    universal plug and play [UPnP], PowerShell).
     
 4. Enhance monitoring of network and email traffic. Review network signatures
    and indicators for focused operations activities, monitor for new phishing
    themes, and adjust email rules accordingly. Follow best practices of
    restricting attachments via email. Ensure that log information is aggregated
    and correlated to enable maximum detection capabilities, with a focus on
    monitoring for account misuse.
     
 5. Use protection capabilities to stop malicious activity. Implement antivirus
    software and other endpoint protection capabilities to automatically detect
    and prevent malicious files from executing. Use network intrusion detection
    and prevention systems to identify and prevent commonly employed adversarial
    malware and limit nefarious data transfers.


CONTACT INFORMATION

CISA encourages recipients of this report to contribute any additional
information that they may have related to this threat. For any questions related
to this report, please contact CISA at:

 * 1-888-282-0870 (From outside the United States: +1-703-235-8832)
 * Central@cisa.dhs.gov(link sends email) (UNCLASS)

CISA encourages you to report any suspicious activity, including cybersecurity
incidents, possible malicious code, software vulnerabilities, and
phishing-related scams. Reporting forms can be found on the CISA homepage at
http://www.us-cert.cisa.gov/.


REFERENCES

[1] White House Publication: How China’s Economic Aggression Threatens the Tech…
[2] Congressional Research Services: 'Made in China 2025' Industrial Policies: …
[3] Council on Foreign Relations: Is ‘Made in China 2025’ a Threat to Global Tr…
[4] Mandiant: APT1 Exposing One of China’s Cyber Espionage Units (link is
external)
[5] U.S. Department of Justice (DOJ) Press Release: U.S. Charges Five Chinese M…
[6] CISA Alert TA17-117A: Intrusions Affecting Multiple Victims Across Multiple…
[7] DOJ Press Release: Deputy Attorney General Rod J. Rodenstein Announces Char…
[8] CISA Awareness Briefing: Chinese Cyber Activity Targeting Managed Service P…
[9] DOJ Press Release: Deputy Attorney General William P. Barr Announces Indict…
[10] CISA Press Release: FBI and CISA Warn Against Chinese Targeting of COVID-1…
[11] CISA Alert AA20-126A: APT Groups Target Healthcare and Essential Services
[12] CISA Current Activity (CA): Chinese Malicious Cyber Activity
[13] FireEye Advanced Persistent Threat Groups(link is external)
[14] MITRE ATT&CK: APT3
[15] MITRE ATT&CK: APT19
[16] MITRE ATT&CK: APT41
[17] CISA Alert AA20-133A: Top 10 Routinely Exploited Vulnerabilities
[18] CISA Alert AA20-020A: Critical Vulnerability in Citrix Application Deliver…
[19] CISA CA: F5 Releases Security Advisory for BIP-IP TMUI RCE Vulnerability, …
[20] CISA Alert AA20-133A: Top 10 Routinely Exploited Vulnerabilities
[21] NSA Advisory: Chinese State-Sponsored Actors Exploit Publicly Known Vulner…


REVISIONS

October 1, 2020: Initial Version
October 20, 2020: Recommended Actions Section Updated

This product is provided subject to this Notification and this Privacy & Use
policy.

Please share your thoughts.

We recently updated our anonymous product survey; we'd welcome your feedback.


CONTACT US

(888)282-0870

Send us email(link sends email)

Download PGP/GPG keys

Submit website feedback


SUBSCRIBE TO ALERTS

Receive security alerts, tips, and other updates.

Enter your email address
 


HSIN
Report

--------------------------------------------------------------------------------

Home   Site Map   FAQ   Contact Us   Traffic Light Protocol   PCII  
Accountability   Disclaimer   Privacy Policy   FOIA   No Fear Act  
AccessibilityPlain WritingPlug-ins   Inspector General   The White House  
USA.gov
 

CISA is part of the Department of Homeland Security