www.darkreading.com
Open in
urlscan Pro
2606:4700::6811:7763
Public Scan
URL:
https://www.darkreading.com/attacks-breaches/threat-actor-deploying-sophisticated-post-exploit-framework-on-exchange-servers
Submission: On May 18 via api from CA — Scanned from CA
Submission: On May 18 via api from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - June 23 - Learn More * Black Hat USA - August 6-11 - Learn More Webinars * Vendors as Your Largest BEC Threat Jun 22, 2022 * Harnessing the Power of Security Automation Jun 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > Subscribe Login / Register The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - June 23 - Learn More * Black Hat USA - August 6-11 - Learn More Webinars * Vendors as Your Largest BEC Threat Jun 22, 2022 * Harnessing the Power of Security Automation Jun 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > The Edge DR Tech Sections Close Back Sections Featured Sections The Edge Dark Reading Technology Attacks / Breaches Cloud IoT Physical Security Perimeter Analytics Security Monitoring Security Monitoring App Sec Database Security Database Security Risk Compliance Compliance Threat Intelligence Endpoint AuthenticationMobile SecurityPrivacy AuthenticationMobile SecurityPrivacy Vulnerabilities / Threats Advanced ThreatsInsider ThreatsVulnerability Management Advanced ThreatsInsider ThreatsVulnerability Management Operations Identity & Access ManagementCareers & People Identity & Access ManagementCareers & People Remote Workforce Black Hat news Omdia Research Security Now Events Close Back Events Events * Dark Reading Virtual Event - June 23 - Learn More * Black Hat USA - August 6-11 - Learn More Webinars * Vendors as Your Largest BEC Threat Jun 22, 2022 * Harnessing the Power of Security Automation Jun 09, 2022 Resources Close Back Resources Reports > Slideshows > Tech Library > Webinars > White Papers > -------------------------------------------------------------------------------- Subscribe Login / Register SEARCH A minimum of 3 characters are required to be typed in the search bar in order to perform a search. Announcements 1. 2. 3. Event The Value Drivers of Attack Surface Management, Revealed | May 26 Webinar | <REGISTER NOW> Event Implementing and Using XDR to Improve Enterprise Cybersecurity | May 25 Webinar | <REGISTER NOW> Event HOW DATA BREACHES HAPPEN & WHAT TO DO WHEN THEY HAPPEN TO YOU | June 23 Virtual Event | <Get Your Pass> PreviousNext Attacks/Breaches 4 min read article CYBER-ESPIONAGE ATTACK DROPS POST-EXPLOIT MALWARE FRAMEWORK ON MICROSOFT EXCHANGE SERVERS IceApple's 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns. Jai Vijayan Contributing Writer, Dark Reading May 11, 2022 Source: givaga via Shutterstock PDF A likely China-based, state-sponsored threat actor has been deploying a sophisticated post-exploitation malware framework on Microsoft Exchange servers at organizations in the technology, academic, and government sectors across multiple regions since at least last fall. The goal of the campaign appears to be intelligence gathering and is tied to a targeted state-sponsored campaign, according to researchers at CrowdStrike. The security vendor is tracking the framework as "IceApple" and described it in a report this week as made up of 18 separate modules with a range of functions that include credential harvesting, file and directory deletion, and data exfiltration. CrowdStrike's analysis shows the modules are designed to run only in-memory to reduce the malware's footprint on an infected system — a tactic that adversaries often employ in long-running campaigns. The framework also has several other detection-evasion techniques that suggest the adversary has deep knowledge of Internet Information Services (IIS) Web applications. For instance, CrowdStrike observed one of the modules leveraging undocumented fields in IIS software that are not intended to be used by third-party developers. AdChoices ADVERTISING Over the course of their investigation of the threat, CrowdStrike researchers saw evidence of the adversaries repeatedly returning to compromised systems and using IceApple to execute post-exploitation activities. Param Singh, vice president of CrowdStrike's Falcon OverWatch threat-hunting services, says IceApple is different from other post-exploitation toolkits in that it is under constant ongoing development even as it is being actively deployed and used. "While IceApple has been observed being deployed on Microsoft Exchange Server instances, it is actually capable of running under any IIS Web application," Singh says. Microsoft .NET Link CrowdStrike discovered IceApple while developing detections for malicious activity involving so-called reflective .NET assembly loads. MITRE defines reflective code loading as a technique that threat actors use to conceal malicious payloads. It involves allocating and executing payloads directly in the memory of a running process. Reflectively loaded payloads can include complied binaries, anonymous files, or just bits of fileless executables, according to MITRE. Reflective code loading is like process injection except that code is loaded into a process's own memory rather than that of another process, MITRE has noted. ".NET assemblies form the cornerstone of Microsoft’s .NET framework," Singh says. "An assembly can function as either a stand-alone application in the form of an EXE file or as a library for use in other applications as a DLL." CrowdStrike discovered IceApple in late 2021 when a detection mechanism it was developing for reflective .NET assembly loads triggered on an Exchange Server at a customer location. The company's investigation of the alert showed anomalies in several .NET assembly files, which in turn led to the discovery of the IceApple framework on the system. Active Cyberattack Campaign IceApple's modular design gave the adversary a way to build each piece of functionality into its own .NET assembly and then reflectively load each function only as needed. "If not caught, this technique can leave security defenders completely blind to such attacks," Singh says. "For example, defenders will see a legitimate application like a Web server connecting out to a suspicious IP; however, they have no means of knowing what code is triggering that connection." Singh says CrowdStrike found IceApple to be using a couple of unique tactics to evade detection. One of them is to use undocumented fields in IIS. The other is to blend into the environment by using assembly file names that appear to be normal IIS temporary files. "At closer inspection, the file names are not randomly generated, as would be expected, and the way the assemblies are loaded falls outside of what is normal for Microsoft Exchange and IIS," Singh says. The IceApple framework is designed to exfiltrate data in several ways. For instance, one of the modules, known as the File Exfiltrator module, allows for a single file to be pilfered from the target host. Another module, called the multifile exfiltrator, allows for multiple files to be encrypted, compressed, and exfiltrated, according to Singh. "This campaign is currently active and effective," he warns. "But it is unknown at the moment how many organizations may have been impacted by this campaign beyond where CrowdStrike has visibility and those that might have been indirectly impacted via supply chain or other methods." Threat IntelligenceApplication Security Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe More Insights White Papers * Eight Best Practices for a Data-Driven Approach to Cloud Migration * What is a data vault? Why do you need it? More White Papers Webinars * Vendors as Your Largest BEC Threat * Harnessing the Power of Security Automation More Webinars Reports * Incorporating a Prevention Mindset into Threat Detection and Response * Practical Network Security Approaches for a Multicloud, Hybrid IT World More Reports Editors' Choice Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks Robert Lemos, Contributing Writer, Dark Reading What Star Wars Teaches Us About Threats Adam Shostack, Leading expert in threat modeling China-Backed Winnti APT Siphons Reams of US Trade Secrets in Sprawling Cyber-Espionage Attack Jai Vijayan, Contributing Writer, Dark Reading How to Create a Cybersecurity Mentorship Program Steve Zurier, Contributing Writer, Dark Reading Webinars * Vendors as Your Largest BEC Threat * Harnessing the Power of Security Automation * Implementing Zero Trust in Your Enterprise * Building an Effective Active Directory Security Strategy * Building and Maintaining an Effective IoT Cybersecurity Strategy More Webinars White Papers * Eight Best Practices for a Data-Driven Approach to Cloud Migration * What is a data vault? Why do you need it? * Protecting Endpoint to Work from Anywhere * Creating a Regulatory Compliant Medical Device Vulnerability Management Program * AppSec Considerations For Modern Application Development More White Papers Events * Dark Reading Virtual Event - June 23 - Learn More * Black Hat USA - August 6-11 - Learn More * Black Hat Spring Trainings - June 13-16 - Learn More More Events More Insights White Papers * Eight Best Practices for a Data-Driven Approach to Cloud Migration * What is a data vault? Why do you need it? More White Papers Webinars * Vendors as Your Largest BEC Threat * Harnessing the Power of Security Automation More Webinars Reports * Incorporating a Prevention Mindset into Threat Detection and Response * Practical Network Security Approaches for a Multicloud, Hybrid IT World More Reports DISCOVER MORE FROM INFORMA TECH * Interop * InformationWeek * Network Computing * ITPro Today * Data Center Knowledge * Black Hat * Omdia WORKING WITH US * About Us * Advertise * Reprints FOLLOW DARK READING ON SOCIAL * * * * * Home * Cookies * Privacy * Terms Copyright © 2022 Informa PLC Informa UK Limited is a company registered in England and Wales with company number 1072954 whose registered office is 5 Howick Place, London, SW1P 1WG. This site uses cookies to provide you with the best user experience possible. By using Dark Reading, you accept our use of cookies. Accept