US-CERT- #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability

Started by Netwörkheäd, July 15, 2023, 06:07:16 AM

Previous topic - Next topic

Netwörkheäd

#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability

[html]

Updated June 16, 2023


This CSA is being re-released to remove old Fortra GoAnywhere Campaign IP addresses and to add new IP addresses. See the update below.


End of Update


SUMMARY


Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.


The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.


According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2023-34362" title="CVE-2023-34362">CVE-2023-34362) in Progress Software's managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conducted zero-day-exploit-driven campaigns against Accellion File Transfer Appliance (FTA) devices in 2020 and 2021, and Fortra/Linoma GoAnywhere MFT servers in early 2023.


FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of CL0P ransomware and other ransomware incidents.


Download the PDF version, STIX and JSON file for this report:






   

    AA23-158A PDF
    (PDF,       740.97 KB
  )

 






   

    AA23-158A STIX XML
    (XML,       165.28 KB
  )

 






   

    AA23-158A JSON
    (JSON,       93.33 KB
  )

 


TECHNICAL DETAILS


Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 13. See https://attack.mitre.org/versions/v12/matrices/enterprise/" title="Enterprise Matrix">MITRE ATT&CK for Enterprise for all referenced tactics and techniques.


Appearing in February 2019, and evolving from the CryptoMix ransomware variant, CL0P was leveraged as a Ransomware as a Service (RaaS) in large-scale spear-phishing campaigns that used a verified and digitally signed binary to bypass system defenses. CL0P was previously known for its use of the 'double extortion' tactic of stealing and encrypting victim data, refusing to restore victim access and publishing exfiltrated data on Tor via the CL0P^_-LEAKS website. In 2019, TA505 actors leveraged CL0P ransomware as the final payload of a phishing campaign involving a macro-enabled document that used a Get2 malware dropper for downloading SDBot and FlawedGrace. In recent campaigns beginning 2021, CL0P preferred to rely mostly on data exfiltration over encryption.


Beyond CL0P ransomware, TA505 is known for frequently changing malware and driving global trends in criminal malware distribution. Considered to be one of the largest phishing and malspam distributors worldwide, TA505 is estimated to have compromised more than 3,000 U.S.-based organizations and 8,000 global organizations.


TA505 has operated:


  • A RaaS and has acted as an affiliate of other RaaS operations,

  • As an initial access broker (IAB), selling access to compromised corporate networks,

  • As a customer of other IABs,

  • And as a large botnet operator specializing in financial fraud and phishing attacks.

In a campaign from 2020 to 2021, TA505 used several zero-day exploits to install a web shell named DEWMODE on internet-facing Accellion FTA servers. Similarly, the recent exploitation of MOVEit Transfer, a SQL injection vulnerability was used to install the web shell, which enabled TA505 to execute operating system commands on the infected server and steal data.


In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as https://nvd.nist.gov/vuln/detail/CVE-2023-0669" title="CVE-2023-0669">CVE-2023-0669, to target the GoAnywhere MFT platform. The group claimed to have exfiltrated data from the GoAnywhere MFT platform that impacted approximately 130 victims over the course of 10 days. Lateral movement into the victim networks from the GoAnywhere MFT was not identified, suggesting the breach was limited to the GoAnywhere platform itself. Over the next several weeks, as the exfiltrated data was parsed by the group, ransom notes were sent to upper-level executives of the victim companies, likely identified through open source research. The ransom notes threatened to publish the stolen files on the CL0P data leak site if victims did not pay the ransom amount.




Figure 1: CL0P Ransom Note

Hello, this is the CL0P hacker group. As you may know, we recently carried out a hack, which was reported in the news on site [redacted].


We want to inform you that we have stolen important information from your GoAnywhere MFT resource and have attached a full list of files as evidence.


We deliberately did not disclose your organization and wanted to negotiate with you and your leadership first. If you ignore us, we will sell your information on the black market and publish it on our blog, which receives 30-50 thousand unique visitors per day. You can read about us on [redacted] by searching for CLOP hacker group.


You can contact us using the following contact information:x


unlock@rsv-box[.]com


and


unlock@support-mult[.]com


CL0P's toolkit contains several malware types to collect information, including the following:


CVE-2023-34362 MOVEIT TRANSFER VULNERABILITY


MOVEit is typically used to manage an organization's file transfer operations and has a web application that supports MySQL, Microsoft SQL Server, and Azure SQL database engines. In May 2023, the CL0P ransomware group exploited a SQL injection zero-day vulnerability https://nvd.nist.gov/vuln/detail/CVE-2023-34362">CVE-2023-34362 to install a web shell named LEMURLOOT on MOVEit Transfer web applications [https://attack.mitre.org/versions/v13/techniques/T1190/" title="Exploit Public-Facing Application">T1190] [https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft" title="Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft">1]. Lemurloot was used as a method of persistence, information gathering and data stealing in CVE-2023-34362. The webshell imports multiple libraries including "MOVEit.DMZ.ClassLib," "MOVEit.DMZ.Application.Files," and "MOVEit.DMZ.Application.Users" to interact with MOVEit managed file transfer software. The web shell was initially observed with the name human2.aspx in an effort to masquerade as the legitimate human.aspx file present as part of MOVEit Transfer software. Upon installation, the web shell creates a random 36 character password to be used for authentication. The web shell interacts with its operators by awaiting HTTP requests containing a header field named X-siLock-Comment, which must have a value assigned equal to the password established upon the installation of the web shell. After authenticating with the web shell, operators pass commands to the web shell that can:


  • Retrieve Microsoft Azure system settings, Azure Blob Storage, Azure Blob Storage account, Azure Blob key, and Azure Blob Container using the following query:
    • "select f.id, f.instid, f.folderid, filesize, f.Name as Name, u.LoginName as uploader, fr.FolderPath , fr.name as fname from folders fr, files f left join users u on f.UploadUsername = u.Username where f.FolderID = fr.ID" (Figure 2).


  • Enumerate the underlying SQL database.

  • Store a string sent by the operator and then retrieve a file with a name matching the string from the MOVEit Transfer system.

  • Create a new administrator privileged account with a randomly generated username and LoginName and RealName values set to "Health Check Service."

  • Delete an account with LoginName and RealName values set to 'Health Check Service.'

    Figure 2 – Lemurloot webshell code that interacts with Azure

     
Figure 2 – Lemurloot webshell code that interacts with Azure

Progress Software announced the discovery of https://nvd.nist.gov/vuln/detail/CVE-2023-34362" title="CVE-2023-34362">CVE-2023-34362 MOVEit Transfer vulnerability and issued guidance on known affected versions, software upgrades, and patching. Based on evidence of active exploitation, CISA added this vulnerability to the https://www.cisa.gov/known-exploited-vulnerabilities-catalog" title="Known Exploited Vulnerabilities Catalog">Known Exploited Vulnerabilities (KEVs) Catalog on June 2, 2023. This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023" title="MOVEit Transfer Critical Vulnerability (May 2023)">2]:


  • MOVEit Transfer 2023.0.0

  • MOVEit Transfer 2022.1.x

  • MOVEit Transfer 2022.0.x

  • MOVEit Transfer 2021.1.x

  • MOVEit Transfer 2021.0.x

  • MOVEit Transfer 2020.1.x

  • MOVEit Transfer 2020.0.x

Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks. For IOCs related to the MOVEit campaign, see table 2.


DETECTION METHODS


Below, are open source deployable YARA rules that may be used to detect malicious activity of the MOVEit Transfer Zero Day Vulnerability. For more information, visit https://github.com/AhmetPayaslioglu/YaraRules/blob/main/MOVEit_Transfer_Critical_Vulnerability.yara" title="AhmetPayaslioglu / YaraRules">GitHub or the resource section of this CSA. [https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft" title="Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft">1] [https://www.huntress.com/blog/moveit-transfer-critical-vulnerability-rapid-response" title="MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response">3]:



rule CISA_10450442_01 : LEMURLOOT webshell communicates_with_c2 remote_access

         {

            meta:

                Author = "CISA Code & Media Analysis"

                Incident = "10450442"

                Date = "2023-06-07"

                Last_Modified = "20230609_1200"

                Actor = "n/a"

                Family = "LEMURLOOT"

                Capabilities = "communicates-with-c2"

                Malware_Type = "webshell"

                Tool_Type = "remote-access"

                Description = "Detects ASPX webshell samples"

                SHA256_1 = "3a977446ed70b02864ef8cfa3135d8b134c93ef868a4cc0aa5d3c2a74545725b"

            strings:

                $s1 = { 4d 4f 56 45 69 74 2e 44 4d 5a }

                $s2 = { 25 40 20 50 61 67 65 20 4c 61 6e 67 75 61 67 65 3d }

                $s3 = { 4d 79 53 51 4c }

                $s4 = { 41 7a 75 72 65 }

                $s5 = { 58 2d 73 69 4c 6f 63 6b 2d }

            condition:

                all of them

         }

 



rule M_Webshell_LEMURLOOT_DLL_1 {

             meta:

                 disclaimer = "This rule is meant for hunting and is not tested to run in a production environment"

                 description = "Detects the compiled DLLs generated from human2.aspx LEMURLOOT payloads."

                 sample = "c58c2c2ea608c83fad9326055a8271d47d8246dc9cb401e420c0971c67e19cbf"

                 date = "2023/06/01"

                 version = "1"

             strings:

                 $net = "ASP.NET"

                 $human = "Create_ASP_human2_aspx"

                 $s1 = "X-siLock-Comment" wide

                 $s2 = "X-siLock-Step3" wide

                 $s3 = "X-siLock-Step2" wide

                 $s4 = "Health Check Service" wide

                 $s5 = "attachment; filename={0}" wide

             condition:

                 uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and

                 filesize < 15KB and

                 $net and

                 (

                     ($human and 2 of ($s*)) or

                     (3 of ($s*))

                 )

         }

 



rule M_Webshell_LEMURLOOT_1 {

             meta:

                 disclaimer = "This rule is meant for hunting and is not tested to run in a production environment"

                 description = "Detects the LEMURLOOT ASP.NET scripts"

                 md5 = "b69e23cd45c8ac71652737ef44e15a34"

                 sample = "cf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45x"

                 date = "2023/06/01"

                 version = "1"

             strings:

                 $head = "<%@ Page"

                 $s1 = "X-siLock-Comment"

                 $s2 = "X-siLock-Step"

                 $s3 = "Health Check Service"

                 $s4 = /pass, \"[a-z0-9]{8}-[a-z0-9]{4}/

                 $s5 = "attachment;filename={0}"

             condition:

                 filesize > 5KB and filesize < 10KB and

                 (

                     ($head in (0..50) and 2 of ($s*)) or

                     (3 of ($s*))

                 )

         }

 




rule MOVEit_Transfer_exploit_webshell_aspx {


    meta:


        date = "2023-06-01"

                 description = "Detects indicators of compromise in MOVEit Transfer exploitation."

                 author = "Ahmet Payaslioglu - Binalyze DFIR Lab"

                 hash1 = "44d8e68c7c4e04ed3adacb5a88450552"

                 hash2 = "a85299f78ab5dd05e7f0f11ecea165ea"

                 reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/"

                 reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/"

                 reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643"

                 verdict = "dangerous"

                   mitre = "T1505.003"

                 platform = "windows"

                 search_context = "filesystem"

                 

             strings:

                 $a1 = "MOVEit.DMZ"

                 $a2 = "Request.Headers[\"X-siLock-Comment\"]"

                 $a3 = "Delete FROM users WHERE RealName='Health Check Service'"

                 $a4 = "set[\"Username\"]"

                 $a5 = "INSERT INTO users (Username, LoginName, InstID, Permission, RealName"

                 $a6 = "Encryption.OpenFileForDecryption(dataFilePath, siGlobs.FileSystemFactory.Create()"

                 $a7 = "Response.StatusCode = 404;"

             condition:

                 

                 filesize < 10KB

                 and all of them 

         }


rule MOVEit_Transfer_exploit_webshell_dll {


    meta:


        date = "2023-06-01"

                 description = "Detects indicators of compromise in MOVEit Transfer exploitation."

                 author = "Djordje Lukic - Binalyze DFIR Lab"

                 hash1 = "7d7349e51a9bdcdd8b5daeeefe6772b5"

                 hash2 = "2387be2afe2250c20d4e7a8c185be8d9"

                 reference1 = "https://www.reddit.com/r/msp/comments/13xjs1y/tracking_emerging_moveit_transfer_critical/"

                 reference2 = "https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/"

                 reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643"

                 verdict = "dangerous"

                   mitre = "T1505.003"

                 platform = "windows"

                 search_context = "filesystem"

                 

             strings:

                 $a1 = "human2.aspx" wide

                 $a2 = "Delete FROM users WHERE RealName='Health Check Service'" wide

                 $a3 = "X-siLock-Comment" wide

             condition:

                 

                 uint16(0) == 0x5A4D and filesize < 20KB

                 and all of them 

         }


If a victim rebuilds the web server but leaves the database intact, the CL0P user accounts will still exist and can be used for persistent access to the system.


Victims can use the following SQL query to audit for active administrative accounts, and should validate that only intended accounts are present.


SELECT * FROM [<database name>].[dbo].[users] WHERE Permission=30 AND Status='active' and Deleted='0'


MOVEit Campaign Indicators of Compromise







Files



Hash



LEMURLOOT


Web Shell


e.g. human2.aspx














































0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9



0ea05169d111415903a1098110c34cdbbd390c23016cd4e179dd9ef507104495



110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286



1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2



2413b5d0750c23b07999ec33a5b4930be224b661aaf290a0118db803f31acbc5



2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59



348e435196dd795e1ec31169bd111c7ec964e5a6ab525a562b17f10de0ab031d



387cee566aedbafa8c114ed1c6b98d8b9b65e9f178cf2f6ae2f5ac441082747a



38e69f4a6d2e81f28ed2dc6df0daf31e73ea365bd2cfc90ebc31441404cca264



3a977446ed70b02864ef8cfa3135d8b134c93ef868a4cc0aa5d3c2a74545725b



3ab73ea9aebf271e5f3ed701286701d0be688bf7ad4fb276cb4fbe35c8af8409



3c0dbda8a5500367c22ca224919bfc87d725d890756222c8066933286f26494c



4359aead416b1b2df8ad9e53c497806403a2253b7e13c03317fc08ad3b0b95bf



48367d94ccb4411f15d7ef9c455c92125f3ad812f2363c4d2e949ce1b615429a



58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166



5b566de1aa4b2f79f579cdac6283b33e98fdc8c1cfa6211a787f8156848d67ff



6015fed13c5510bbb89b0a5302c8b95a5b811982ff6de9930725c4630ec4011d



702421bcee1785d93271d311f0203da34cc936317e299575b06503945a6ea1e0



769f77aace5eed4717c7d3142989b53bd5bac9297a6e11b2c588c3989b397e6b



7c39499dd3b0b283b242f7b7996205a9b3cf8bd5c943ef6766992204d46ec5f1



93137272f3654d56b9ce63bec2e40dd816c82fb6bad9985bed477f17999a47db



98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8



9d1723777de67bc7e11678db800d2a32de3bcd6c40a629cd165e3f7bbace8ead



9e89d9f045664996067a05610ea2b0ad4f7f502f73d84321fb07861348fdc24a



a1269294254e958e0e58fc0fe887ebbc4201d5c266557f09c3f37542bd6d53d7



a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986



b1c299a9fe6076f370178de7b808f36135df16c4e438ef6453a39565ff2ec272



b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03



b9a0baf82feb08e42fa6ca53e9ec379e79fbe8362a7dac6150eb39c2d33d94ad



bdd4fa8e97e5e6eaaac8d6178f1cf4c324b9c59fc276fd6b368e811b327ccf8b



c56bcb513248885673645ff1df44d3661a75cfacdce485535da898aa9ba320d4



c77438e8657518221613fbce451c664a75f05beea2184a3ae67f30ea71d34f37



cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621



cf23ea0d63b4c4c348865cefd70c35727ea8c82ba86d56635e488d816e60ea45



d477ec94e522b8d741f46b2c00291da05c72d21c359244ccb1c211c12b635899



d49cf23d83b2743c573ba383bf6f3c28da41ac5f745cde41ef8cd1344528c195



daaa102d82550f97642887514093c98ccd51735e025995c2cc14718330a856f4



e8012a15b6f6b404a33f293205b602ece486d01337b8b3ec331cd99ccadb562e



ea433739fb708f5d25c937925e499c8d2228bf245653ee89a6f3d26a5fd00b7a



ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90c



f0d85b65b9f6942c75271209138ab24a73da29a06bc6cc4faeddcb825058c09d



fe5f8388ccea7c548d587d1e2843921c038a9f4ddad3cb03f3aa8a45c29c6a2f


GoAnywhere Campaign Indicators of Compromise




































Files



Hash



Description



larabqFa.exe

         Qboxdv.dll



0e3a14638456f4451fe8d76fdc04e591fba942c2f16da31857ca66293a58a4c3



Truebot



%TMP%\7ZipSfx.000\Zoom.exe

          



1285aa7e6ee729be808c46c069e30a9ee9ce34287151076ba81a0bea0508ff7e



Spawns a PowerShell subprocess which executes a malicious DLL file



%TMP%\7ZipSfx.000\ANetDiag.dll



2c8d58f439c708c28ac4ad4a0e9f93046cf076fc6e5ab1088e8943c0909acbc4



Obfuscated malware which also uses long sleeps and  debug detection to evade analysis



AVICaptures.dll



a8569c78af187d603eecdc5faec860458919349eef51091893b705f466340ecd



Truebot



kpdphhajHbFerUr.exe

         gamft.dll



c042ad2947caf4449295a51f9d640d722b5a6ec6957523ebf68cddb87ef3545c



Truebot



dnSjujahur.exe

         Pxaz.dll



c9b874d54c18e895face055eeb6faa2da7965a336d70303d0bd6047bec27a29d



Truebot



7ZSfxMod_x86.exe

         ZoomInstaller.exe

         Zoom.exe



d5bbcaa0c3eeea17f12a5cc3dbcaffff423d00562acb694561841bcfe984a3b7



Fake Zoom installer - Truebot



update.jsp



eb9f5cbe71f9658d38fb4a7aa101ad40534c4c93ee73ef5f6886d89159b0e2c2



Java Server Pages (JSP) web shell with some base64 obfuscation



%TMP%\<folder>\extracted_at_0xe5c8f00.exe



f2f08e4f108aaffaadc3d11bad24abdd625a77e0ee9674c4541b562c78415765



Employs sandbox detection and string obfuscation - appears to be a collection of C# hack tools



UhfdkUSwkFKedUUi.exe

         gamft.dll



ff8c8c8bfba5f2ba2f8003255949678df209dbff95e16f2f3c338cfa0fd1b885



Truebot













Email Address



Description



unlock@rsv-box[.]com



CL0P communication email



unlock@support-mult[.]com



CL0P communication email



rey14000707@gmail[.]com



Login/Download



gagnondani225@gmail[.]com



Email


 












Malicious Domain



http://hiperfdhaus[.]com



http://jirostrogud[.]com



http://qweastradoc[.]com



http://qweastradoc[.]com/gate.php



http://connectzoomdownload[.]com/download/ZoomInstaller.exe



https://connectzoomdownload[.]com/download/ZoomInstaller.exe



http://zoom[.]voyage/download/Zoom.exe



http://guerdofest[.]com/gate.php


 













Certificate Name



Status



Date Valid



Thumbprint



Serial Number



Savas Investments PTY LTD



Valid Issuer: Sectigo Public Code Signing CA R36



10/7/2022 - 10/7/2023



8DCCF6AD21A58226521


E36D7E5DBAD133331C181



00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02


 



































































MOVEit Campaign Infrastructure


IP Addresses


May/June 2023



104.194.222[.]107



146.0.77[.]141



146.0.77[.]155



146.0.77[.]183



148.113.152[.]144



162.244.34[.]26



162.244.35[.]6



179.60.150[.]143



185.104.194[.]156



185.104.194[.]24



185.104.194[.]40



185.117.88[.]17



185.162.128[.]75



185.174.100[.]215



185.174.100[.]250



185.181.229[.]240



185.181.229[.]73



185.183.32[.]122



185.185.50[.]172



188.241.58[.]244



193.169.245[.]79



194.33.40[.]103



194.33.40[.]104



194.33.40[.1]64



198.12.76[.]214



198.27.75[.]110



206.221.182[.]106



209.127.116[.]122



209.127.4[.]22



209.222.103[.]170



45.227.253[.]133



45.227.253[.]147



45.227.253[.]50



45.227.253[.]6



45.227.253[.]82



45.56.165[.]248



5.149.248[.]68



5.149.250[.]74



5.149.250[.]92



5.188.86[.]114



5.188.86[.]250



5.188.87[.]194



5.188.87[.]226



5.188.87[.]27



5.252.23[.]116



5.252.25[.]88



5.34.180[.]205



62.112.11[.]57



62.182.82[.]19



62.182.85[.]234



66.85.26[.]215



66.85.26[.]234



66.85.26[.]248



79.141.160[.]78



79.141.160[.]83



84.234.96[.]104



84.234.96[.]31



89.39.104[.]118



89.39.105[.]108



91.202.4[.]76



91.222.174[.]95



91.229.76[.]187



93.190.142[.]131


 


Updated June 16, 2023
















































Fortra GoAnywhere


 High Confidence and Temporal


IP Addresses


January/June



92.118.36[.]249



5.34.180[.]48



185.33.86[.]225



148.113.159[.]213



15.235.13[.]184



82.117.252[.]141



185.80.52[.]230



91.222.174[.]68



5.34.178[.]31



185.104.194[.]134



5.34.178[.]28



185.81.113[.]156



5.34.178[.]30



77.83.197[.]66



193.42.38[.]196



209.222.98[.]25



106.75.139[.]199



79.141.166[.]119



185.117.88[.]2



79.141.160[.]78



185.33.87[.]126



82.117.252[.]142



15.235.83[.]73



81.56.49[.]148



96.44.181[.]131



192.42.116[.]191



213.121.182[.]84



104.200.72[.]149



152.57.231[.]216



142.44.212[.]178



54.39.133[.]41



76.117.196[.]3



24.3.132[.]168



166.70.47[.]90



208.115.199[.]25



216.144.248[.]20



173.254.236[.]131



3.101.53[.]11



54.184.187[.]134



100.21.161[.]34



44.206.3[.]111



75.101.131[.]237



20.47.120[.]195



198.137.247[.]10


End of Update


MITRE ATT&CK TECHNIQUES


See tables below for referenced CL0P tactics and techniques used in this advisory.















Table 1. ATT&CK Techniques for Enterprise: Initial Access

Initial Access


  

Technique Title



ID



Use



Exploit Public-Facing Application



https://attack.mitre.org/versions/v13/techniques/T1190/" title="Exploit Public-Facing Application">T1190



CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application.



Phishing



https://attack.mitre.org/versions/v13/techniques/T1566/" title="Phishing">T1566



CL0P actors send a large volume of spear-phishing emails to employees of an organization to gain initial access.


 


















Table 2. ATT&CK Techniques for Enterprise: Execution

Execution


  

Technique Title



ID



Use



Command and Scripting Interpreter: PowerShell



https://attack.mitre.org/versions/v13/techniques/T1059/001/" title="Command and Scripting Interpreter: PowerShell">T1059.001



CL0P actors use SDBot as a backdoor to enable other commands and functions to be executed in the compromised computer.



Command and Scripting Interpreter



https://attack.mitre.org/techniques/T1059/003/" title="Command and Scripting Interpreter">T1059.003



CL0P actors use TinyMet, a small open-source Meterpreter stager to establish a reverse shell to their C2 server.



Shared Modules



https://attack.mitre.org/versions/v13/techniques/T1129/" title="Shared Modules">T1129



CL0P actors use Truebot to download additional modules.


 















Table 3. ATT&CK Techniques for Enterprise: Persistence

Persistence


  

Technique Title



ID



Use



Server Software Component: Web Shell



https://attack.mitre.org/versions/v13/techniques/T1505/003/" title="Server Software Component: Web Shell">T1505.003



DEWMODE is a web shell designed to interact with a MySQL database, and is used to exfiltrate data from the compromised network.



Event Triggered Execution: Application Shimming



https://attack.mitre.org/versions/v13/techniques/T1546/011/" title="Event Triggered Execution: Application Shimming">T1546.011



CL0P actors use SDBot malware for application shimming for persistence and to avoid detection.


 












Table 4. ATT&CK Techniques for Enterprise: Privilege Escalation

Privilege Escalation 


  

Technique Title



ID



Use



Exploitation for Privilege Escalation



https://attack.mitre.org/versions/v13/techniques/T1068/" title="Exploitation for Privilege Escalation">T1068



CL0P actors were gaining access to MOVEit Transfer databases prior to escalating privileges within compromised network.


 


















Table 5. ATT&CK Techniques for Enterprise: Defense Evasion

Defense Evasion


  

Technique Title



ID



Use



Process Injection



https://attack.mitre.org/versions/v13/techniques/T1055/" title="Process Injection">T1055



CL0P actors use Truebot to load shell code.



Indicator Removal



https://attack.mitre.org/versions/v13/techniques/T1070/" title="Indicator Removal">T1070



CL0P actors delete traces of Truebot malware after it is used.



Hijack Execution Flow: DLL Side-Loading



https://attack.mitre.org/versions/v13/techniques/T1574/002/" title="Hijack Execution Flow: DLL Side-Loading">T1574.002



CL0P actors use Truebot to side load DLLs.


 












Table 6. ATT&CK Techniques for Enterprise: Discovery

Discovery


  

Technique Title



ID



Use



Remote System Discovery



https://attack.mitre.org/versions/v13/techniques/T1018/" title="Remote System Discovery">T1018



CL0P actors use Cobalt Strike to expand network access after gaining access to the Active Directory (AD) servers.


 















Table 7. ATT&CK Techniques for Enterprise: Lateral Movement

Lateral Movement


  

Technique Title



ID



Use



Remote Services: SMB/Windows Admin Shares



https://attack.mitre.org/versions/v13/techniques/T1021/002/" title="Remote Services: SMB/Windows Admin Shares">T1021.002



CL0P actors have been observed attempting to compromise the AD server using Server Message Block (SMB) vulnerabilities with follow-on Cobalt Strike activity.



Remote Service Session Hijacking: RDP Hijacking



https://attack.mitre.org/versions/v13/techniques/T1563/002/" title="Remote Service Session Hijacking: RDP Hijacking">T1563.002



CL0P ransomware actors have been observed using Remote Desktop Protocol (RDP) to interact with compromised systems after initial access.


 












Table 8. ATT&CK Techniques for Enterprise: Collection

Collection


  

Technique Title



ID



Use



Screen Capture



https://attack.mitre.org/versions/v13/techniques/T1113/" title="Screen Capture">T1113



CL0P actors use Truebot to take screenshots in effort to collect sensitive data.


 















Table 9. ATT&CK Techniques for Enterprise: Command and Control

Command and Control


  

Technique Title



ID



Use



Application Layer Protocol



https://attack.mitre.org/versions/v13/techniques/T1071/" title="Application Layer Protocol">T1071



CL0P actors use FlawedAmmyy remote access trojan (RAT) to communicate with the Command and Control (C2).



Ingress Tool Transfer



https://attack.mitre.org/versions/v13/techniques/T1105/" title="Ingress Tool Transfer">T1105



CL0P actors are assessed to use FlawedAmmyy remote access trojan (RAT) to the download of additional malware components.


CL0P actors use SDBot to drop copies of itself in removable drives and network shares.


 












Table 10. ATT&CK Techniques for Enterprise: Exfiltration

Exfiltration


  

Technique Title



ID



Use



Exfiltration Over C2 Channel



https://attack.mitre.org/versions/v13/techniques/T1041/" title="Exfiltration Over C2 Channel">T1041



CL0P actors exfiltrate data for C2 channels.


 


MITIGATIONS


The authoring agencies recommend organizations implement the mitigations below to improve their organization's security posture in response to  threat actors' activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats and TTPs. Visit CISA's https://www.cisa.gov/cross-sector-cybersecurity-performance-goals" title="Cross-Sector Cybersecurity Performance Goals">Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections to reduce the risk of compromise by CL0P ransomware.


  • Reduce threat of malicious actors using remote access tools by:
    • Auditing remote access tools on your network to identify currently used and/or authorized software.

    • Reviewing logs for execution of remote access software to detect abnormal use of programs running as a portable executable [CPG 2.T].

    • Using security software to detect instances of remote access software only being loaded in memory.

    • Requiring authorized remote access solutions only be used from within your network over approved remote access solutions, such as virtual private networks (VPNs) or virtual desktop interfaces (VDIs).

    • Blocking both inbound and outbound connections on common remote access software ports and protocols at the network perimeter.


  • Implement application controls to manage and control execution of software, including allowlisting remote access programs.
    • Application controls should prevent installation and execution of portable versions of unauthorized remote access and other software. A properly configured application allowlisting solution will block any unlisted application execution. Allowlisting is important because antivirus solutions may fail to detect the execution of malicious portable executables when the files use any combination of compression, encryption, or obfuscation.


  • Strictly limit the use of RDP and other remote desktop services. If RDP is necessary, rigorously apply best practices, for example [CPG 2.W]:

  • Disable command-line and scripting activities and permissions [CPG 2.N].

  • Restrict the use of PowerShell, using Group Policy, and only grant to specific users on a case-by-case basis. Typically, only those users or administrators who manage the network or Windows operating systems (OSs) should be permitted to use PowerShell [CPG 2.E].

  • Update Windows PowerShell or PowerShell Core to the latest version and uninstall all earlier PowerShell versions. Logs from Windows PowerShell prior to version 5.0 are either non-existent or do not record enough detail to aid in enterprise monitoring and incident response activities [CPG 1.E, 2.S, 2.T].

  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 4.C].

  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege [CPG 2.E].

  • Reduce the threat of credential compromise via the following:
    • Place domain admin accounts in the protected users' group to prevent caching of password hashes locally.

    • Refrain from storing plaintext credentials in scripts.


  • Implement time-based access for accounts set at the admin level and higher [CPG 2.A, 2.E].

In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors: 


  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).

  • Maintain offline backups of data and regularly maintain backup and restoration (daily or weekly at minimum). By instituting this practice, an organization limits the severity of disruption to its business practices [CPG 2.R].

  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with https://pages.nist.gov/800-63-3/" title="Digital Identity Guidelines">National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
    • Use longer passwords consisting of at least eight characters and no more than 64 characters in length [CPG 2.B].

    • Store passwords in hashed format using industry-recogni
Let's not argue. Let's network!