U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws in networking equipment from Cisco to conduct reconnaissance and deploy malware against select targets.

The intrusions, per the authorities, took place in 2021 and targeted a small number of entities in Europe, U.S. government institutions, and about 250 Ukrainian victims.

The activity has been attributed to a threat actor tracked as APT28, which is also known as Fancy Bear, Forest Blizzard (formerly Strontium), FROZENLAKE, and Sofacy, and is affiliated with the Russian General Staff Main Intelligence Directorate (GRU).

“APT28 has been known to access vulnerable routers by using default and weak SNMP community strings, and by exploiting CVE-2017-6742,” the National Cyber Security Centre (NCSC) said.

CVE-2017-6742 (CVSS score: 8.8) is part of a set of remote code execution flaws that stem from a buffer overflow condition in the Simple Network Management Protocol (SNMP) subsystem in Cisco IOS and IOS XE software.

In the attacks observed by the agencies, the threat actor weaponized the vulnerability to deploy a non-persistent malware dubbed Jaguar Tooth on Cisco routers that’s capable of gathering device information and enabling unauthenticated backdoor access.

While the issues were patched by Cisco in June 2017, they have since come under public exploitation as of January 11, 2018, underscoring the need for robust patch management practices to limit the attack surface.

Besides updating to the latest firmware to mitigate potential threats, the company is also recommending that users switch from SNMP to NETCONF or RESTCONF for network management.

Cisco Talos, in a coordinated advisory, said the attacks are part of a broader campaign against aging networking appliances and software from a variety of vendors to “advance espionage objectives or pre-position for future destructive activity.”

This includes the installation of malicious software into an infrastructure device, attempts to surveil network traffic, and attacks mounted by “adversaries with preexisting access to internal environments targeting TACACS+/RADIUS servers to obtain credentials.”

“Route/switch devices are stable, infrequently examined from a security perspective, are often poorly patched and provide deep network visibility,” Matt Olney, director of threat intelligence and interdiction at Cisco, said.

“They are the perfect target for an adversary looking to be both quiet and have access to important intelligence capability as well as a foothold in a preferred network. National intelligence agencies and state-sponsored actors across the globe have attacked network infrastructure as a target of primary preference.”

The alert comes months after the U.S. government sounded the alarm about China-based nation-state hacking crews leveraging network vulnerabilities to exploit public and private sector organizations since at least 2020.

Then earlier this year, Google-owned Mandiant highlighted efforts undertaken by Chinese state-sponsored threat actors to deploy bespoke malware on vulnerable Fortinet and SonicWall devices.

“Advanced cyber espionage threat actors are taking advantage of any technology available to persist and traverse a target environment, especially those technologies that do not support [endpoint detection and response] solutions,” Mandiant said.

Πηγή: thehackernews.com

Αφήστε ένα Σχόλιο

Το e-mail σας δεν δημοσιεύεται. Τα υποχρεωτικά πεδία σημειώνονται με *

Διαβάστε επίσης

Η Mozilla εξαγοράζει την Fakespot για να βοηθήσει τους χρήστες του Firefox να εντοπίζουν ψεύτικες κριτικές προϊόντων

Η Mozilla ανακοίνωσε ότι εξαγόρασε την εταιρεία Fakespot, μια startup που παρέχει ένα site και ένα browser extension που επιτρέπει στους χρήστες να εντοπίζουν αναξιόπιστες ή ψεύτικες κριτικές προϊόντων.

Ενημερώστε άμεσα τον Chrome για να προστατευθείτε από μια σοβαρή ευπάθεια του προγράμματος περιήγησης

Η Google προειδοποιεί ότι οι χάκερς εκμεταλλεύονται ήδη την ευπάθεια CVE-2023-2033.

Ο κατακερματισμός και η έλλειψη υιοθέτησης εμποδίζουν την επικράτηση των logins χωρίς κωδικό πρόσβασης

Στο RSAC 2023, ένας υπεύθυνος προϊόντων της Google μιλάει για τις προκλήσεις που αντιμετωπίζει η εξάπλωση της τεχνολογίας passkey, η οποία έχει σχεδιαστεί για να αντικαταστήσει τις παλαιάς σχολής συνδέσεις με κωδικό πρόσβασης.