

Attacks on SonicWall appliances linked to Chinese campaign: Mandiant
source link: https://www.csoonline.com/article/3690588/attacks-on-sonicwall-appliances-linked-to-chinese-campaign-mandiant.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Attacks on SonicWall appliances linked to Chinese campaign: Mandiant
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.

Koszubarev / Getty Images
A persistent malware targeting unpatched SonicWall Secure Mobile Access (SMA) appliances has been linked to a Chinese campaign dating back to 2021, according to a Mandiant research done in partnership with SonicWall’s in-house research team.
The responsible malware, dubbed UNC4540, has been found to be stealing user credentials, providing shell access, and persisting through firmware upgrades.
“This is not a new vulnerability, so a patch was not published,” a Mandiant spokesperson said. “The findings are based on the analysis of an extremely limited number of unpatched SMA 100 series appliances from the 2021 timeframe.”
SonicWall did, however, issue SMA 100 firmware 10.2.1.17 update last week as a maintenance release, the spokesperson added.
The SMA series is a line of on-premises security appliances developed and manufactured by SonicWall that are designed to provide remote access to corporate networks, cloud applications, and other resources for employees, contractors, and partners.
Attacks are consistent with earlier Chinese hacks
Mandiant has identified a pattern of Chinese attackers utilizing numerous zero-day exploits and malware to gain full access to enterprise systems through various internet-facing network appliances, and the SonicWall SMA appliances attack as part of this trend.
The techniques used were found to be consistent with multiple security incidents in April 2021 involving compromises of Pulse Secure VPN appliances through authentication bypass.
Earlier in March 2021, Mandiant Managed Defense had also discovered three zero-day vulnerabilities being actively exploited in SonicWall’s Email Security product indicating a persistent malicious presence in SonicWall’s system.
Usually, vendors do not allow users direct access to the operating system or the file system. Instead, they provide administrators with a graphical user interface or a restricted Command Line Interface that prevents accidental damage to the system.
Due to this restricted access, Chinese attackers are putting in significant resources and effort to create exploits and malware for managed devices, according to a Mandiant blog post.
Malware module primarily steals credentials
The main malware entry point is a bash script named “firewalld”, which essentially executes an SQL command to accomplish credential stealing along with the execution of few other components. firewalld is used to initiate TinyShell backdoor, a remote access hack through PHP script, which then allows the attackers to run arbitrary SQL commands and perform various malicious activities.
A TinyShell backdoor is typically installed by exploiting vulnerabilities in web applications or by using brute force attacks to guess weak passwords for login pages. Once the attacker gains access to the web server, they can upload the TinyShell script and execute it to gain remote access.
The primary purpose of the malware was found to be stealing hashed credentials from all logged in users by executing the SQL command, “select userName, password from Sessions”. This command targets the session information with hashed credentials in the source database maintained by the unpatched appliance.
Module designed for persistence and stability
The attackers have primarily focused on the stability and persistence of their tooling, allowing access to the network to persist through firmware updates and maintaining network foothold through the SonicWall device.
Used as the entry point and persistence in this attack, firewalld is a startup script run at boot time and is designed to manage the firewall rules and provides a user-friendly interface for configuring and managing network traffic. Additionally, a modified firewalld copy “iptabled”, was found in the affected device to provide persistence for the main malware process in case of exit or crash.
“The two scripts were configured to call the other if it was not running, providing a backup instance of the main malware process and therefore an additional layer of resilience,” said the blog post.
The attackers also have a process in place for their access to persist through firmware updates. They use another bash script geoBotnetd that frequently checks for firmware updates, to unzip the update and load the malware package upon every detection.
“These firmware manipulations only occurred post-exploitation on an already infected device and were not seen used in a supply chain attack,” added the post.
Defense includes timely patching and management
SonicWall has indicated that maintaining proper patch management is paramount for mitigating the risk of vulnerability exploitation. It is advising customers who use SMA100 to update their software to version 10.2.1.7 or later. This updated version includes improvements to strengthen the software, such as the addition of File Integrity Monitoring (FIM) and identification of unusual processes.
Given that inspecting affected devices can be challenging, analyzing accessible logs for indirect indicators of breach, such as unusual logins or internal network activity, may present some possibilities for detection, recommended the blog post.
Recommend
-
53
New variations of Mirai and the Gafgyt botnet are harnessing new vulnerabilities to compromise IoT devices, including the security flaw which caused the 2017Equifax data breach. On Sunday, researchers from the Pal...
-
9
SonicWall warns customers about zero-day vulnerabilitiesFirewall and network security appliance manufacturer SonicWall is urging customers to take preventive actions after its own systems were attacked through previously unknown vulnerabiliti...
-
7
【漏洞预警】SonicWall NSM认证后命令注入漏洞 【POC公开】 【漏洞预警】SonicWall NSM认证后命令注入漏洞 【POC公开】
-
6
Google bans 151 Android apps linked to an SMS scam campaign from the Play Store If you have any of these apps on your phone, uninstall them immediately By...
-
6
Ransomware attacks surged 2X in 2021, SonicWall reports Image Credit: SonicWall Join today's leading executives online at the Dat...
-
7
SonicWall发出警告,Windows 11安全存在“局限性” 作者:Zhuolin 2023-02-09 16:07:01 安全 号称史上最好的Windows系统“Win11”宣布首...
-
3
Hackers are targeting SonicWall devices with malware that can survive firmware updates The UNC4540 threat means to deploy persistent malware By
-
10
Barracuda Zero-Day Vulnerability: Mandiant Points to Chinese Threat ActorsUS officials continue to sound the alarm on China’s cyber espionage capabilities. How can enterprises prepare for escalating state-sponsored cyber threa...
-
13
Meta deletes 8,000 Facebook accounts linked to Chinese disinformation campaign Covert network targeted more than 50 social...
-
3
超过 17.8万个 SonicWall防火墙易受到DoS和潜在RCE攻击 作者:Zicheng 2024-01-16 11:12:29 安全 根据威胁监控平台 Shadowserver 的...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK