

Attacker uses the Azure Serial Console to gain access to Microsoft VM
source link: https://www.csoonline.com/article/3696280/attacker-uses-the-azure-serial-console-to-gain-access-to-microsoft-vm.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Attacker uses the Azure Serial Console to gain access to Microsoft VM
Using the access to virtual machines the attackers employed malicious use of the Serial Console on Azure Virtual Machines to install third-party remote management software within client environments.

Financially motivated threat actor UNC3944 is using phishing and SIM swapping attacks to take over Microsoft Azure admin accounts and gain access to virtual machines (VM), according to cybersecurity firm Mandiant.
Using access to virtual machines the attackers employed malicious use of the Serial Console on Azure Virtual Machines to install third-party remote management software within client environments, Mandiant said in a blog.
UNC3944 has been active since May 2022. The threat actor has been observed carrying out SIM-swapping attacks followed by the establishment of persistence using compromised accounts.
Once persistence has been established, UNC3944 has been seen modifying and stealing data from within the victim organization’s environment. “This threat group heavily relies on email and SMS phishing attacks and has also been observed attempting to phish other users within an organization once they’ve gained access to employee databases,” Mandiant said.
Smishing used by threat actors
The threat actor leverages compromised credentials of administrators or other privileged accounts for initial access. A common tactic employed by this attacker involves smishing of privileged users, SIM swapping, and then impersonating the users to trick helpdesk agents into sending a multi-factor reset code via SMS, Mandiant said.
Once the threat actor has gained access to the Azure administrator’s account, they gain full access to the Azure tenant as administrator accounts have global privileges granted. With full access to the tenant, the threat actor can export information about the users in the tenant, gather information about the Azure environment configuration and the various VMs, and create or modify accounts.
Mandiant researchers have observed the threat actor using their access to a highly privileged Azure account to leverage Azure Extensions for reconnaissance purposes.
Using extensions for information gathering
After gaining access to the Azure environment, the threat actor uses the built-in Azure diagnostic extensions for information-gathering purposes, Mandiant said.
Azure Extensions are additional features and services that can be integrated into an Azure Virtual Machine to expand capabilities and automate tasks. The extension CollectGuestLogs which can be used to gather log files for offline analysis and preservation is one such extension leveraged by the threat actor.
“Once the attacker completes their reconnaissance, they employ the Serial Console functionality to gain an administrative command prompt inside of an Azure VM,” Mandiant said. The threat actor then runs a command which identifies the name of the currently logged-in user.
“To maintain a presence on the VM, the attacker often deploys multiple commercially available remote administration tools via PowerShell,” Mandiant said, adding that the advantage of using these tools is that they’re legitimately signed applications and provide the attacker remote access without triggering alerts in many endpoint detection platforms.
UNC3944 also creates a reverse SSH tunnel to their command and control server, to maintain access via a secure channel and bypass network restrictions and security controls. The reverse tunnel is configured with port forwarding, facilitating a direct connection to Azure Virtual Machine via Remote Desktop.
“Following the creation of the SSH tunnel, the attacker established a connection to the SSH tunnel using their current account or by compromising additional user accounts and leveraging them to connect to the compromised system via Remote Desktop,” Mandiant said.
Living off the land attacks
Living off the land attacks like these have become far more common as attackers have learned to make use of built-in tools to evade detection, Mandiant said. “The novel use of the Serial Console by attackers is a reminder that these attacks are no longer limited to the operating system layer.”
Land attacks are the ones where attackers use legitimate tools within the victim’s systems to carry out their attacks.
Mandiant is recommending that organizations restrict access to remote administration channels and disable SMS as a multifactor authentication method wherever possible. It is also recommended to review user account permissions for overly permissive users and implement appropriate Conditional Access Authentication Strength policies.
Recommend
-
28
Two bitcoin cash (BCH) mining pools recently carried out what is known as a 51 percent attack on the blockchain in an apparent effort to reverse another miner’s transactions. The move is tied to the bitcoin cash...
-
14
A note from Sqreen’s CTO When Charles reached out to me to disclose this issue, we reacted with one goal in mind: protecting our customers. As such, we built a disclosure schedule and reported the issue privately to our impacted u...
-
10
Threat Research Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor Executive Summary We have discovered a global intrusion camp...
-
6
Introduction Serial communication, while old, is still used in many embedded systems and microcontrollers. It is commonly used with Arduino, CircuitPy, and similar boards. We will look at how to connect, send, and receive data using...
-
12
Sun Ultra 60 serial console login with a VT132 I recently assembled a VT132 and have been connecting it to various things to enjoy some serial terminal goodness. I’ve...
-
14
EC2 總算支援透過 Serial Console 操作了... 以往 Amazon EC2 的機器爛到開不起來時只能「看」到 Console 的輸出,然後要把 root volume 掛到其他機器上修正,接著再掛回來 (然後沒修好就要再重複......
-
11
Attaching to a Raspberry Pi's Serial Console (UART) for debugging October 1, 2021 Sometimes a Pi just won't...
-
5
Serial Console Cable for Aruba AP-205H Serial Console Cable for Aruba AP-205H 2022-10-17 20:19:14 #网络
-
9
Unintentionally BREAKing a serial console I heard about a neat bug once that was caused by the interaction of some hardware that was missing some electronics and some software which was just doing what it was told. It had to do with t...
-
4
Attacker...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK