CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Copy-Paste Threat Actor in the Asia Pacific Region

Summary

Australian Prime Minister Australian Prime Minister Scott Morrison announced today that multiple Australian public and private organizations are being urged to safeguard their technology networks, as the country comes under a major cyber-attack. He further stated that all levels of government and the private sectors are being targeted in a "Sophisticated State-based" cyber-attack.

Trustwave has received the known IOCs, and CVEs from the Australian Cyber Security Centre.  We have commenced hunting for these IOCs throughout our global Fusion customer base. We are proactively devising new detection logic to identify behavioral elements of this threat. Any detection will be escalated and supported via our standard engagement methods.

Additional updates will be provided tomorrow. Interim advisories will be released when significant changes are tracked as they relate to this threat.

Initial analysis of the intel

The actor was identified actively using publicly available exploit codes, proof of concepts, web shells and other open source offense tools, which can be used to gain privilege access on the target system. The heavy use of pre-existing tools and exploits earned this threat actor the title of "Copy-Paste".

These tools were used against publicly facing infrastructure, primarily focusing on unpatched web services that then lead to Remote Code Execution (RCE). The targeted platforms were Telerik, Microsoft IIS, SharePoint, and Citrix.

The threat actor conducted reconnaissance against the targets, identifying any unpatched services running in the environment. Where RCE was not possible, the actor used various other techniques to gain privileged access on the internet facing systems and internal machines as required.

The threat actor also used various spear-phishing campaigns on targets where the previously mentioned techniques were unsuccessful. The spear-phishing techniques included credential harvesting, emails with malicious attachments, OAuth token grabbing and email tracking services.

The treat actor actively leveraged stolen credentials and compromised Australian legitimate websites to host command and controls (C2) to avoid geo-blocking defenses of target organizations and therefore masquerade their activity as legitimate traffic.

Trustwave Actions:

  1. Trustwave Security Operations Centre (SOC) is exercising extra vigilance in monitoring IoC related traffic. 
  2. Trustwave Managed Firewalls will have changes made to block the relevant IPs under the known bad actors (KBA).
  3. Trustwave will monitor Cyber technology vendors and apply relevant policy updates as they are released.

Trustwave Recommendations:

Trustwave urges all customers to take appropriate actions to minimize cybersecurity risk. Below are the recommendations in reference to the observed attack. IoCs are available at the end of this post.

  1. Raise security awareness of all staff and contractors to identify and report SPAM & phishing emails.
  2. Block Indicators of Compromise (IoC) as per the attachment, such as IP addresses, email addresses, hash values, at various levels that are applicable to your environment.
  3. Address the following vulnerabilities on your internal hosts as they are being actively exploited in the wild:
    • Exploitation of Telerik UI CVE-2019-18935
    • Exploitation of Citrix Products CVE-2019-19781
    • Exploitation of Microsoft SharePoint CVE-2019-0604
  4. Review privileged accounts within your organization.
  5. Alert your internal security operations team to exercise extra vigilance. 
  6. Review the ACSC Advisory and take appropriate actions relevant to your environment.
  7. Require periodic password change policies and implement MFA (multi-factor authentication) where appropriate
  8. Implementation of Brand monitoring services to alert for an organization’s sensitive data leaks/sale

Trustwave Hunting Strategy:

Trustwave SpiderLabs Threat Fusion Team internally strategies and prepares threat hunting plans for all significant global cyber events. We use this exercise to drive our hunt operations for our Managed Security clients. Based on the Australian prime minister's comments on 19 June, 2020 and the unprecedented nature of this attack, SpiderLabs is taking the extraordinary step of sharing our internal threat hunt plan for the Copy-Paste threat actor. All organisations can undertake similar operations within their own environment, or contact Trustwave about engaging professional hunt.

Indicators of Compromise:

Important notes prior starting the hunt:

  • Threat actor used publicly available exploit code
    • Telerik CVE-2019-18935
    • Citrix CVE-2019-19781
    • Microsoft SharePoint CVE-2019-0604
  • Spear-phishing campaign
  • web shells
  • PowerShell reverse shell
  • PowerShell empire
  • HTTPotato (hot potato)

Usage of publicly available exploit codes:

  • Telerik CVE-2019-18935
    • Search for the URI “Telerik.Web.UI.WebResource.axd?type=rau”
    • Search for the file “sleep*.dll”, “rev_shell*.dll”
    • Network Connections from w3wp.exe
    • YARA rules available at the appendix
  • Citrix CVE-2019-19781
    • Search for URI “/vpns/portal/”
      • Might contain junk codes like this /vpns/portal/<malicious_code>
    • Look for unusual XML files from below filesystem (random filename)
      • /netscaler/portal/templates
      • /var/tmp/netscaler/portal/templates
    • Look for possible webshells
      • var/vpn/themes/admin.php
      • var/vpn/themes/default/default.php
    • Microsoft SharePoint CVE-2019-0604
      • Search for URI
        • “Picker.aspx?PickerDialogType=Microsoft.SharePoint" – Investigate the header “ctl00$PlaceHolderDialogBodySection$ctl05$hiddenSpanData” for shellcode
      • Search for URI “/_layouts/15/ua.aspx” – possible web shell

Spear-Phishing Campaign:

  • Search for the file “Thesis Information to be referenced from.ppt”
  • Activities from domain
    • mailguardonline[.]net
    • cybersecuritiesinc[.]net

Web Shells:

  • Since the attacker is using publicly available web shells from Github, security controls have detected them for the most part.
  • Look for below extension in the URI
    • aspx
    • aspx
    • aspx

PowerShell reverse Shell:

  • Search in command line
    • exe –exec bypass –c
    • exe -WindowStyle hidden -ExecutionPolicy Bypass
    • exe "IEX (New-ObjectNet.WebClient).DownloadString
  • Search YARA rules mentioned below

Credential Access:

  • Usage of the below tools
    • Procdump
    • Ntdsutil
      • ntdsutil “ac i ntds”

Lateral Movement:

  • command line
    • wmic /node:*process call create -> Creates remote process
    • schtasks /create /tn * /tr * /RU System -> run task with SYSTEM user
  • Look for Scheduled task running as SYSTEM user

YARA Rules:

YARA Rule for Juicypotato LPE

rule juicypotato_LPE:LPE

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "exe_dll"

strings:

$str1 = "JuicyPotato" nocase wide ascii

$str2 = "4991d34b-80a1-4291-83b6-3328366b9097" nocase wide ascii

$str3 = "JuicyPotato.pdb" nocase wide ascii

$str4 = "Waiting for auth" nocase wide ascii

condition:        

            (uint16(0) == 0x5A4D) and 3 of ($str*) and filesize < 500KB

}

YARA Rule for Juicypotato LPE_DLL

rule juicypotato_LPE_DLL:LPE

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "exe_dll"

strings:

$str1 = "Potato.dll" nocase wide ascii

$str2 = "VirusDeleted" nocase wide ascii

$str3 = "Page404r" nocase wide ascii

condition:        

            (uint16(0) == 0x5A4D) and all of them and filesize < 200KB

}

YARA Rule for CVE-2019-18935 reverse_shell

rule CVE_2019_18935_reverse_shell:CVE

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "exe_dll"

strings:

$str1 = "rev_shell_" nocase wide ascii

$str2 = "operator<=>" nocase wide ascii

$str3 = "operator co_await" nocase wide ascii

condition:        

            (uint16(0) == 0x5A4D) and all of them and filesize < 150KB

}

YARA Rule for malicious macros

rule macros:phishing

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "macros_VBA"

strings:

$str1 = "\\Microsoft\\Word\\STARTUP\\Template.dotm" nocase wide ascii

$str2 = "bin.hex" nocase wide ascii

$str3 = "ALL = ALL0 + ALL1 + ALL2" nocase wide ascii

$str4 = "504b" nocase wide ascii

condition:        

            all of them and filesize < 150KB

}

YARA Rule for HTTPCore PowerShell script

rule powershell_httpcore:rev_shell

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "powershell_script"

strings:

$str1 = "HttpCore.Agent" nocase wide ascii

$con1 = "RootPath =" nocase wide ascii

$con2 = "RemotePassword =" nocase wide ascii

$con3= "RemoteLangType = " nocase wide ascii

$con4 = "Url =" nocase wide ascii

condition:        

            $str1 and 2 of ($con*) and filesize < 150KB

}

YARA Rule for PowerShell Reverse Shell

rule powershell_rev_shell:rev_shell

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "Powershell_script"

strings:

$str1 = "(pwd).Path" nocase wide ascii

$con1 = "bytes = 0..65535" nocase wide ascii

$con2 = "sendback =" nocase wide ascii

$con3= "sendbyte = " nocase wide ascii

$con4 = "client =" nocase wide ascii

$con5 = "stream =" nocase wide ascii

condition:        

            $str1 and 4 of ($con*) and filesize < 150KB

}

YARA Rule for HTTPCore backdoor

rule HTTPcore_rev_shell:rev_shell

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "exe_dll"

strings:

$str1 = "HttpCore.dll" nocase wide ascii

$con1 = "RootPath" nocase wide ascii

$con2 = "RemotePassword" nocase wide ascii

$con3 = "RemoteLangType" nocase wide ascii

$con4 = "CurrentPassword" nocase wide ascii

condition:        

            (uint16(0) == 0x5A4D) and all of them and filesize < 150KB

}

YARA Rule for Downloader

rule Downloader

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "exe_dll"

strings:

$str1 = "\\obj\\Release\\Library.pdb" nocase wide ascii

$con1 = "https://api.onedrive.com/v1.0/shares/s" nocase wide ascii

$con2 = "Microsoft SkyDriveSync" nocase wide ascii

condition:        

            (uint16(0) == 0x5A4D) and all of them and filesize < 200KB

}

YARA Rule for awen asp webshell

rule awen_asp_webshell:webshell

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "aspx_webshell"

strings:

$str1 = "awen asp.net webshell" nocase wide ascii

$con1 = "cmdExe_Click" nocase wide ascii

condition:        

            all of them and filesize < 100KB

}

YARA Rule for HighShell Aspx webshell

rule HighShell_aspx:webshell

{

meta:

            author = "SpiderLabs"

            group = "copy_paste"

            filetype =  "aspx_webshell"

strings:

$str1 = "pro"

$str2 = "cmd"

$str3 = "sav"

$str4 = "vir"

$str5 = "J3ugYdknpax1ZbHB2QILB5NS6dVa0iUD0mhhBPv0Srw="

$str6 = {22 63 6d 64 2e 65 78 65 22 3a 70 72 6f}

condition:        

            all of them and filesize < 150KB

}

Latest SpiderLabs Blogs

EDR – The Multi-Tool of Security Defenses

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More

The Invisible Battleground: Essentials of EASM

Know your enemy – inside and out. External Attack Surface Management tools are an effective way to understand externally facing threats and help plan cyber defenses accordingly. Let’s discuss what...

Read More

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog boxes into its malware loader to make it more convincing to phishing targets during a Red Team...

Read More