Experts Uncover Malicious Code Exploiting Vulnerability in ManageEngine ADSelfService

On November 8, 2021, it was revealed that at least nine organizations in the technology, defense, healthcare, energy, and education sectors were compromised due to a recently patched critical vulnerability in Zoho’s ManageEngine ADSelfService Plus self-service password management and single sign-on (SSO) solution. This surveillance campaign, which began on September 22, 2021, saw attackers exploiting the flaw to gain initial access, subsequently moving laterally within the networks to conduct post-exploitation activities. They deployed malicious tools designed to harvest credentials and exfiltrate sensitive data through a backdoor. “The attackers relied heavily on the Godzilla web shell, uploading various versions of this open-source tool to the compromised servers throughout the operation,” reported researchers from Palo Alto Networks’ Unit 42 threat intelligence team. “Several other tools exhibited unique characteristics or functionalities…”

Experts Uncover Malicious Code Exploiting Vulnerability in ManageEngine ADSelfService

On November 8, 2021, it was disclosed that a cyber espionage campaign had exploited a recently patched critical vulnerability in Zoho’s ManageEngine ADSelfService Plus platform, which is widely used for self-service password management and single sign-on (SSO) solutions. The breach has impacted at least nine organizations across diverse sectors, including technology, defense, healthcare, energy, and education.

The malicious activity began on September 22, 2021, when threat actors leveraged the vulnerability to gain initial access to their targets. Once inside, they executed lateral movements within the networks, enabling them to carry out a series of post-exploitation tasks. These actions involved deploying various malicious tools specifically designed to extract credentials and exfiltrate sensitive data via established backdoors.

Researchers from Palo Alto Networks’ Unit 42 threat intelligence team detailed in their report that the attackers relied heavily on a web shell named Godzilla. They consistently uploaded multiple variants of this open-source web shell onto the compromised servers throughout the duration of the campaign. The use of such tools, characterized by their sophistication, indicates a calculated effort to maintain persistence within the affected environments.

In analyzing the tactics employed, several aspects of the MITRE ATT&CK framework emerge as relevant. The initial access was facilitated through the exploitation of a software vulnerability, indicative of techniques such as “Exploit Public-Facing Application.” Given the actors’ ability to manipulate the network post-exploitation, tactics related to “Lateral Movement” and “Credential Dumping” were likely utilized to escalate privileges and maintain a foothold within the targeted organizations.

The reported incidents span multiple industries, underscoring a concerning trend in cyber threats spanning various critical infrastructure sectors. This activity not only calls attention to the vulnerability of widely used software solutions but also highlights the ongoing risks that organizations face from sophisticated threat actors. Business owners are urged to closely monitor their systems for potential exploits and to ensure that all software is updated promptly to mitigate the risk of similar intrusions.

As the cybersecurity landscape continues to evolve, the emphasis on proactive measures cannot be overstated. Organizations must remain vigilant, applying best practices in threat detection and response, to safeguard against the ever-present threat of malicious code and cyber espionage.

Source link