Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label APT-29. Show all posts

How F5 BIG-IP Cookies Are Being Exploited for Network Snooping: A CISA Warning

 



US Government's Cybersecurity and Infrastructure Security Agency released a warning regarding cyberattackers use of unencrypted cookies managed by the F5 BIG-IP Local Traffic Manager, by which they gather information about private networks. In this manner, these attackers identify the internal, non-public devices through the use of this cookie, thereby potentially targeting the vulnerabilities on that network. While CISA does not disclose who is behind this attack and for what reasons, the activity surely indicates serious threat potential to organisational security.

Confidence and Data Integrity Exposed

According to CISA's advisory, these cookies would probably allow attackers to understand the network structures and discover some areas where the attack can be performed. It is true that cybersecurity has compared with physical security, some delicate balances of trust on which companies dealing with sensitive information depend. The attackers may go through the data contained in these cookies while studying it and realise and use key resources in a network to escalate access or tamper with data.

Recommendations for the Protection of F5 BIG-IP Cookies

CISA recommends that all the organisations that use the F5 BIG-IP equipment encrypt those cookies. The encryption can be set up on these devices through HTTP profile settings so it can act as an added layer of protection against unauthorised access. CISA further recommends use of the BIG-IP iHealth diagnostic tool by F5, which conducts full system evaluation against potential weaknesses and vulnerabilities. The tool offers tailored recommendations for bettering security circumstances, including configuration issues or outdated code.

Warnings of Broader Cyber Threats

The U.S. and the U.K. cybersecurity agencies have simultaneously warned about the Russian-backed hacking group APT29, which is also known as Cozy Bear or Midnight Blizzard. This group has consistently targeted areas in the areas of diplomatic, defence, tech, and financial sectors to obtain sensitive foreign intelligence. APT29, which links back to Russia's Foreign Intelligence Service (SVR), practises low-key in conducting operations and utilises TOR and other tools of similar nature to mask its operations.

APT29: Tactics of Persistence, Stealth, Strategy

APT29's infrastructure is complicated, and the actors often lease servers through fake identities and low-reputation email addresses in North America. This makes detecting the activity in the network more challenging because it imitates legitimate network traffic. In addition to intelligence gathering, APT29 often tries to create enduring access within targeted systems through spear-phishing or exploiting widely known, but unpitched, vulnerabilities. Other notable vulnerabilities of interest recently include CVE-2022-27924 in Zimbra Collaboration and CVE-2023-42793, a TeamCity Server authentication bypass flaw that could help facilitate remote code execution.

Defending Against APT29 Threats

APT29 is famous for changing its tactics to evade detection and will destroy its infrastructure if it detects that it is under surveillance. To mitigate this, organisations are encouraged to implement and track baseline network activity, which makes it easier to recognize aberrant access patterns. The hackers' strategies include proxy networks and mobile and residential IP addresses to mirror legitimate users. Thus, companies should look at access attempts with a magnifying glass to identify deviations from normal behaviour.

Importance of Regular Security Patches

Tenable, a cybersecurity firm, claims that the only way to win against APT29 and other advanced persistent threats (APTs) is by having recent versions of the software. The main way of countering such attacks is by keeping security updates and patches on known vulnerabilities. Tenable Senior Research Engineer Satnam Narang said that the long-term targeting of organisations operating within the U.S. and Europe by APT29 underlines its foreign intelligence gathering and ensures long-term access to compromised systems.

It is a necessity both for the advisory put out by CISA and the joint bulletin by the U.S. and U.K. in light of the evolution of these threats. For organisations, keeping sensitive information safe and establishing trust becomes of utmost importance. The use of security measures like encrypting F5 BIG-IP cookies and keeping updated on threat intelligence can stop attackers from exploiting their weaknesses. Proactive defences have to be built up in these systems because they are becoming increasingly complex in nature and ensuring the integrity of data and avoiding malicious intrusion into it.


Midnight Blizzard: Russian Threat Actors Behind Microsoft Corporate Emails’ Breach


On Friday, Microsoft informed that some of its corporate accounts suffered a breach in which some of its data was compromised. The attack was conducted by a Russian state-sponsored hackers group named “Midnight Blizzard.”

The attack was first detected on January 12th, and Microsoft in its initial investigation attributed the attack to the Russian threat actors, known famously as Nobelium or APT-29.

Microsoft informs that the threat actors launched the attacks in November 2023, in which they carried out a password spray attack in order to access a legacy non-production test tenant account. 

Password Spray Attack

A password spray attack is a type of brute force attack where threat actors collect a list of potential login names and then attempt to log in to all of them using a particular password. If that password fails, they repeat this process with other passwords until they run out or successfully breach the account.

Since the hackers were able to access accounts using a brute force attack, it is clear that it lacked two-factor authentication or multi-factor authentication.

Microsoft claims that after taking control of the "test" account, the Nobelium hackers utilized it to access a "small percentage" of the company's email accounts for more than a month.

It is still unclear why a non-production test account would have the ability to access other accounts in Microsoft's corporate email system unless the threat actors utilized this test account to infiltrate networks and move to accounts with higher permissions.

Apparently, these breached accounts include members of Microsoft’s leadership team and employees assigned to the cybersecurity and legal departments, targeted by hackers to steal emails and attachments. 

"The investigation indicates they were initially targeting email accounts for information related to Midnight Blizzard itself," the Microsoft Security Response Center shared in a report on the incident.

"We are in the process of notifying employees whose email was accessed."

Microsoft reaffirms that the incident was caused by the brute force password attack, rather than a vulnerability in their product services.

However, it seems that Microsoft’s poorly managed security configuration played a major role in the success of the breach.

While this investigation is underway, Microsoft stated that they will release more information when it is appropriate.