By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Tech News

UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying

By Viral Trending Content 5 Min Read
Share
SHARE

Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage

Chinese Cyber Espionage

The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and VMware devices has been observed utilizing multiple persistence mechanisms in order to maintain unfettered access to compromised environments.

“Persistence mechanisms encompassed network devices, hypervisors, and virtual machines, ensuring alternative channels remain available even if the primary layer is detected and eliminated,” Mandiant researchers said in a new report.

The threat actor in question is UNC3886, which the Google-owned threat intelligence company branded as “sophisticated, cautious, and evasive.”

Attacks orchestrated by the adversary have leveraged zero-day flaws such as CVE-2022-41328 (Fortinet FortiOS), CVE-2022-22948 (VMware vCenter), and CVE-2023-20867 (VMware Tools) to perform various malicious actions, ranging from deploying backdoors to obtaining credentials for deeper access.

Cybersecurity

It has also been observed exploiting CVE-2022-42475, another shortcoming impacting Fortinet FortiGate, shortly after its public disclosure by the network security company.

These intrusions have primarily singled out entities in North America, Southeast Asia, and Oceania, with additional victims identified in Europe, Africa, and other parts of Asia. Targeted industries span governments, telecommunications, technology, aerospace and defense, and energy and utility sectors.

A notable tactic in UNC3886’s arsenal is that it developed techniques that evade security software and enable it to burrow into government and business networks and spy on victims for extended periods of time without detection.

This entails the use of publicly available rootkits like Reptile and Medusa on guest virtual machines (VMs), the latter of which is deployed using an installer component dubbed SEAELF.

“Unlike REPTILE, which only provides an interactive access with rootkit functionalities, MEDUSA exhibits capabilities of logging user credentials from the successful authentications, either locally or remotely, and command executions,” Mandiant noted. “These capabilities are advantageous to UNC3886 as their modus operandi to move laterally using valid credentials.”

Also delivered on the systems are two backdoors named MOPSLED and RIFLESPINE that take advantage of trusted services like GitHub and Google Drive as command-and-control (C2) channels.

Chinese Cyber Espionage

MOPSLED, a likely evolution of the Crosswalk malware, is a shellcode-based modular implant that communicates over HTTP to retrieve plugins from a GitHub C2 server, while RIFLESPINE is a cross-platform tool that makes use of Google Drive to transfer files and execute commands.

Mandiant said it also spotted UNC3886 deploying backdoored SSH clients to harvest credentials post the exploitation of 2023-20867 as well as leveraging Medusa to set up custom SSH servers for the same purpose.

“The threat actor’s first attempt to extend their access to the network appliances by targeting the TACACS server was the use of LOOKOVER,” it noted. “LOOKOVER is a sniffer written in C that processes TACACS+ authentication packets, performs decryption, and writes its contents to a specified file path.”

Cybersecurity

Some of the other malware families delivered during the course of attacks aimed at VMware instances are below –

  • A trojanized version of a legitimate TACACS daemon with credential-logging functionality
  • VIRTUALSHINE, a VMware VMCI sockets-based backdoor that provides access to a bash shell
  • VIRTUALPIE, a Python backdoor that supports file transfer, arbitrary command execution, and reverse shell capabilities
  • VIRTUALSPHERE, a controller module responsible of a VMCI-based backdoor

Over the years, virtual machines have become lucrative targets for threat actors owing to their widespread use in cloud environments.

“A compromised VM can provide attackers with access to not only the data within the VM instance but also the permissions assigned to it,” Palo Alto Networks Unit 42 said. “As compute workloads like VMs are generally ephemeral and immutable, the risk posed by a compromised identity is arguably greater than that of compromised data within a VM.”

Organizations are advised to follow the security recommendations within the Fortinet and VMware advisories to secure against potential threats.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

How can derailments in workplace leadership cause a toxic triangle?

Amazon vs Perplexity AI: Legal Battle over AI Browser Shopping Access

5 Reasons Why the Motorola Edge 70 is the Super-slim Phone To Buy

Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions

Feeling the Effects of the Time Change? We Asked Experts How to Get Back on Track

TAGGED: Cloud security, cyber espionage, Cyber Security, Cybersecurity, Internet, network security, rootkit, Threat Intelligence, Virtual Machine, Vulnerability, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article SEC Crypto Sheriff Steps Down – Regulation In Limbo?
Next Article 4 reasons I’d still buy National Grid shares in a heartbeat despite the recent wobble!
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Kingdom Come: Deliverance 2 Director Lambasts the “Static, Scripted” Nature of The Outer Worlds 2
Gaming News
New Five Nights at Freddy's 2 trailer shows off Springtrap, Balloon Boy, and more
Gaming News
Today in History: November 5, Susan B. Anthony defies law and casts vote for president
World News
Meet Mira Nair, Zohran Mamdani’s 68-year-old mother who hit it big in Hollywood directing critical darlings like ‘Monsoon Wedding’
Business
Monero (XMR) jumps to 5-month high as privacy coins lead surprise market rally
Crypto
Strategy’s Bitcoin Position Is Bear-Proof, Analyst Says
Crypto
Should I follow Michael Burry’s lead and sell my red-hot Nvidia stock?
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Kingdom Come: Deliverance 2 Director Lambasts the “Static, Scripted” Nature of The Outer Worlds 2

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Kingdom Come: Deliverance 2 Director Lambasts the “Static, Scripted” Nature of The Outer Worlds 2
November 5, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?