Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
May 24, 2024, 2:25 p.m.
Tags
External References
Description
This report details a sophisticated cyber intrusion targeting MITRE's research network (NERVE) through the exploitation of Ivanti Connect Secure zero-day vulnerabilities. The threat actor, suspected to be UNC5221, initiated the attack by gaining unauthorized access and subsequently deploying various web shells and backdoors to maintain persistence. The report provides a chronological breakdown of the adversary's tactics, techniques, and procedures, including profiling the environment, manipulating virtual machines, deploying malicious payloads, and laterally moving across the network. Additionally, it offers insights into the malware employed, such as ROOTROT, WIREFIRE, BUSHWALK, BEEFLUSH, and BRICKSTORM. The report underscores the importance of proactive security measures and collaboration in addressing sophisticated cyber threats.
Date
Published: May 24, 2024, 1:52 p.m.
Created: May 24, 2024, 1:52 p.m.
Modified: May 24, 2024, 2:25 p.m.
Indicators
cvedev.morsag3ah.workers.dev
log.morsag3ah.workers.de
update.morsag3ah.workers.dev
morsag3ah.workers.dev
Attack Patterns
BRICKSTORM
BUSHWALK - S1118
BEEFLUSH
WIREFIRE - S1115
ROOTROT
GIFTEDVISITOR
UNC5221
T1610
T1600
T1588
T1556
T1583
T1567
T1505
T1598
T1574
T1518
T1595
T1592
T1190