Unveiling Sophisticated Malware Targeting Ivanti VPNs

, Ivanti VPN Malware

As the digital realm expands, so do the vulnerabilities within its infrastructure, leading to a sweeping mesh of cyber threats. Google’s cyber threat intelligence arm, Mandiant, spotlights this veiled battle with their latest revelation. The group uncovers new forms of malware targeting Ivanti VPN solutions, which allow remote secure access to internal networks. Dubbed names like BUSHWALK, CHAINLINE, FRAMESTING, and LIGHTWIRE, these malicious web shells epitomize the sophistication of cyber espionage.

Mandiant’s report, released on January 12, 2024, documents extensive exploitation of two zero-day vulnerabilities. These breaches, tagged as CVE-2023-46805 and CVE-2024-21887, give attackers the ability to run commands with heightened privileges. By December 2023, these weaknesses had become prey to cybercriminals, with Germany’s Federal Office for Information Security bearing witness to system compromises.

The peril deepens with UNC5221, an espionage collective with threads tracing back to China. They orchestrate focused attacks against industries Chinese interests might find tempting. UNC5221 finely tunes these attacks, using code sourced from Chinese-language Github repositories and adopting tactics mirroring other China-based operators. But their activities harbor broader implications, with other unclassified threat groups leveraging the Ivanti vulnerabilities through automated methods.

The sophistication of these cyber incursions is stark. BUSHWALK, constructed in Perl, cleverly embeds itself in legitimate Ivanti files, evading pre-set defenses. In contrast, FRAMESTING and CHAINLINE, both Python treasures, slither into Ivanti’s Connect Secure packages to commandeer arbitrary code execution. Meticulous tracking by Mandiant indicates that the malware families and variants linked with UNC5221, like WARPWIRE, enable continued stealthy control, credential theft, and extensive command executions.

In the aftermath of the exposed vulnerabilities, Ivanti quickly released patches and additional security measures. They cite the new vulnerabilities as CVE-2024-21888 and CVE-2024-21893, urging users to apply updates to stave off exploitation.

For those hoping to understand the tools used post-exploitation, UNC5221 and others turn to open-source utilities. These include Impacket, a significant toolkit for Python developers, CrackMapExec, a robust Swiss army knife for network penetration, iodine, an innovative DNS tunneling solution, and the versatile Windows and Samba enumerator Enum4linux. Each tool serves a purpose in the intricate dance of network reconnaissance, lateral movements, and the siphoning of data.

To fortify against these rising threats, proactive steps are vital. Applying Ivanti’s mitigations and initiating a comprehensive password reset for affected users are paramount. Furthermore, implementing the Ivanti Integrity Checker Tool (ICT), internal and external, can aid in identifying compromises. Only by arming oneself with the necessary defenses and ongoing vigilance can one navigate the treacherous currents of cybersecurity.

If you enjoyed this article, please check out our other articles on CyberNow

February 1, 2024
Google's Mandiant uncovers new malware forms targeting Ivanti VPN solutions, highlighting advances in cyber espionage.