UNC3886
Overview
They generally targets firewall and virtualization technologies which lack EDR support. This indicates that the group have curated a deeper-level of understanding of such technologies. They have also modified the publicly available malware.
How does it works?
The cyber espionage group harvest credentials for service accounts from a vCenter Server for all the connected ESXi hosts from the embedded vPostgreSQL server built into vCenter Server Appliance. They readily exploit the zero-day vulnerability to execute privileged command across Windows, Linux, and PhotonOS (vCenter) guest VMs without authentication of guest credentials from a compromised ESXi host and no default logging on guest VMs.
After that, backdoors on ESXi hosts are deployed via an alternative socket address family, use VMCl, for lateral movement and maintain persistence. These hackers are also spotted modifying and disabling logging services on compromised systems.
Prevention
Hence, user awareness training to educate internal staff about proper procedures for assessing as well as handling documents, and a full-fledged Defense-in-Depth-based cybersecurity program is the best way to prevent a successful UNC3886 attack.
Comments
Post a Comment