Russian O | |
APT29 O | |
hackers O | |
' O | |
stealthy O | |
malware O | |
undetected O | |
for O | |
years O | |
O | |
By O | |
Ionut O | |
Ilascu O | |
O | |
January O | |
27 O | |
, O | |
2022 O | |
09:23 O | |
AM O | |
0 O | |
O | |
Cozy O | |
Bear O | |
Russian O | |
hackers O | |
camouflage O | |
new O | |
malware O | |
as O | |
legitimate O | |
files O | |
O | |
EXCLUSIVE O | |
: O | |
Hackers O | |
associated O | |
with O | |
the O | |
Russian O | |
Federation O | |
Foreign O | |
Intelligence O | |
Service O | |
( O | |
SVR O | |
) O | |
continued O | |
their O | |
incursions O | |
on O | |
networks O | |
of O | |
multiple O | |
organizations O | |
after O | |
the O | |
SolarWinds O | |
supply O | |
- O | |
chain O | |
compromise O | |
using O | |
two O | |
recently O | |
discovered O | |
sophisticated O | |
threats O | |
. O | |
O | |
The O | |
malicious O | |
implants O | |
are O | |
a O | |
variant O | |
of O | |
the O | |
GoldMax O | |
backdoor O | |
for O | |
Linux O | |
systems O | |
and O | |
a O | |
completely O | |
new O | |
malware O | |
family O | |
that O | |
cybersecurity O | |
company O | |
CrowdStrike O | |
now O | |
tracks O | |
as O | |
TrailBlazer O | |
. O | |
O | |
Both O | |
threats O | |
have O | |
been O | |
used O | |
in O | |
StellarParticle O | |
campaigns O | |
since O | |
at O | |
least O | |
mid-2019 O | |
but O | |
were O | |
identified O | |
only O | |
two O | |
years O | |
later O | |
, O | |
during O | |
incident O | |
response O | |
investigations O | |
. O | |
O | |
StellarParticle O | |
attacks O | |
have O | |
been O | |
attributed O | |
to O | |
the O | |
APT29 O | |
hacking O | |
group O | |
has O | |
been O | |
running O | |
cyber O | |
espionage O | |
campaigns O | |
for O | |
more O | |
than O | |
12 O | |
years O | |
and O | |
is O | |
also O | |
known O | |
as O | |
CozyBear O | |
, O | |
The O | |
Dukes O | |
, O | |
and O | |
Yttrium O | |
. O | |
O | |
Stealing O | |
cookies O | |
for O | |
MFA O | |
bypass O | |
O | |
In O | |
a O | |
report O | |
shared O | |
exclusively O | |
with O | |
BleepingComputer O | |
, O | |
cybersecurity O | |
company O | |
CrowdStrike O | |
today O | |
describes O | |
in O | |
detail O | |
the O | |
latest O | |
tactics O | |
, O | |
techniques O | |
, O | |
and O | |
procedures O | |
( O | |
TTPs O | |
) O | |
observed O | |
in O | |
cyberattacks O | |
from O | |
the O | |
Cozy O | |
Bear O | |
state O | |
- O | |
sponsored O | |
hackers O | |
. O | |
O | |
While O | |
some O | |
of O | |
the O | |
techniques O | |
are O | |
somewhat O | |
common O | |
today O | |
, O | |
Cozy O | |
Bear O | |
has O | |
been O | |
using O | |
them O | |
long O | |
before O | |
they O | |
became O | |
popular O | |
: O | |
O | |
credential O | |
hopping O | |
O | |
hijacking O | |
Office O | |
365 O | |
( O | |
O365 O | |
) O | |
Service O | |
Principal O | |
and O | |
Application O | |
O | |
bypassing O | |
multi O | |
- O | |
factor O | |
authentication O | |
( O | |
MFA O | |
) O | |
by O | |
stealing O | |
browser O | |
cookies O | |
O | |
stealing O | |
credentials O | |
using O | |
Get O | |
- O | |
ADReplAccount O | |
O | |
Credential O | |
hopping O | |
was O | |
the O | |
first O | |
stage O | |
of O | |
the O | |
attack O | |
, O | |
allowing O | |
the O | |
threat O | |
actor O | |
to O | |
log O | |
into O | |
Office O | |
365 O | |
from O | |
an O | |
internal O | |
server O | |
that O | |
the O | |
hackers O | |
reached O | |
through O | |
a O | |
compromised O | |
public O | |
- O | |
facing O | |
system O | |
. O | |
O | |
source O | |
: O | |
CrowdStrike O | |
O | |
CrowdStrike O | |
says O | |
that O | |
this O | |
technique O | |
is O | |
hard O | |
to O | |
spot O | |
in O | |
environments O | |
with O | |
little O | |
visibility O | |
into O | |
identity O | |
usage O | |
since O | |
hackers O | |
could O | |
use O | |
more O | |
than O | |
one O | |
domain O | |
administrator O | |
account O | |
. O | |
O | |
Bypassing O | |
MFA O | |
to O | |
access O | |
cloud O | |
resources O | |
by O | |
stealing O | |
browser O | |
cookies O | |
has O | |
been O | |
used O | |
since O | |
before O | |
2020 O | |
. O | |
CrowdStrike O | |
says O | |
that O | |
APT29 O | |
kept O | |
a O | |
low O | |
profile O | |
after O | |
decrypting O | |
the O | |
authentication O | |
cookies O | |
, O | |
likely O | |
offline O | |
, O | |
by O | |
using O | |
the O | |
Cookie O | |
Editor O | |
extension O | |
for O | |
Chrome O | |
to O | |
replay O | |
them O | |
; O | |
they O | |
deleted O | |
the O | |
extension O | |
afterward O | |
. O | |
O | |
“ O | |
This O | |
extension O | |
permitted O | |
bypassing O | |
MFA O | |
requirements O | |
, O | |
as O | |
the O | |
cookies O | |
, O | |
replayed O | |
through O | |
the O | |
Cookie O | |
Editor O | |
extension O | |
, O | |
allowed O | |
the O | |
threat O | |
actor O | |
to O | |
hijack O | |
the O | |
already O | |
MFA O | |
- O | |
approved O | |
session O | |
of O | |
a O | |
targeted O | |
user O | |
” O | |
- O | |
CrowdStrike O | |
O | |
This O | |
allowed O | |
them O | |
to O | |
move O | |
laterally O | |
on O | |
the O | |
network O | |
and O | |
reach O | |
the O | |
next O | |
stage O | |
of O | |
the O | |
attack O | |
, O | |
connecting O | |
to O | |
the O | |
victim O | |
’s O | |
O365 O | |
tenant O | |
for O | |
the O | |
next O | |
stage O | |
of O | |
the O | |
attack O | |
. O | |
O | |
CrowdStrike O | |
’s O | |
report O | |
describes O | |
the O | |
steps O | |
that O | |
APT29 O | |
took O | |
to O | |
achieve O | |
persistence O | |
in O | |
a O | |
position O | |
that O | |
allowed O | |
them O | |
to O | |
read O | |
any O | |
email O | |
and O | |
SharePoint O | |
or O | |
OneDrive O | |
files O | |
of O | |
the O | |
compromised O | |
organization O | |
. O | |
O | |
GoldMax O | |
for O | |
Linux O | |
and O | |
TrailBlazer O | |
O | |
During O | |
their O | |
incident O | |
response O | |
work O | |
on O | |
APT29 O | |
StellarParticle O | |
attacks O | |
, O | |
CrowdStrike O | |
’s O | |
researchers O | |
used O | |
the O | |
User O | |
Access O | |
Logging O | |
( O | |
UAL O | |
) O | |
database O | |
to O | |
identify O | |
earlier O | |
malicious O | |
account O | |
usage O | |
, O | |
which O | |
led O | |
to O | |
finding O | |
the O | |
GoldMax O | |
for O | |
Linux O | |
and O | |
TrailBlazer O | |
malware O | |
. O | |
O | |
CrowdStrike O | |
says O | |
that O | |
TrailBlazer O | |
is O | |
a O | |
completely O | |
new O | |
malware O | |
family O | |
, O | |
while O | |
GoldMax O | |
for O | |
Linux O | |
backdoor O | |
“ O | |
is O | |
almost O | |
identical O | |
in O | |
functionality O | |
and O | |
implementation O | |
to O | |
the O | |
previously O | |
identified O | |
May O | |
2020 O | |
Windows O | |
variant O | |
. O | |
” O | |
O | |
The O | |
researchers O | |
believe O | |
that O | |
the O | |
little O | |
differences O | |
are O | |
between O | |
the O | |
two O | |
GoldMax O | |
versions O | |
are O | |
due O | |
to O | |
the O | |
continuous O | |
improvements O | |
from O | |
the O | |
developer O | |
for O | |
long O | |
- O | |
term O | |
detection O | |
evasion O | |
. O | |
O | |
GoldMax O | |
was O | |
likely O | |
used O | |
for O | |
persistence O | |
( O | |
a O | |
crontab O | |
with O | |
a O | |
“ O | |
@reboot O | |
” O | |
line O | |
for O | |
a O | |
non O | |
- O | |
root O | |
user O | |
) O | |
over O | |
long O | |
periods O | |
in O | |
StellarParticle O | |
campaigns O | |
. O | |
The O | |
backdoor O | |
stayed O | |
undetected O | |
by O | |
posing O | |
as O | |
a O | |
legitimate O | |
file O | |
in O | |
a O | |
hidden O | |
directory O | |
. O | |
O | |
The O | |
TrailBlazer O | |
implant O | |
also O | |
hid O | |
under O | |
the O | |
name O | |
of O | |
a O | |
legitimate O | |
file O | |
and O | |
it O | |
was O | |
configured O | |
for O | |
persistence O | |
using O | |
the O | |
Windows O | |
Management O | |
Instrumentation O | |
( O | |
WMI O | |
) O | |
Event O | |
Subscriptions O | |
, O | |
a O | |
relatively O | |
new O | |
technique O | |
in O | |
2019 O | |
, O | |
the O | |
earliest O | |
known O | |
date O | |
for O | |
its O | |
deployment O | |
on O | |
victim O | |
systems O | |
. O | |
O | |
TrailBlazer O | |
managed O | |
to O | |
keep O | |
communication O | |
with O | |
the O | |
command O | |
and O | |
control O | |
( O | |
C2 O | |
) O | |
server O | |
covert O | |
by O | |
masking O | |
it O | |
as O | |
legitimate O | |
Google O | |
Notifications O | |
HTTP O | |
requests O | |
. O | |
O | |
CrowdStrike O | |
notes O | |
that O | |
the O | |
implant O | |
has O | |
modular O | |
functionality O | |
and O | |
“ O | |
a O | |
very O | |
low O | |
prevalence O | |
” O | |
and O | |
that O | |
it O | |
shares O | |
similarities O | |
with O | |
other O | |
malware O | |
families O | |
used O | |
by O | |
the O | |
same O | |
threat O | |
actor O | |
, O | |
such O | |
as O | |
GoldMax O | |
and O | |
Sunburst O | |
( O | |
both O | |
used O | |
in O | |
the O | |
SolarWinds O | |
supply O | |
- O | |
chain O | |
attack O | |
) O | |
. O | |
O | |
Tim O | |
Parisi O | |
, O | |
Director O | |
of O | |
Professional O | |
Services O | |
at O | |
CrowdStrike O | |
, O | |
told O | |
BleepingComputer O | |
that O | |
the O | |
covert O | |
activity O | |
of O | |
the O | |
two O | |
malware O | |
pieces O | |
delayed O | |
the O | |
discovery O | |
of O | |
the O | |
two O | |
malware O | |
pieces O | |
, O | |
as O | |
the O | |
researchers O | |
found O | |
them O | |
in O | |
mid-2021 O | |
. O | |
O | |
Recon O | |
and O | |
move O | |
to O | |
Office O | |
365 O | |
O | |
After O | |
gaining O | |
access O | |
to O | |
a O | |
target O | |
organization O | |
’s O | |
infrastructure O | |
and O | |
established O | |
persistence O | |
, O | |
APT29 O | |
hackers O | |
took O | |
every O | |
opportunity O | |
to O | |
collect O | |
intelligence O | |
that O | |
would O | |
allow O | |
them O | |
to O | |
further O | |
the O | |
attack O | |
. O | |
O | |
One O | |
constant O | |
tactic O | |
was O | |
to O | |
draw O | |
information O | |
from O | |
the O | |
victim O | |
’s O | |
internal O | |
knowledge O | |
repositories O | |
, O | |
the O | |
so O | |
- O | |
called O | |
wikis O | |
. O | |
These O | |
documents O | |
can O | |
hold O | |
sensitive O | |
details O | |
specific O | |
to O | |
various O | |
services O | |
and O | |
products O | |
in O | |
the O | |
organization O | |
. O | |
O | |
“ O | |
This O | |
information O | |
included O | |
items O | |
such O | |
as O | |
product O | |
/ O | |
service O | |
architecture O | |
and O | |
design O | |
documents O | |
, O | |
vulnerabilities O | |
and O | |
step O | |
- O | |
by O | |
- O | |
step O | |
instructions O | |
to O | |
perform O | |
various O | |
tasks O | |
. O | |
Additionally O | |
, O | |
the O | |
threat O | |
actor O | |
viewed O | |
pages O | |
related O | |
to O | |
internal O | |
business O | |
operations O | |
such O | |
as O | |
development O | |
schedules O | |
and O | |
points O | |
of O | |
contact O | |
. O | |
In O | |
some O | |
instances O | |
these O | |
points O | |
of O | |
contact O | |
were O | |
subsequently O | |
targeted O | |
for O | |
further O | |
data O | |
collection O | |
” O | |
- O | |
CrowdStrike O | |
O | |
Parisi O | |
told O | |
us O | |
that O | |
accessing O | |
company O | |
wikis O | |
was O | |
a O | |
common O | |
APT29 O | |
reconnaissance O | |
activity O | |
in O | |
the O | |
investigated O | |
StellarParticle O | |
attacks O | |
. O | |
O | |
CrowdStrike O | |
’s O | |
deep O | |
dive O | |
into O | |
APT29 O | |
’s O | |
StellarParticle O | |
campaigns O | |
offers O | |
details O | |
on O | |
how O | |
the O | |
threat O | |
actor O | |
connected O | |
to O | |
the O | |
victim O | |
’s O | |
O365 O | |
tenant O | |
through O | |
the O | |
Windows O | |
Azure O | |
Active O | |
Directory O | |
PowerShell O | |
Module O | |
, O | |
and O | |
performed O | |
enumeration O | |
queries O | |
for O | |
roles O | |
, O | |
members O | |
, O | |
users O | |
, O | |
domains O | |
, O | |
accounts O | |
, O | |
or O | |
a O | |
service O | |
principal O | |
's O | |
credentials O | |
. O | |
O | |
When O | |
analyzing O | |
the O | |
log O | |
entries O | |
, O | |
the O | |
researchers O | |
noticed O | |
that O | |
the O | |
threat O | |
actor O | |
also O | |
executed O | |
the O | |
AddServicePrincipalCredentials O | |
command O | |
. O | |
O | |
“ O | |
CrowdStrike O | |
analyzed O | |
the O | |
configuration O | |
settings O | |
in O | |
the O | |
victim O | |
’s O | |
O365 O | |
tenant O | |
and O | |
discovered O | |
that O | |
a O | |
new O | |
secret O | |
had O | |
been O | |
added O | |
to O | |
a O | |
built O | |
- O | |
in O | |
Microsoft O | |
Azure O | |
AD O | |
Enterprise O | |
Application O | |
, O | |
Microsoft O | |
StaffHub O | |
Service O | |
Principal O | |
, O | |
which O | |
had O | |
Application O | |
level O | |
permissions O | |
” O | |
- O | |
CrowdSrike O | |
O | |
The O | |
adversary O | |
had O | |
added O | |
a O | |
new O | |
secret O | |
to O | |
the O | |
application O | |
and O | |
set O | |
its O | |
validity O | |
for O | |
more O | |
than O | |
10 O | |
years O | |
, O | |
the O | |
researchers O | |
note O | |
. O | |
O | |
The O | |
permission O | |
level O | |
obtained O | |
this O | |
way O | |
let O | |
hackers O | |
access O | |
all O | |
mail O | |
and O | |
SharePoint O | |
/ O | |
OneDrive O | |
files O | |
in O | |
the O | |
company O | |
and O | |
allowed O | |
them O | |
to O | |
“ O | |
create O | |
new O | |
accounts O | |
and O | |
assign O | |
administrator O | |
privileges O | |
to O | |
any O | |
account O | |
in O | |
the O | |
organization O | |
. O | |
” O | |
O | |
Maintaining O | |
persistence O | |
O | |
Once O | |
Cozy O | |
Bear O | |
/ O | |
APT29 O | |
established O | |
persistence O | |
in O | |
a O | |
target O | |
organization O | |
they O | |
would O | |
maintain O | |
it O | |
for O | |
as O | |
long O | |
as O | |
possible O | |
, O | |
sometimes O | |
helped O | |
by O | |
the O | |
poor O | |
security O | |
hygiene O | |
of O | |
the O | |
compromised O | |
organization O | |
. O | |
O | |
The O | |
longest O | |
time O | |
the O | |
threat O | |
actor O | |
spent O | |
inside O | |
an O | |
organization O | |
was O | |
two O | |
years O | |
, O | |
Parisi O | |
told O | |
BleepingComputer O | |
. O | |
Persisting O | |
this O | |
long O | |
would O | |
not O | |
be O | |
possible O | |
without O | |
some O | |
effort O | |
from O | |
the O | |
hackers O | |
, O | |
since O | |
organizations O | |
often O | |
rotate O | |
credentials O | |
as O | |
a O | |
security O | |
precaution O | |
. O | |
O | |
To O | |
prevent O | |
losing O | |
access O | |
, O | |
Cozy O | |
Bear O | |
hackers O | |
would O | |
periodically O | |
refresh O | |
the O | |
stolen O | |
credentials O | |
by O | |
stealing O | |
new O | |
ones O | |
, O | |
oftentimes O | |
via O | |
Mimikatz O | |
. O | |
O | |
In O | |
at O | |
least O | |
one O | |
case O | |
, O | |
though O | |
, O | |
the O | |
administrators O | |
of O | |
the O | |
compromised O | |
company O | |
reset O | |
their O | |
passwords O | |
to O | |
the O | |
same O | |
ones O | |
, O | |
thus O | |
defeating O | |
the O | |
purpose O | |
of O | |
credential O | |
rotation O | |
. O | |
O | |
Cozy O | |
Bear O | |
hackers O | |
are O | |
some O | |
of O | |
the O | |
most O | |
sophisticated O | |
threat O | |
actors O | |
in O | |
the O | |
cyber O | |
espionage O | |
world O | |
, O | |
with O | |
top O | |
skills O | |
to O | |
infiltrate O | |
and O | |
stay O | |
undetected O | |
on O | |
a O | |
company O | |
's O | |
infrastructure O | |
for O | |
long O | |
periods O | |
. O | |
O | |
During O | |
the O | |
StellarParticle O | |
attacks O | |
, O | |
they O | |
demonstrated O | |
expert O | |
knowledge O | |
in O | |
Azure O | |
, O | |
Office O | |
365 O | |
, O | |
and O | |
Active O | |
Directory O | |
management O | |
. O |