| Russian O | |
| APT29 O | |
| hackers O | |
| ' O | |
| stealthy O | |
| malware O | |
| undetected O | |
| for O | |
| years O | |
| O | |
| By O | |
| Ionut O | |
| Ilascu O | |
| O | |
| January O | |
| 27 O | |
| , O | |
| 2022 O | |
| 09:23 O | |
| AM O | |
| 0 O | |
| O | |
| Cozy O | |
| Bear O | |
| Russian O | |
| hackers O | |
| camouflage O | |
| new O | |
| malware O | |
| as O | |
| legitimate O | |
| files O | |
| O | |
| EXCLUSIVE O | |
| : O | |
| Hackers O | |
| associated O | |
| with O | |
| the O | |
| Russian O | |
| Federation O | |
| Foreign O | |
| Intelligence O | |
| Service O | |
| ( O | |
| SVR O | |
| ) O | |
| continued O | |
| their O | |
| incursions O | |
| on O | |
| networks O | |
| of O | |
| multiple O | |
| organizations O | |
| after O | |
| the O | |
| SolarWinds O | |
| supply O | |
| - O | |
| chain O | |
| compromise O | |
| using O | |
| two O | |
| recently O | |
| discovered O | |
| sophisticated O | |
| threats O | |
| . O | |
| O | |
| The O | |
| malicious O | |
| implants O | |
| are O | |
| a O | |
| variant O | |
| of O | |
| the O | |
| GoldMax O | |
| backdoor O | |
| for O | |
| Linux O | |
| systems O | |
| and O | |
| a O | |
| completely O | |
| new O | |
| malware O | |
| family O | |
| that O | |
| cybersecurity O | |
| company O | |
| CrowdStrike O | |
| now O | |
| tracks O | |
| as O | |
| TrailBlazer O | |
| . O | |
| O | |
| Both O | |
| threats O | |
| have O | |
| been O | |
| used O | |
| in O | |
| StellarParticle O | |
| campaigns O | |
| since O | |
| at O | |
| least O | |
| mid-2019 O | |
| but O | |
| were O | |
| identified O | |
| only O | |
| two O | |
| years O | |
| later O | |
| , O | |
| during O | |
| incident O | |
| response O | |
| investigations O | |
| . O | |
| O | |
| StellarParticle O | |
| attacks O | |
| have O | |
| been O | |
| attributed O | |
| to O | |
| the O | |
| APT29 O | |
| hacking O | |
| group O | |
| has O | |
| been O | |
| running O | |
| cyber O | |
| espionage O | |
| campaigns O | |
| for O | |
| more O | |
| than O | |
| 12 O | |
| years O | |
| and O | |
| is O | |
| also O | |
| known O | |
| as O | |
| CozyBear O | |
| , O | |
| The O | |
| Dukes O | |
| , O | |
| and O | |
| Yttrium O | |
| . O | |
| O | |
| Stealing O | |
| cookies O | |
| for O | |
| MFA O | |
| bypass O | |
| O | |
| In O | |
| a O | |
| report O | |
| shared O | |
| exclusively O | |
| with O | |
| BleepingComputer O | |
| , O | |
| cybersecurity O | |
| company O | |
| CrowdStrike O | |
| today O | |
| describes O | |
| in O | |
| detail O | |
| the O | |
| latest O | |
| tactics O | |
| , O | |
| techniques O | |
| , O | |
| and O | |
| procedures O | |
| ( O | |
| TTPs O | |
| ) O | |
| observed O | |
| in O | |
| cyberattacks O | |
| from O | |
| the O | |
| Cozy O | |
| Bear O | |
| state O | |
| - O | |
| sponsored O | |
| hackers O | |
| . O | |
| O | |
| While O | |
| some O | |
| of O | |
| the O | |
| techniques O | |
| are O | |
| somewhat O | |
| common O | |
| today O | |
| , O | |
| Cozy O | |
| Bear O | |
| has O | |
| been O | |
| using O | |
| them O | |
| long O | |
| before O | |
| they O | |
| became O | |
| popular O | |
| : O | |
| O | |
| credential O | |
| hopping O | |
| O | |
| hijacking O | |
| Office O | |
| 365 O | |
| ( O | |
| O365 O | |
| ) O | |
| Service O | |
| Principal O | |
| and O | |
| Application O | |
| O | |
| bypassing O | |
| multi O | |
| - O | |
| factor O | |
| authentication O | |
| ( O | |
| MFA O | |
| ) O | |
| by O | |
| stealing O | |
| browser O | |
| cookies O | |
| O | |
| stealing O | |
| credentials O | |
| using O | |
| Get O | |
| - O | |
| ADReplAccount O | |
| O | |
| Credential O | |
| hopping O | |
| was O | |
| the O | |
| first O | |
| stage O | |
| of O | |
| the O | |
| attack O | |
| , O | |
| allowing O | |
| the O | |
| threat O | |
| actor O | |
| to O | |
| log O | |
| into O | |
| Office O | |
| 365 O | |
| from O | |
| an O | |
| internal O | |
| server O | |
| that O | |
| the O | |
| hackers O | |
| reached O | |
| through O | |
| a O | |
| compromised O | |
| public O | |
| - O | |
| facing O | |
| system O | |
| . O | |
| O | |
| source O | |
| : O | |
| CrowdStrike O | |
| O | |
| CrowdStrike O | |
| says O | |
| that O | |
| this O | |
| technique O | |
| is O | |
| hard O | |
| to O | |
| spot O | |
| in O | |
| environments O | |
| with O | |
| little O | |
| visibility O | |
| into O | |
| identity O | |
| usage O | |
| since O | |
| hackers O | |
| could O | |
| use O | |
| more O | |
| than O | |
| one O | |
| domain O | |
| administrator O | |
| account O | |
| . O | |
| O | |
| Bypassing O | |
| MFA O | |
| to O | |
| access O | |
| cloud O | |
| resources O | |
| by O | |
| stealing O | |
| browser O | |
| cookies O | |
| has O | |
| been O | |
| used O | |
| since O | |
| before O | |
| 2020 O | |
| . O | |
| CrowdStrike O | |
| says O | |
| that O | |
| APT29 O | |
| kept O | |
| a O | |
| low O | |
| profile O | |
| after O | |
| decrypting O | |
| the O | |
| authentication O | |
| cookies O | |
| , O | |
| likely O | |
| offline O | |
| , O | |
| by O | |
| using O | |
| the O | |
| Cookie O | |
| Editor O | |
| extension O | |
| for O | |
| Chrome O | |
| to O | |
| replay O | |
| them O | |
| ; O | |
| they O | |
| deleted O | |
| the O | |
| extension O | |
| afterward O | |
| . O | |
| O | |
| “ O | |
| This O | |
| extension O | |
| permitted O | |
| bypassing O | |
| MFA O | |
| requirements O | |
| , O | |
| as O | |
| the O | |
| cookies O | |
| , O | |
| replayed O | |
| through O | |
| the O | |
| Cookie O | |
| Editor O | |
| extension O | |
| , O | |
| allowed O | |
| the O | |
| threat O | |
| actor O | |
| to O | |
| hijack O | |
| the O | |
| already O | |
| MFA O | |
| - O | |
| approved O | |
| session O | |
| of O | |
| a O | |
| targeted O | |
| user O | |
| ” O | |
| - O | |
| CrowdStrike O | |
| O | |
| This O | |
| allowed O | |
| them O | |
| to O | |
| move O | |
| laterally O | |
| on O | |
| the O | |
| network O | |
| and O | |
| reach O | |
| the O | |
| next O | |
| stage O | |
| of O | |
| the O | |
| attack O | |
| , O | |
| connecting O | |
| to O | |
| the O | |
| victim O | |
| ’s O | |
| O365 O | |
| tenant O | |
| for O | |
| the O | |
| next O | |
| stage O | |
| of O | |
| the O | |
| attack O | |
| . O | |
| O | |
| CrowdStrike O | |
| ’s O | |
| report O | |
| describes O | |
| the O | |
| steps O | |
| that O | |
| APT29 O | |
| took O | |
| to O | |
| achieve O | |
| persistence O | |
| in O | |
| a O | |
| position O | |
| that O | |
| allowed O | |
| them O | |
| to O | |
| read O | |
| any O | |
| email O | |
| and O | |
| SharePoint O | |
| or O | |
| OneDrive O | |
| files O | |
| of O | |
| the O | |
| compromised O | |
| organization O | |
| . O | |
| O | |
| GoldMax O | |
| for O | |
| Linux O | |
| and O | |
| TrailBlazer O | |
| O | |
| During O | |
| their O | |
| incident O | |
| response O | |
| work O | |
| on O | |
| APT29 O | |
| StellarParticle O | |
| attacks O | |
| , O | |
| CrowdStrike O | |
| ’s O | |
| researchers O | |
| used O | |
| the O | |
| User O | |
| Access O | |
| Logging O | |
| ( O | |
| UAL O | |
| ) O | |
| database O | |
| to O | |
| identify O | |
| earlier O | |
| malicious O | |
| account O | |
| usage O | |
| , O | |
| which O | |
| led O | |
| to O | |
| finding O | |
| the O | |
| GoldMax O | |
| for O | |
| Linux O | |
| and O | |
| TrailBlazer O | |
| malware O | |
| . O | |
| O | |
| CrowdStrike O | |
| says O | |
| that O | |
| TrailBlazer O | |
| is O | |
| a O | |
| completely O | |
| new O | |
| malware O | |
| family O | |
| , O | |
| while O | |
| GoldMax O | |
| for O | |
| Linux O | |
| backdoor O | |
| “ O | |
| is O | |
| almost O | |
| identical O | |
| in O | |
| functionality O | |
| and O | |
| implementation O | |
| to O | |
| the O | |
| previously O | |
| identified O | |
| May O | |
| 2020 O | |
| Windows O | |
| variant O | |
| . O | |
| ” O | |
| O | |
| The O | |
| researchers O | |
| believe O | |
| that O | |
| the O | |
| little O | |
| differences O | |
| are O | |
| between O | |
| the O | |
| two O | |
| GoldMax O | |
| versions O | |
| are O | |
| due O | |
| to O | |
| the O | |
| continuous O | |
| improvements O | |
| from O | |
| the O | |
| developer O | |
| for O | |
| long O | |
| - O | |
| term O | |
| detection O | |
| evasion O | |
| . O | |
| O | |
| GoldMax O | |
| was O | |
| likely O | |
| used O | |
| for O | |
| persistence O | |
| ( O | |
| a O | |
| crontab O | |
| with O | |
| a O | |
| “ O | |
| @reboot O | |
| ” O | |
| line O | |
| for O | |
| a O | |
| non O | |
| - O | |
| root O | |
| user O | |
| ) O | |
| over O | |
| long O | |
| periods O | |
| in O | |
| StellarParticle O | |
| campaigns O | |
| . O | |
| The O | |
| backdoor O | |
| stayed O | |
| undetected O | |
| by O | |
| posing O | |
| as O | |
| a O | |
| legitimate O | |
| file O | |
| in O | |
| a O | |
| hidden O | |
| directory O | |
| . O | |
| O | |
| The O | |
| TrailBlazer O | |
| implant O | |
| also O | |
| hid O | |
| under O | |
| the O | |
| name O | |
| of O | |
| a O | |
| legitimate O | |
| file O | |
| and O | |
| it O | |
| was O | |
| configured O | |
| for O | |
| persistence O | |
| using O | |
| the O | |
| Windows O | |
| Management O | |
| Instrumentation O | |
| ( O | |
| WMI O | |
| ) O | |
| Event O | |
| Subscriptions O | |
| , O | |
| a O | |
| relatively O | |
| new O | |
| technique O | |
| in O | |
| 2019 O | |
| , O | |
| the O | |
| earliest O | |
| known O | |
| date O | |
| for O | |
| its O | |
| deployment O | |
| on O | |
| victim O | |
| systems O | |
| . O | |
| O | |
| TrailBlazer O | |
| managed O | |
| to O | |
| keep O | |
| communication O | |
| with O | |
| the O | |
| command O | |
| and O | |
| control O | |
| ( O | |
| C2 O | |
| ) O | |
| server O | |
| covert O | |
| by O | |
| masking O | |
| it O | |
| as O | |
| legitimate O | |
| Google O | |
| Notifications O | |
| HTTP O | |
| requests O | |
| . O | |
| O | |
| CrowdStrike O | |
| notes O | |
| that O | |
| the O | |
| implant O | |
| has O | |
| modular O | |
| functionality O | |
| and O | |
| “ O | |
| a O | |
| very O | |
| low O | |
| prevalence O | |
| ” O | |
| and O | |
| that O | |
| it O | |
| shares O | |
| similarities O | |
| with O | |
| other O | |
| malware O | |
| families O | |
| used O | |
| by O | |
| the O | |
| same O | |
| threat O | |
| actor O | |
| , O | |
| such O | |
| as O | |
| GoldMax O | |
| and O | |
| Sunburst O | |
| ( O | |
| both O | |
| used O | |
| in O | |
| the O | |
| SolarWinds O | |
| supply O | |
| - O | |
| chain O | |
| attack O | |
| ) O | |
| . O | |
| O | |
| Tim O | |
| Parisi O | |
| , O | |
| Director O | |
| of O | |
| Professional O | |
| Services O | |
| at O | |
| CrowdStrike O | |
| , O | |
| told O | |
| BleepingComputer O | |
| that O | |
| the O | |
| covert O | |
| activity O | |
| of O | |
| the O | |
| two O | |
| malware O | |
| pieces O | |
| delayed O | |
| the O | |
| discovery O | |
| of O | |
| the O | |
| two O | |
| malware O | |
| pieces O | |
| , O | |
| as O | |
| the O | |
| researchers O | |
| found O | |
| them O | |
| in O | |
| mid-2021 O | |
| . O | |
| O | |
| Recon O | |
| and O | |
| move O | |
| to O | |
| Office O | |
| 365 O | |
| O | |
| After O | |
| gaining O | |
| access O | |
| to O | |
| a O | |
| target O | |
| organization O | |
| ’s O | |
| infrastructure O | |
| and O | |
| established O | |
| persistence O | |
| , O | |
| APT29 O | |
| hackers O | |
| took O | |
| every O | |
| opportunity O | |
| to O | |
| collect O | |
| intelligence O | |
| that O | |
| would O | |
| allow O | |
| them O | |
| to O | |
| further O | |
| the O | |
| attack O | |
| . O | |
| O | |
| One O | |
| constant O | |
| tactic O | |
| was O | |
| to O | |
| draw O | |
| information O | |
| from O | |
| the O | |
| victim O | |
| ’s O | |
| internal O | |
| knowledge O | |
| repositories O | |
| , O | |
| the O | |
| so O | |
| - O | |
| called O | |
| wikis O | |
| . O | |
| These O | |
| documents O | |
| can O | |
| hold O | |
| sensitive O | |
| details O | |
| specific O | |
| to O | |
| various O | |
| services O | |
| and O | |
| products O | |
| in O | |
| the O | |
| organization O | |
| . O | |
| O | |
| “ O | |
| This O | |
| information O | |
| included O | |
| items O | |
| such O | |
| as O | |
| product O | |
| / O | |
| service O | |
| architecture O | |
| and O | |
| design O | |
| documents O | |
| , O | |
| vulnerabilities O | |
| and O | |
| step O | |
| - O | |
| by O | |
| - O | |
| step O | |
| instructions O | |
| to O | |
| perform O | |
| various O | |
| tasks O | |
| . O | |
| Additionally O | |
| , O | |
| the O | |
| threat O | |
| actor O | |
| viewed O | |
| pages O | |
| related O | |
| to O | |
| internal O | |
| business O | |
| operations O | |
| such O | |
| as O | |
| development O | |
| schedules O | |
| and O | |
| points O | |
| of O | |
| contact O | |
| . O | |
| In O | |
| some O | |
| instances O | |
| these O | |
| points O | |
| of O | |
| contact O | |
| were O | |
| subsequently O | |
| targeted O | |
| for O | |
| further O | |
| data O | |
| collection O | |
| ” O | |
| - O | |
| CrowdStrike O | |
| O | |
| Parisi O | |
| told O | |
| us O | |
| that O | |
| accessing O | |
| company O | |
| wikis O | |
| was O | |
| a O | |
| common O | |
| APT29 O | |
| reconnaissance O | |
| activity O | |
| in O | |
| the O | |
| investigated O | |
| StellarParticle O | |
| attacks O | |
| . O | |
| O | |
| CrowdStrike O | |
| ’s O | |
| deep O | |
| dive O | |
| into O | |
| APT29 O | |
| ’s O | |
| StellarParticle O | |
| campaigns O | |
| offers O | |
| details O | |
| on O | |
| how O | |
| the O | |
| threat O | |
| actor O | |
| connected O | |
| to O | |
| the O | |
| victim O | |
| ’s O | |
| O365 O | |
| tenant O | |
| through O | |
| the O | |
| Windows O | |
| Azure O | |
| Active O | |
| Directory O | |
| PowerShell O | |
| Module O | |
| , O | |
| and O | |
| performed O | |
| enumeration O | |
| queries O | |
| for O | |
| roles O | |
| , O | |
| members O | |
| , O | |
| users O | |
| , O | |
| domains O | |
| , O | |
| accounts O | |
| , O | |
| or O | |
| a O | |
| service O | |
| principal O | |
| 's O | |
| credentials O | |
| . O | |
| O | |
| When O | |
| analyzing O | |
| the O | |
| log O | |
| entries O | |
| , O | |
| the O | |
| researchers O | |
| noticed O | |
| that O | |
| the O | |
| threat O | |
| actor O | |
| also O | |
| executed O | |
| the O | |
| AddServicePrincipalCredentials O | |
| command O | |
| . O | |
| O | |
| “ O | |
| CrowdStrike O | |
| analyzed O | |
| the O | |
| configuration O | |
| settings O | |
| in O | |
| the O | |
| victim O | |
| ’s O | |
| O365 O | |
| tenant O | |
| and O | |
| discovered O | |
| that O | |
| a O | |
| new O | |
| secret O | |
| had O | |
| been O | |
| added O | |
| to O | |
| a O | |
| built O | |
| - O | |
| in O | |
| Microsoft O | |
| Azure O | |
| AD O | |
| Enterprise O | |
| Application O | |
| , O | |
| Microsoft O | |
| StaffHub O | |
| Service O | |
| Principal O | |
| , O | |
| which O | |
| had O | |
| Application O | |
| level O | |
| permissions O | |
| ” O | |
| - O | |
| CrowdSrike O | |
| O | |
| The O | |
| adversary O | |
| had O | |
| added O | |
| a O | |
| new O | |
| secret O | |
| to O | |
| the O | |
| application O | |
| and O | |
| set O | |
| its O | |
| validity O | |
| for O | |
| more O | |
| than O | |
| 10 O | |
| years O | |
| , O | |
| the O | |
| researchers O | |
| note O | |
| . O | |
| O | |
| The O | |
| permission O | |
| level O | |
| obtained O | |
| this O | |
| way O | |
| let O | |
| hackers O | |
| access O | |
| all O | |
| mail O | |
| and O | |
| SharePoint O | |
| / O | |
| OneDrive O | |
| files O | |
| in O | |
| the O | |
| company O | |
| and O | |
| allowed O | |
| them O | |
| to O | |
| “ O | |
| create O | |
| new O | |
| accounts O | |
| and O | |
| assign O | |
| administrator O | |
| privileges O | |
| to O | |
| any O | |
| account O | |
| in O | |
| the O | |
| organization O | |
| . O | |
| ” O | |
| O | |
| Maintaining O | |
| persistence O | |
| O | |
| Once O | |
| Cozy O | |
| Bear O | |
| / O | |
| APT29 O | |
| established O | |
| persistence O | |
| in O | |
| a O | |
| target O | |
| organization O | |
| they O | |
| would O | |
| maintain O | |
| it O | |
| for O | |
| as O | |
| long O | |
| as O | |
| possible O | |
| , O | |
| sometimes O | |
| helped O | |
| by O | |
| the O | |
| poor O | |
| security O | |
| hygiene O | |
| of O | |
| the O | |
| compromised O | |
| organization O | |
| . O | |
| O | |
| The O | |
| longest O | |
| time O | |
| the O | |
| threat O | |
| actor O | |
| spent O | |
| inside O | |
| an O | |
| organization O | |
| was O | |
| two O | |
| years O | |
| , O | |
| Parisi O | |
| told O | |
| BleepingComputer O | |
| . O | |
| Persisting O | |
| this O | |
| long O | |
| would O | |
| not O | |
| be O | |
| possible O | |
| without O | |
| some O | |
| effort O | |
| from O | |
| the O | |
| hackers O | |
| , O | |
| since O | |
| organizations O | |
| often O | |
| rotate O | |
| credentials O | |
| as O | |
| a O | |
| security O | |
| precaution O | |
| . O | |
| O | |
| To O | |
| prevent O | |
| losing O | |
| access O | |
| , O | |
| Cozy O | |
| Bear O | |
| hackers O | |
| would O | |
| periodically O | |
| refresh O | |
| the O | |
| stolen O | |
| credentials O | |
| by O | |
| stealing O | |
| new O | |
| ones O | |
| , O | |
| oftentimes O | |
| via O | |
| Mimikatz O | |
| . O | |
| O | |
| In O | |
| at O | |
| least O | |
| one O | |
| case O | |
| , O | |
| though O | |
| , O | |
| the O | |
| administrators O | |
| of O | |
| the O | |
| compromised O | |
| company O | |
| reset O | |
| their O | |
| passwords O | |
| to O | |
| the O | |
| same O | |
| ones O | |
| , O | |
| thus O | |
| defeating O | |
| the O | |
| purpose O | |
| of O | |
| credential O | |
| rotation O | |
| . O | |
| O | |
| Cozy O | |
| Bear O | |
| hackers O | |
| are O | |
| some O | |
| of O | |
| the O | |
| most O | |
| sophisticated O | |
| threat O | |
| actors O | |
| in O | |
| the O | |
| cyber O | |
| espionage O | |
| world O | |
| , O | |
| with O | |
| top O | |
| skills O | |
| to O | |
| infiltrate O | |
| and O | |
| stay O | |
| undetected O | |
| on O | |
| a O | |
| company O | |
| 's O | |
| infrastructure O | |
| for O | |
| long O | |
| periods O | |
| . O | |
| O | |
| During O | |
| the O | |
| StellarParticle O | |
| attacks O | |
| , O | |
| they O | |
| demonstrated O | |
| expert O | |
| knowledge O | |
| in O | |
| Azure O | |
| , O | |
| Office O | |
| 365 O | |
| , O | |
| and O | |
| Active O | |
| Directory O | |
| management O | |
| . O |