On March 21, 2023, Mandiant researchers reported their latest technical details detailing a campaign exploiting critical vulnerabilities in F5 BIG-IP and ScreenConnect, which they attribute to the Chinese state-sponsored actor known as UNC5174.
Community Impact Assessment
Due to the widespread use of F5 BIG-IP and ScreenConnect across global regions and industries, the RH-ISAC intelligence team assesses with moderate confidence that this campaign may pose a moderate threat to organizations that have not patched the critical flaws leveraged.
Additionally, given the historical targeting and methods leveraged, the RH-ISAC intelligence team assesses with moderate confidence that UNC5174 may pose a moderate threat to organizations in critical infrastructure sectors.
Members are advised to review the indicators of compromise (IOCs,) mitigations, detection rules, and MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs) provided by Mandiant, included below.
Context and Technical Details
Mandiant reported that campaigns observed between October 2023 and February 2024 leveraged, respectively:
ConnectWise ScreenConnect Vulnerability CVE-2024-1709, a 10 CRITICAL severity vulnerability described thus: “ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.”
F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability CVE-2023-46747, a 9.8 CRITICAL severity vulnerability, described as thus: “Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.”
According to Mandiant, the “mix of custom tooling and the SUPERSHELL framework […] is assessed with moderate confidence to be unique to a People’s Republic of China (PRC) threat actor, UNC5174 […] (believed to use the persona “Uteus”) is a former member of Chinese hacktivist collectives that has since shown indications of acting as a contractor for China’s Ministry of State Security (MSS) focused on executing access operations.”
“UNC5174 has been linked to widespread aggressive targeting and intrusions of Southeast Asian and U.S. research and education institutions, Hong Kong businesses, charities and non-governmental organizations (NGOs), and U.S. and UK government organizations during October and November 2023, as well as in February 2024.”
Mitigations
Mandiant provided the following remediation recommendations:
- Restrict access to the F5 TMUI from the internet.
- Immediately apply the F5 mitigation script published in K000137353 to any vulnerable F5 appliances.
- Investigate vulnerable F5 appliances for evidence of compromise.
In the event of an F5 compromise:
- Review appliance configurations for unauthorized modifications.
- Review file system and operating system (OS) artifacts for evidence of privileged account creation and remove any unauthorized accounts.
- Consider revoking and re-issuing sensitive cryptographic material such as certificates and private keys that may have been accessible to a threat actor.
For impacted ScreenConnect instances, Mandiant recommends that organizations with an on-premises controller read the latest ScreenConnect remediation and hardening guide.
Detections
Mandiant provided the following detections:
rule M_Backdoor_GOREVERSE_2
{
meta:
author = “Mandiant”
description = “This rule is designed to detect events related to goreverse. GOREVERSE is a publicly available reverse shell”
md5 = “5c175ea3664279d6c0c2609844de6949”
platforms = “Windows,Linux,MacOS”
malware_family = “GOREVERSE”
strings:
$cc_main_fork_amd64 = { 41 81 39 74 72 75 65 75 ?? 48 8B [5] 48 8B [5] 48 8B [5] 4C 8B [5] 48 8B [5] 48 8B [5-10] E8 [4] 48 8B }
$cc_print_help_amd64 = { 48 8D 15 [4] 48 89 94 24 [4-16] 48 8B 1D [4] 48 8D 05 [4-24] BF 03 00 00 00 48 89 FE [0-12] E8 }
$cc_rssh = “rssh” fullword
$cc_validate_dest_len = { 48 83 3D [4] 00 [1-24] 49 83 FC 01 [1-24] 49 C1 E4 05 [1-64] 83 3D [4] 00 }
$str1 = “–[foreground|fingerprint|proxy|process_name] -d|–destination <server_address>”
$str2 = “-d or –destination Server connect back address (can be baked in)”
$str3 = “–foreground Causes the client to run without forking to background”
$str4 = “–fingerprint Server public key SHA256 hex fingerprint for auth”
$str5 = “–proxy Location of HTTP connect proxy to use”
$str6 = “–process_name Process name shown in tasklist/process list”
condition:
( ((uint32(0) == 0xcafebabe) or (uint32(0) == 0xfeedface) or (uint32(0) == 0xfeedfacf) or (uint32(0) == 0xbebafeca) or (uint32(0) == 0xcefaedfe) or (uint32(0) == 0xcffaedfe)) or (uint16(0) == 0x5a4d and uint32(uint32(0x3C)) == 0x00004550) or (uint32(0) == 0x464c457f)) and (all of ($str*) or all of ($cc_*))
}
rule M_APT_Downloader_SNOWLIGHT_1
{
meta:
author = “Mandiant”
description = “This rule is designed to detect the SNOWLIGHT code family”
md5 = “0951109dd1be0d84a33d52c135ba9c97”
platforms = “Linux”
malware_family = “SNOWLIGHT”
strings:
$xor99 = { 80 31 99 48 FF C1 89 CE 29 EE 39 C6 7C F2 48 63 D2 48 89 EE 44 89 E7 }
$memfdcreate = { BA 01 00 00 00 BE 3B 0B 40 00 BF 3F 01 00 00 E8 8C FE FF FF }
condition:
uint32(0) == 0x464c457f and all of them
}
IOCs
Mandiant provided the following IOCs:
Indicator | Type | Notes |
hxxp://172.245.68[.]110:8888 | URL | SUPERSHELL C2 |
172.245.68[.]110 | IP Address | Colocrossing |
61.239.68[.]73 | IP Address | Hong Kong Broadband Network Ltd. |
118.140.151[.]242 | IP Address | HGC Global Communications Limited |
c867881c56698f938b4e8edafe76a09b | MD5 | SNOWLIGHT |
df4603548b10211f0aa77d0e9a172438 | MD5 | SNOWLIGHT |
0951109dd1be0d84a33d52c135ba9c97 | MD5 | SNOWLIGHT |
9c3bf506dd19c08c0ed3af9c1708a770 | MD5 | N/A |
0ba435460fb7622344eec28063274b8a | MD5 | SNOWLIGHT |
a78bf3d16349eba86719539ee8ef562d | MD5 | SNOWLIGHT |
TTPs
Mandiant provided the following TTPs:
Technique | Number | Description |
Initial Access | T1190 | Exploit Public-Facing Application |
Defense Evasion | T1027 | Obfuscated Files or Information |
| T1070.004 | File Deletion |
| T1140 | Deobfuscate/Decode Files or Information |
| T1222.002 | Linux and Mac File and Directory Permissions Modification |
| T1601.001 | Patch System Image |
Discovery | T1016 | System Network Configuration Discovery |
| T1049 | System Network Connections Discovery |
| T1082 | System Information Discovery |
| T1083 | File and Directory Discovery |
Command and Control | T1095 | Non-Application Layer Protocol |
| T1105 | Ingress Tool Transfer |
| T1572 | Protocol Tunneling |
| T1573.002 | Asymmetric Cryptography |
Execution | T1059 | Command and Scripting Interpreter |
| T1059.004 | Unix Shell |
Persistence | T1136.001 | Local Account |
Impact | T1531 | Account Access Removal |
Credential Access | T1003.008 | /etc/passwd and /etc/shadow |
Resource Development | T1608.003 | Install Digital Certificate |