Microsoft Warns of North Korean Hacking Groups Exploiting TeamCity Vulnerability

by | Oct 19, 2023 | News

Premium Content

Patreon
Subscribe to Patreon to watch this episode.
Reading Time: 3 Minutes

Microsoft’s Threat Intelligence Team has detected concerning activity involving North Korean hacking groups exploiting a critical security flaw in TeamCity servers. This vulnerability, identified as CVE-2023-42793, allows unauthenticated attackers to remotely execute code.

TeamCity serves as a continuous integration and deployment server, integral to software development infrastructure. The CVE-2023-42793 vulnerability, rated 9.8/10 in severity, was promptly addressed by TeamCity. However, it appears that malicious actors have been quick to exploit this weakness, thereby breaching corporate networks.

The specific intent behind these attacks remains undisclosed, but Microsoft has expressed concerns about the potential for software supply chain attacks. In past operations, North Korean threat actors, including Diamond Sleet and ZINC, have successfully conducted software supply chain attacks by infiltrating build environments.

See Also: So you want to be a hacker?
Offensive Security, Bug Bounty Courses

The attack vectors in these operations involve the deployment of backdoors and the establishment of persistence on the compromised network. Lazarus, for instance, has been witnessed deploying the ForestTiger malware, which serves as a backdoor for executing commands on the compromised server.

A Lazarus attack chain was seen after exploiting the TeamCity flawA Lazarus attack chain was seen after exploiting the TeamCity flaw
Source: Microsoft

Another attack chain involves DLL search order hijacking attacks, leading to the deployment of a remote access Trojan (RAT) via a malware loader called FeedLoad.

Andariel, a subgroup of Lazarus, adopts a more hands-on approach. They create an ‘krtbgt’ admin account on the compromised server and run commands to collect system information. Ultimately, a payload is deployed, installing the HazyLoad proxy tool, ensuring a persistent connection between the compromised server and Andariel’s infrastructure.

Andariel attack chain seen in breachesAndariel attack chain seen in breaches
Source: Microsoft

The common thread across these attack chains is the exfiltration of credentials from LSASS, which is likely used to propagate laterally within the compromised network. Microsoft shared more details of the attack chain along with indicators of compromise in this article.

Both Lazarus and Andariel are state-sponsored North Korean hacking groups. While their activities benefit the North Korean government, their objectives can vary.

Lazarus has been involved in espionage, data theft, and financial gain activities, whereas Andariel primarily targets defense and IT service entities, engaging in cyber espionage, data theft, destructive attacks, and even ransomware campaigns.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This