The attack vector begins with MuddyWater threat actors gaining initial access to systems by exploiting security vulnerabilities in SysAid servers. Based on observations from past campaigns by these threat actors and vulnerabilities found in target environments, the Microsoft security team has observed that the exploits are related to Log4j 2. In other attack campaigns observed in 2022, MuddyWater threat actors took advantage of Log4Shell vulnerabilities detected on VMware servers to gain initial access to systems. However, this campaign targeted SysAid servers, which are attractive to threat actors due to their widespread use in the targeted country and provide IT management tools for users.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”15077″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]After gaining full access to target systems, threat actors capture critical and sensitive data from systems through Windows Management Instrumentation (WMI) and hacking tools. In addition, it has been observed that threat actors benefit from WebShell malware for activities such as persistence in the targeted system, obtaining identity information, and lateral movement. Finally, a remote management tool called eHours is used for command and control (C&C) communication, which allows threat actors to monitor and manage targeted systems remotely.
Since it was announced, the Log4Shell vulnerability has been used in critical attacks targeting institutions/organizations. In this context, it is recommended to consider the following security practices to avoid the target of critical attacks that can be carried out using the said vulnerability.
- It should be ensured that the software, applications, and programs used are used in the current versions where the vulnerability has been fixed.
- Comprehensive security solutions must be deployed.
- Critical systems or data should be backed up regularly.
- IOC findings related to the attack should be blocked from the security solutions in use.