CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network

admin by admin
November 9, 2022
in Information Security


The Russia-linked APT29 nation-state actor has been found leveraging a “lesser-known” Windows feature called Credential Roaming as part of its attack against an unnamed European diplomatic entity.

“The diplomatic-centric targeting is consistent with Russian strategic priorities as well as historic APT29 targeting,” Mandiant researcher Thibault Van Geluwe de Berlaere said in a technical write-up.

APT29, a Russian espionage group also called Cozy Bear, Iron Hemlock, and The Dukes, is known for its intrusions aimed at collecting intelligence that align with the country’s strategic objectives. It’s believed to be sponsored by the Foreign Intelligence Service (SVR).

Some of the adversarial collective’s cyber activities are tracked publicly under the moniker Nobelium, a threat cluster responsible for the widespread supply chain compromise through SolarWinds software in December 2020.

The Google-owned threat intelligence and incident response firm said it identified the use of Credential Roaming during the time APT29 was present inside the victim network in early 2022, at which point “numerous LDAP queries with atypical properties” were performed against the Active Directory system.

Hacking European Diplomatic

Introduced in Windows Server 2003 Service Pack 1 (SP1), Credential Roaming is a mechanism that allows users to access their credentials (i.e., private keys and certificates) in a secure manner across different workstations in a Windows domain.

Investigating its inner workings further, Mandiant highlighted the discovery of an arbitrary file write vulnerability that could be weaponized by a threat actor to achieve remote code execution in the context of the logged-in victim.

CyberSecurity

The shortcoming, tracked as CVE-2022-30170, was addressed by Microsoft as part of Patch Tuesday updates shipped on September 13, 2022, with the company emphasizing that exploitation requires a user to log in to Windows.

“An attacker who successfully exploited the vulnerability could gain remote interactive logon rights to a machine where the victim’s account would not normally hold such privilege,” it noted.

Mandiant said the research “offers insight into why APT29 is actively querying the related LDAP attributes in Active Directory,” urging organizations to apply the September 2022 patches to secure against the flaw.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

AWS Security Profile: Param Sharma, Principal Software Engineer

Next Post

Initiativesofambidexterity ~ Future of CIO

Related Posts

Information Security

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

by admin
September 26, 2023
Information Security

What is Digital Identity? | Avast

by admin
September 26, 2023
Information Security

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

by admin
September 25, 2023
Information Security

New Advanced Backdoor with Distinctive Malware Tactics

by admin
September 24, 2023
Information Security

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

by admin
September 23, 2023
Next Post

Initiativesofambidexterity ~ Future of CIO

Recommended

InnovationBreakthrough Book Introduction Chapter 1 Breakthrough Innovation Types ~ Future of CIO

September 26, 2023

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

September 26, 2023

What is Digital Identity? | Avast

September 26, 2023

5 Essential Competency Areas for Success

September 26, 2023

Innovation Breakthrough Chapters Review ~ Future of CIO

September 25, 2023

New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

September 25, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.