JAUKUS983 | 1 points | Mar 09 2022 00:54:55

中国政府黑客侵入美国至少六个州政府的计算机网络

美国网络安全公司麦迪安(Mandiant)周二(3月8日)发布的一份报告说,为中国政府工作的黑客去年侵入了美国至少六个州政府的计算机网络。
黑客行动从去年5月开始,一直持续到上个月。但众所周知,据信对这些攻击负责的中国黑客团伙“APT41”发起黑客行动既出于传统的间谍活动的考虑,也是为了经济利益。

总部位于弗吉尼亚州莱斯顿的麦迪安公司的首席威胁分析师杰夫·阿克曼(Geoff Ackerman)表示:“尽管正在持续的乌克兰危机理所当然地引起了全世界的关注,而且俄罗斯的网络威胁的可能性也是真实存在的,但我们必须记住,世界各地的其他主要威胁行为者仍在一如既往地开展行动。”

他在声明中补充说:“我们不能让其他的网络活动半途消失,尤其是考虑到我们观察到,最活跃的威胁行为者之一的APT41的这一行动一直持续到今天。”

尽管拜登政府已经宣布了更多措施,以保护联邦政府系统免受黑客攻击,但各州的机构仍然是黑客的攻击目标。在大规模的太阳风(SolarWinds)间谍活动中,俄罗斯情报人员利用供应链漏洞侵入了至少九个美国机构和数十家私营企业的网络,有鉴于此,这是一个特别紧迫的担忧。

报告说,在这个案例中,黑客利用了18个州用于动物健康管理的现成商业应用程序中一个以前未知的漏洞。此外,他们还利用了去年12月发现的一个名为Log4j的软件缺陷。美国官员说,数亿台设备可能存在这个缺陷。在向公众披露该漏洞后的数小时内,黑客就开始利用该漏洞,再次侵入了两个州政府网络。
麦迪安的高级威胁分析师鲁弗斯·布朗(Rufus Brown)在一份声明中说,黑客“坚持侵入政府网络,例如对之前的受害者再次进行侵入,并在同一个州内针对多个机构进行攻击,这表明,无论他们在寻找什么,这个东西是重要的”。“我们到处都能发现他们,这令人不安,”他说。

麦迪安的这份报告把黑客攻击与APT41联系在一起。美国司法部2020年的一份起诉书中提到了APT41。这份起诉书指控中国黑客攻击了美国和海外的100多家公司和机构,包括社交媒体和视频游戏公司、大学和电信提供商。

“尽管采取了所有新措施,但有些事情没有改变:APT41仍未被美国司法部2020年9月的起诉所吓倒,”这份报告说。

中国政府过去曾否认美国的黑客指控。

麦迪安和谷歌周二宣布,谷歌以54亿美元的价格收购麦迪安。

[-] OddBird_S | 1 points | Mar 09 2022 01:04:47

log4j太嗯了

[-] DistinctContribution | 1 points | Mar 09 2022 01:39:21

这下知道为何阿里上报个bug都被警告了

[-] chinobuta | 1 points | Mar 09 2022 01:06:40

這下牢不可破滴聯盟咯

[-] JAUKUS983 | 1 points | Mar 09 2022 01:12:02

我贴一下原文,计老嗨看看

Chinese APT leveraged zero days — including Log4j — to compromise US state governments

A hacking group tied to the Chinese government has exploited zero-day vulnerabilities in internet-facing web applications — including Log4j — to compromise the networks of at least six U.S. state governments over the past year, according to threat intelligence firm Mandiant.

The earliest signs of the campaign were detected in May 2021 and have continued through at least February 2022. Attackers leveraged a number of zero-day vulnerabilities, such as Log4j and a previously undiscovered flaw in USAHerds, a commercial-off-the-shelf application used for tracing animal diseases.

The hacking group, APT41, is believed to be associated with the Chinese Ministry of State Security and is known for targeting industries and intellectual property for technologies that are aligned with China’s 13th five-year economic plan, including the telecommunications, health care, and high tech sectors. They have also been observed targeting higher education, media firms and the video game industries, and they are relatively unique as one of the few state-connected APTs that appear to hack both for espionage and financially motivated reasons.

Rufus Brown, a senior threat analyst at Mandiant, said the use of Log4j is notable because it demonstrates how quickly some state-sponsored groups were able to move to exploit the vulnerability. Just hours after Log4j was disclosed in December 2021, APT41 began incorporating it into their ongoing campaign to compromise at least two state governments. While there is evidence that APT41 also used Log4j against private insurance and telecommunications firms, the targeting of U.S. state governments in this campaign was specific and deliberate.

“They are going after any external web application server that they can exploit... anything they can get to gain a foothold in state government environments,” said Brown.

In the weeks following Log4j's disclosure, agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and private threat intelligence firms initially reported low levels of exploitation by criminal actors for things like cryptocurrency mining, but Brown said there is increasingly evidence that state-backed hacking groups were able to quickly exploit the bug, as well.

Meanwhile, the use of another zero-day flaw in USAHerds (CVE-2021-44207) indicates that the victim set could go beyond the initial six states identified by Mandiant. The application uses the same static validation and decryption keys across all applications by default, and the vulnerability exploits this fact to compromise any sever connected to the internet running the application. A GitHub page compiled by Mandiant for the bug states that the bug, now patched, affects all builds for USAHerds prior to November 2021.

While it’s not known how APT41 obtained the original machine key values, it would theoretically allow them to exploit the same weakness in other states that use USAHerds. At least 18 states are known to use the software, and Brown said it is likely that other states have been compromised by the flaw and don’t know it.

They’re also persistent in two instances Mandiant said it began investigating a compromise at one state agency only to find the group inside the network of another. As recently as Feb. 22, attackers were observed re-compromising the IT systems of two states they had previously broken into, often using different initial access vectors and tactics, techniques and procedures.

“The most important takeaway I have is the creativity and operational capability that APT41 has,” Brown said. “They were conducting operations against U.S. state governments and then switched to Log4j when [proofs of concept code] came out in an advisory. They took advantage of what they had.”

APT41 has a long history of targeting U.S. and Western technology secrets. Between 2019 and 2020, the Department of Justice indicted five hackers from the group for targeting more than 100 companies in the United States and other countries while seizing hundreds of accounts, servers, domain names and command and control pages used by the group to carry out operations. The victims included software development companies, computer hardware manufacturers, telecommunications providers, social media companies, video game companies, non-profit organizations, universities, think tanks and foreign governments.

In some cases the attackers exfiltrated unspecified personally identifiable information (PII), something that would be consistent with the espionage-minded background and goals of previous operations by APT41. However, Brown said that for all six of the state governments where APT41’s presence was detected, the intruders were kicked out before they could complete their full attack chain. As a result, Mandiant is shying away from making a formal assessment of the group’s goals at this time.

“We haven’t observed any sign that this campaign is stopping. Whatever they’re going after must be very important,” Brown noted.

[-] JAUKUS983 | 1 points | Mar 09 2022 01:15:49

据威胁情报公司Mandiant称,一个与中国政府有联系的黑客组织在过去一年中利用面向互联网的网络应用程序(包括Log4j)中的零日漏洞来破坏至少六个美国州政府的网络。

该活动的最早迹象是在2021年5月发现的,并且至少持续到2022年2月。攻击者利用了许多零日漏洞,例如Log4j和USAHerds中以前未发现的漏洞,USAHerds是一种用于追踪动物疾病的商业现成应用程序。

黑客组织APT41据信与中国国家安全部有关,并以针对与中国13国技术相一致的行业和知识产权而闻名。千五年经济计划,包括电信、医疗保健和高科技部门。据观察,它们还针对高等教育,媒体公司和视频游戏行业,并且它们作为少数几个似乎出于间谍活动和经济动机而进行黑客攻击的国家相关APT之一,它们相对独特。

Mandiant的高级威胁分析师Rufus Brown表示,Log4j的使用值得注意,因为它证明了一些国家赞助的团体能够多么迅速地利用这个漏洞。在Log4j于2021年12月披露后仅几个小时,APT41就开始将其纳入其正在进行的至少两个州政府妥协的运动中。虽然有证据表明APT41也使用Log4j来对付私人保险和电信公司,但在这场运动中针对美国州政府是具体和故意的。

"他们正在追逐任何可以利用的外部Web应用程序服务器......他们可以在州政府环境中站稳脚跟的任何东西,"布朗说。

在Log4j披露后的几周内,网络安全和基础设施安全局(CISA)和私人威胁情报公司等机构最初报告称,犯罪分子对加密货币挖矿等行为的利用程度较低,但布朗表示,越来越多的证据表明,国家支持的黑客组织也能够快速利用该漏洞。

与此同时,在USAHerds中使用另一个零日漏洞(CVE-2021-44207)表明,受害者集可能超出了Mandiant确定的初始六个状态。默认情况下,该应用程序在所有应用程序中使用相同的静态验证和解密密钥,并且该漏洞利用此事实来破坏连接到运行该应用程序的 Internet 的任何服务器。Mandiant为该错误编译的GitHub页面指出,该错误现已修补,会影响2021年11月之前USAHerds的所有构建。

虽然目前尚不清楚APT41是如何获得原始机器密钥值的,但从理论上讲,它将允许它们在使用USAHerds的其他州利用相同的弱点。已知至少有18个州使用该软件,布朗表示,其他州很可能已经受到该漏洞的影响,并且不知道。

Mandiant表示,它开始在一个州机构调查妥协,只是为了在另一个州机构的网络中找到该团体。就在2月22日,攻击者还被发现重新破坏了他们以前闯入的两个州的IT系统,通常使用不同的初始访问向量和策略,技术和程序。

"我最重要的收获是APT41的创造力和运营能力,"布朗说。"他们正在对美国州政府进行行动,然后在[概念代码证明]在咨询中出现时切换到Log4j。他们利用了他们所拥有的一切。

APT41在瞄准美国和西方技术机密方面有着悠久的历史。在2019年至2020年期间,司法部起诉了该组织的五名黑客,他们针对美国和其他国家/地区的100多家公司,同时扣押了该组织用于执行操作的数百个帐户,服务器,域名以及命令和控制页面。受害者包括软件开发公司,计算机硬件制造商,电信提供商,社交媒体公司,视频游戏公司,非营利组织,大学,智库和外国政府。

在某些情况下,攻击者泄露了未指定的个人身份信息(PII),这与APT41先前行动的间谍背景和目标一致。然而,布朗说,对于检测到APT41存在的所有六个州政府,入侵者在完成整个攻击链之前就被踢了出来。因此,Mandiant目前回避对集团的目标进行正式评估。

"我们没有观察到任何迹象表明这场运动正在停止。无论他们追求什么,都必须非常重要,"布朗指出。