Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Nation-State

Chinese State Hackers Main Suspect in Recent Ivanti CSA Zero-Day Attacks

Fortinet believes state-sponsored threat actors are behind the recent attacks involving exploitation of Ivanti CSA zero-days.

Ivanti vulnerability exploited

Fortinet believes a state-sponsored threat actor is behind the recent attacks involving exploitation of several zero-day vulnerabilities impacting Ivanti’s Cloud Services Application (CSA) product.

Over the past month, Ivanti has informed customers about several CSA zero-days that have been chained to compromise the systems of a “limited number” of customers. 

The main flaw is CVE-2024-8190, which allows remote code execution. However, exploitation of this vulnerability requires elevated privileges, and attackers have been chaining it with other CSA bugs such as CVE-2024-8963, CVE-2024-9379 and CVE-2024-9380 to achieve the authentication requirement.

Fortinet began investigating an attack detected in a customer environment when the existence of only CVE-2024-8190 was publicly known. 

According to the cybersecurity firm’s analysis, the attackers compromised systems using the CSA zero-days, and then conducted lateral movement, deployed web shells, collected information, conducted scanning and brute-force attacks, and abused the hacked Ivanti appliance for proxying traffic.

The hackers were also observed attempting to deploy a rootkit on the CSA appliance, likely in an effort to maintain persistence even if the device was reset to factory settings. 

Advertisement. Scroll to continue reading.

Another noteworthy aspect is that the threat actor patched the CSA vulnerabilities it exploited, likely in an effort to prevent other hackers from exploiting them and potentially interfering in their operation.  

Fortinet mentioned that a nation-state adversary is likely behind the attack, but it has not identified the threat group. However, a researcher noted that one of the IPs released by the cybersecurity firm as an indicator of compromise (IoC) was previously attributed to UNC4841, a China-linked threat group that in late 2023 was observed exploiting a Barracuda product zero-day

Indeed, Chinese nation-state hackers are known for exploiting Ivanti product zero-days in their operations. It’s also worth noting that Fortinet’s new report mentions that some of the observed activity is similar to the previous Ivanti attacks linked to China. 

Related: China’s Volt Typhoon Hackers Caught Exploiting Zero-Day in Servers Used by ISPs, MSPs

Related: Cisco Patches NX-OS Zero-Day Exploited by Chinese Cyberspies

Related: Organizations Warned of Exploited Fortinet FortiOS Vulnerability

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.