Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Supply Chain Security

North Korean Hackers Exploiting Recent TeamCity Vulnerability

Multiple North Korean hacking groups have exploited a recent TeamCity vulnerability and Microsoft warns of potential supply chain attacks.

Multiple North Korean threat actors have been observed exploiting a recent vulnerability in JetBrains’ TeamCity continuous integration and continuous deployment (CI/CD) server, Microsoft warns.

Tracked as CVE-2023-42793, the critical-severity flaw allows unauthenticated attackers to execute code remotely on vulnerable on-premises TeamCity instances and gain administrator-level permissions.

JetBrains released patches for the bug on September 21, with the first in-the-wild exploitation attempts reported only one week later.

In a new report, Microsoft notes that at least two North Korean state-sponsored threat actors, named Diamond Sleet and Onyx Sleet, have been exploiting CVE-2023-42793 in attacks. The tech giant points out that the two groups have been known to conduct software supply chain attacks and warns that this activity poses a high risk to impacted organizations.

“Based on the profile of victim organizations affected by these intrusions, Microsoft assesses that the threat actors may be opportunistically compromising vulnerable servers. However, both actors have deployed malware and tools and utilized techniques that may enable persistent access to victim environments,” Microsoft says.

Also known as Zinc and believed to be a sub-group of Lazarus, Diamond Sleet is focused on espionage, data theft, destruction, and financial gain, and is known for targeting defense-related entities, journalists, and IT services organizations.

The group has been observed compromising TeamCity servers to deploy a persistent backdoor named ForestTiger, and using the malware to dump LSASS credentials from memory.

In other attacks, the threat actor was seen leveraging DLL search-order hijacking and legitimate executables to perform nefarious activities, such as the deployment of a remote access trojan (RAT).

Advertisement. Scroll to continue reading.

Onyx Sleet, which is also tracked as Plutonium, Andariel, and DarkSeoul, is known for exploiting N-day vulnerabilities in attacks targeting defense and IT services organizations in the US, South Korea, and India.

In attacks targeting TeamCity servers, the hacking group has been observed creating a new account on the compromised systems, to impersonate the legitimate Windows account for Kerberos Ticket Granting Ticket, and adding it to the administrative group.

Following system fingerprinting, the attackers deployed a proxy tool to establish a persistent connection, signed in via remote desktop protocol (RDP), stopped the TeamCity service, dumped credentials from LSASS memory, and deployed additional tools for credential and data theft.

Organizations are advised to apply patches for CVE-2023-42793 as soon as possible, to investigate their networks for potential compromise, block traffic from the IP addresses in Microsoft’s list of indicators of compromise (IoCs), immediately remediate any identified malicious activity, and investigate potential lateral movement.

Related: North Korean Hackers Steal $53 Million in Cryptocurrency From CoinEx

Related: FBI Blames North Korean Hackers for $41 Million Stake.com Heist

Related: Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Searchlight Cyber has appointed Tim Warner as VP of Global Enterprise Sales.

Morgan M. Adamski has been named the Executive Director of USCYBERCOM.

Passwordless authentication firm Hawcx has appointed Lakshmi Sharma as Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Supply Chain Security

Security researchers with NCC Group have documented 11 vulnerabilities impacting Nuki smart lock products, including issues that could allow attackers to open doors.Nuki offers...

Artificial Intelligence

Exposed data includes backup of employees workstations, secrets, private keys, passwords, and over 30,000 internal Microsoft Teams messages.

Government

Companies have announced securing billions of dollars in cybersecurity-related contracts with the United States government in 2022.

Supply Chain Security

SBOMs can be used for managing risk and determining vulnerability impact, but it’s very hard to build holistic risk models when the data is...

Application Security

Enterprise communication and collaboration platform Slack has informed customers that hackers have stolen some of its private source code repositories, but claims impact is...