• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
china linked group breaches networks via connectwise, f5 software flaws

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

You are here: Home / General Cyber Security News / China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
March 22, 2024

A China-linked risk cluster leveraged security flaws in Connectwise ScreenConnect and F5 Huge-IP software program to deliver personalized malware able of providing added backdoors on compromised Linux hosts as element of an “aggressive” campaign.

Google-owned Mandiant is monitoring the action under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a “former member of Chinese hacktivist collectives that has given that proven indications of acting as a contractor for China’s Ministry of Condition Security (MSS) focused on executing obtain functions.”

The danger actor is thought to have orchestrated common attacks in opposition to Southeast Asian and U.S. investigation and training institutions, Hong Kong companies, charities and non-governmental organizations (NGOs), and U.S. and U.K. govt companies in between October and November 2023, and once more in February 2024 making use of the ScreenConnect bug.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Initial accessibility to concentrate on environments is facilitated by the exploitation of identified security flaws in Atlassian Confluence (CVE-2023-22518), ConnectWise ScreenConnect (CVE-2024-1709), F5 Big-IP (CVE-2023-46747), Linux Kernel (CVE-2022-0185), and Zyxel (CVE-2022-3052).

A effective foothold is adopted by intensive reconnaissance and scanning of internet-experiencing methods for security vulnerabilities, with UNC5174 also making administrative person accounts to execute destructive steps with elevated privileges, including dropping a C-primarily based ELF downloader dubbed SNOWLIGHT.

SNOWLIGHT is made to obtain the subsequent-stage payload, an obfuscated Golang backdoor named GOREVERSE, from a remote URL which is linked to SUPERSHELL, an open-supply command-and-management (C2) framework that makes it possible for attackers to build a reverse SSH tunnel and launch interactive shell classes to execute arbitrary code.

Also set to use by the menace actor is a Golang-dependent tunneling device known as GOHEAVY, which is possible used to facilitate lateral motion in compromised networks, as perfectly as other courses like afrog, DirBuster, Metasploit, Sliver, and sqlmap.

Connectwise, F5 Software Flaws

In one particular strange occasion noticed by the risk intelligence firm, the menace actors have been identified to utilize mitigations for CVE-2023-46747 in a very likely endeavor to reduce other unrelated adversaries from weaponizing the identical loophole to attain entry.

“UNC5174 (aka Uteus) was earlier a member of Chinese hacktivist collectives ‘Dawn Calvary’ and has collaborated with ‘Genesis Day”https://thehackernews.com/”Xiaoqiying’ and ‘Teng Snake,'” Mandiant assessed. “This individual appears to have departed these teams in mid-2023 and has because targeted on executing entry operations with the intention of brokering entry to compromised environments.”

There is evidence to advise that the danger actor may possibly be an first access broker, even boasting to be affiliated with the MSS in dark web discussion boards. This is bolstered by the point some of the U.S. defense and U.K. federal government entities have been concurrently targeted by yet another entry broker referred to as UNC302.

Cybersecurity

The conclusions at the time yet again underscore Chinese country-state groups’ continued attempts to breach edge appliances by swiftly co-opting recently disclosed vulnerabilities into their arsenal in order to carry out cyber espionage operations at scale.

“UNC5174 has been observed trying to offer access to U.S. defense contractor appliances, U.K. authorities entities, and institutions in Asia in late 2023 following CVE-2023-46747 exploitation,” Mandiant researchers stated.

“There are similarities concerning UNC5174 and UNC302, which implies they function within an MSS preliminary entry broker landscape. These similarities propose attainable shared exploits and operational priorities involving these danger actors, while even more investigation is necessary for definitive attribution.”

The disclosure will come as the MSS warned that an unnamed foreign hacking team experienced infiltrated “hundreds” of Chinese business enterprise and governing administration companies by leveraging phishing e-mails and recognized security bugs to breach networks. It did not expose the menace actor’s title or origin.

Located this posting intriguing? Abide by us on Twitter  and LinkedIn to browse more unique articles we article.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «massive sign1 campaign infects 39,000+ wordpress sites with scam redirects Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Next Post: AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking aws patches critical 'flowfixation' bug in airflow service to prevent»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.