Press ESC to close

Arctic Wolf Observes Threat Campaign Targeting Palo Alto Networks Firewall Devices

CategoryDetails
Key Takeaways– Arctic Wolf observed intrusions involving Palo Alto Network firewall devices.
– Affected devices downloaded payloads such as Sliver C2 and coinminer binaries.
– Threat actors exploited PAN-OS vulnerabilities CVE-2024-0012 and CVE-2024-9474 for initial access.
– Monitoring firewall logs for unusual usernames aids early detection.
Summary– Palo Alto Networks disclosed vulnerabilities CVE-2024-0012 and CVE-2024-9474 in PAN-OS on November 18, 2024.
– watchTowr published technical details enabling threat actor exploitation.
– Arctic Wolf observed multiple intrusions shortly after, involving data exfiltration, malware deployment, and C2 activity.
Exploitation Details– CVE-2024-0012 exploited for authentication bypass; CVE-2024-9474 for privilege escalation.
– Logs showed Panorama console logins with bash commands in the username field.
– Downloaded files included watchTowr.js, vicidial_sign.js, and others.
Command and Control– Threat actors used curl or wget commands to download payloads from IP-based URLs.
– Sliver C2, an alternative to Cobalt Strike, was retrieved and executed.
– Scripts modified timestamps, cleared bash history, and created cron jobs for persistence.
Data Exfiltration– Threat actors exfiltrated configuration files, credentials, and other sensitive data.
– Used tar commands to archive files before exfiltration.
– Attempts included dumping /etc/passwd, /etc/shadow, and SSH keys.
PHP Webshell– An obfuscated PHP webshell was deployed.
– It decrypted POST parameters, executed payloads via eval, and encrypted output.
– Used MD5 padding for further obfuscation.
Coinminer Activity– XMRig was deployed on compromised devices to mine cryptocurrency.
– Network traffic to known XMRig addresses was observed.
Indicators of Compromise– Various IPv4 addresses (e.g., 104.131.69[.]106, 46.8.226[.]75) served as payload and C2 servers.
– Payloads included PHP scripts, Sliver C2 frameworks, and coinminer binaries.
– URLs like 46.8.226[.]75/1.txt hosted malicious files.
Remediation– Monitor firewall logs for unusual username patterns.
– Restrict access to management interfaces to trusted internal IPs.
– Apply patches for CVE-2024-0012 and CVE-2024-9474 immediately.
Detection Opportunities– Look for bash commands in the username field of Panorama logins.
– Flag files downloaded over HTTP from unexpected IPv4-based URLs.
– Monitor for automated file modifications and timestamp changes.

Read full article:https://arcticwolf.com/resources/blog/arctic-wolf-observes-threat-campaign-targeting-palo-alto-networks-firewall-devices/

Disclaimer: The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *