Lucene search

K
hiveproHive ProHIVEPRO:0D02D133141B167E9F03F4AC4CA5579A
HistoryMar 10, 2022 - 4:20 p.m.

Prophet Spider exploits Log4j and Citrix vulnerabilities to deploy webshells

2022-03-1016:20:17
Hive Pro
www.hivepro.com
287

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

THREAT LEVEL: Red. For a detailed advisory, download the pdf file here Prophet Spider is a well-known Initial Access Broker (IAB) group. Prophet Spider's tradecraft continues to grow while exploiting known web-server vulnerabilities such as Citrix and Log4j. A remote code execution (RCE) vulnerability(CVE-2021-22941) affecting Citrix ShareFile Storage Zones Controller, was used by Prophet Spider to attack a Microsoft Internet Information Services (IIS) web server. The attacker took advantage of the flaw to launch a WebShell that allowed the download of further tools. Prophet Spider also exploits known Log4j vulnerabilities in VMware Horizon (CVE-2021-44228, CVE-2021-45046, CVE-2021-44832). Prophet Spider most typically used encoded PowerShell instructions to download a second-stage payload to the targeted PCs after exploiting the vulnerabilities. The specifics of that payload are determined by the attacker's motivations and aims, such as crypto mining, ransomware, and extortion. The MITRE TTPs commonly used by Prophet Spider are: TA0001: Initial Access T1190: Exploit Public Facing Application TA0002: Execution T1059.001: Command and Scripting Interpreter: PowerShell TA0003: Persistence T1505.003: Server Software Component: Web Shell TA0011: Command and Control T1071: Application Layer Protocol T1105: Ingress Tool Transfer Actor Detail Vulnerability Details Indicators of Compromise (IoCs) Patch Link https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.15.0/ https://logging.apache.org/log4j/2.x/manual/migration.html https://github.com/apache/logging-log4j2/pull/607/files https://www.citrix.com/downloads/sharefile/product-software/sharefile-storagezones-controller-511.html References https://blogs.blackberry.com/en/2022/01/log4u-shell4me https://www.crowdstrike.com/blog/prophet-spider-exploits-citrix-sharefile/

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C