MuddyWater is taking advantage of old vulnerabilities


#### THREAT LEVEL: Red. For a detailed advisory, [download the pdf file here.![](chrome-extension://gmpljdlgcdkljlppaekciacdmdlhfeon/images/beside-link-icon.svg)](<https://www.hivepro.com/wp-content/uploads/2021/11/MuddyWater-is-taking-advantage-of-old-vulnerabilities_TA202149.pdf>)[](<https://docs.google.com/viewer?url=https%3A%2F%2Fwww.hivepro.com%2Fwp-content%2Fuploads%2F2021%2F11%2FA-zero-day-vulnerability-has-been-discovered-in-PANs-GlobalProtect-firewall_TA202148-1.pdf&embedded=true&chrome=false&dov=1> "View this pdf file" ) The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), and the United Kingdom's National Cyber Security Centre (NCSC) have issued a joint advisory to warn organizations about an APT State sponsored Actor exploiting old Fortinet and proxyshell vulnerabilities. Since late March 2021, this APT Iranian State sponsored Actor (MuddyWater) has been breaching vulnerable networks by exploiting Fortinet vulnerabilities. The Hive Pro threat Research team has issued a detailed and in [depth](<https://www.hivepro.com/old-fortinet-vulnerabilities-exploited-by-state-sponsored-actors/>) advisory for the same. Now, in October 2021, MuddyWater is getting initial access to the susceptible system by exploiting the well known ProxyShell Vulnerability (CVE 2021 34473). It is recommended that organizations patch these vulnerabilities as soon as available. The Tactics and Techniques used by MuddyWater are: TA0042 - Resource Development T1588.001 - Obtain Capabilities: Malware T1588.002 - Obtain Capabilities: Tool TA0001 - Initial Access T1190 - Exploit Public Facing Application TA0002 - Execution T1053.005 - Scheduled Task/Job: Scheduled Task TA0003 - Persistence T1136.001 - Create Account: Local Account T1136.002 - Create Account: Domain Account TA0004 - Privilege Escalation TA0006 - Credential Access TA0009 - Collection T1560.001 - Archive Collected Data: Archive via Utility TA0010 - Exfiltration TA0040 - Impact T1486 - Data Encrypted for Impact #### Actor Details ![](https://www.hivepro.com/wp-content/uploads/2021/11/actor-details-3-1024x257.png) #### Vulnerability Details ![](https://www.hivepro.com/wp-content/uploads/2021/11/VM-3-1024x585.png) #### Indicators of Compromise (IoCs) ![](https://www.hivepro.com/wp-content/uploads/2021/11/ioc-2-1024x344.png) #### Patch Link <https://kb.fortinet.com/kb/documentLink.do?externalID=FD37033> <http://www.securityfocus.com/bid/108693> <https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473> #### References <https://us-cert.cisa.gov/ncas/alerts/aa21-321a>