• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

SonicWall devices infected by malware that survives firmware upgrades

Bill Toulas by Bill Toulas
March 9, 2023
Reading Time: 3 mins read
0
SonicWall devices infected by malware that survives firmware upgrades

Sonicwall

RELATED POSTS

Sextortionists are making AI nudes from your social media images

Over 60,000 Android apps secretly installed adware for past six months

Outlook.com hit by outages as hacktivists claim DDoS attacks

A suspected Chinese hacking campaign has been targeting unpatched SonicWall Secure Mobile Access (SMA) appliances to install custom malware that establishes long-term persistence for cyber espionage campaigns.

The deployed malware is customized for SonicWall devices and is used to steal user credentials, provide shell access to the attackers, and even persist through firmware upgrades.

The campaign was discovered by Mandiant and SonicWall’s PSIRT team, who track the actor behind it as UNC4540, likely to be of Chinese origin.

New malware targets SonicWall devices

The malware used on SonicWall devices consists of an ELF binary, the TinyShell backdoor, and several bash scripts that show a deep understanding of the targeted network devices.

“The overall behavior of the suite of malicious bash scripts shows a detailed understanding of the appliance and is well tailored to the system to provide stability and persistence,” explains Mandiant.

Malware components
Malware components (Mandiant)

The main module, named ‘firewalld,’ executes SQL commands against the appliance’s database to steal the hashed credentials of all logged-in users.

Buy JNews
ADVERTISEMENT

The stolen credentials are copied on a text file created by the attacker at ‘tmp/syslog.db’ and are later retrieved to be cracked offline.

Additionally, firewalld launches other malware components, like TinyShell, to establish a reverse shell on the appliance for easy remote access.

Finally, the main malware module also adds a small patch to the legitimate SonicWall binary ‘firebased,’ but Mandiant’s researchers couldn’t determine its exact purpose.

The analysts hypothesize that this modification helps the malware’s stability when the shutdown command is entered on the device.

While it is unclear what vulnerability was used to compromise devices, Mandiant says that the targeted devices were unpatched, making them likely vulnerable to older flaws.

Recent flaws disclosed by SonicWall [1, 2, 3] that impacted SMA devices allowed unauthenticated access to devices, which could then be used in campaigns like this one.

Persistence and resilience

Mandiant says there are signs that the malware was installed on the examined systems all the way back in 2021 and persisted through multiple subsequent firmware updates on the appliance.

The threat actors achieved this by using scripts that offer redundancy and ensure long-term access to breached devices.

For example, there’s a script named “iptabled” that is essentially the same module as firewalld but will be only called by the startup script (“rc.local”) if the primary malware process exits, crashes, or can’t be launched.

Additionally, the attackers implemented a process where a bash script (“geoBotnetd”) checks for new firmware updates at “/cf/FIRMWARE/NEW/INITRD.GZ” every 10 seconds. If one is found, the malware injects itself into the upgrade package to survive even after firmware upgrades.

The script also adds a backdoor user named “acme” on the upgrade file so they can maintain access after the firmware update is applied to the breached appliance.

System administrators are advised to apply the latest security updates provided by SonicWall for SMA100 appliances.

The recommended target version right now is 10.2.1.7 or higher, which includes File Integrity Monitoring (FIM) and anomalous process identification, which should detect and stop this threat.

This campaign shares many similarities with recent attacks that targeted a zero-day vulnerability in Fortinet SSL-VPN devices used by government organizations and government-related targets.

Similar to the SonicWall campaign, the threat actors behind the Fortinet attacks showed intimate knowledge about the devices and how they operated to inject custom malware for persistence and data theft.

“In recent years Chinese attackers have deployed multiple zero-day exploits and malware for a variety of internet facing network appliances as a route to full enterprise intrusion, and the instance reported here is part of a recent pattern that Mandiant expects to continue in the near term,” warns Mandiant in the report.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

FBI warns of spike in ‘pig butchering’ crypto investment schemes
Cyber Security

Sextortionists are making AI nudes from your social media images

June 6, 2023
Android file manager apps infect thousands with Sharkbot malware
Cyber Security

Over 60,000 Android apps secretly installed adware for past six months

June 6, 2023
Microsoft Outlook outage prevents users from sending, receiving emails
Cyber Security

Outlook.com hit by outages as hacktivists claim DDoS attacks

June 6, 2023
Microsoft to pay $20 million for XBOX children privacy violations
Cyber Security

Microsoft to pay $20 million for XBOX children privacy violations

June 6, 2023
Dissecting the Dark Web Supply Chain: Stealer Logs in Context
Cyber Security

Dissecting the Dark Web Supply Chain: Stealer Logs in Context

June 6, 2023
Android December 2022 security updates fix 81 vulnerabilities
Cyber Security

Android security update fixes Mali GPU flaw exploited by spyware

June 6, 2023

Recommended Stories

Ransomware detection with Wazuh SIEM and XDR platform

Ransomware detection with Wazuh SIEM and XDR platform

November 30, 2022
I grilled ChatGPT about Polygon’s [MATIC] price action, but it left me intrigued

I asked ChatGPT what Polygon’s future holds, guess what it said…

May 7, 2023
Western Digital struggles to fix massive My Cloud outage, offers workaround

Western Digital struggles to fix massive My Cloud outage, offers workaround

April 8, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • North Korean hackers behind Atomic Wallet breach, finds intelligence firm
  • Zenit World introduces token rewards program to celebrate 80,000 registrations

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?