<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ZeroSecurity</title>
    <description>The latest articles on DEV Community by ZeroSecurity (@zerosecurity).</description>
    <link>https://dev.to/zerosecurity</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F962665%2F214c7bda-b514-420b-ba74-947c1d694e2e.jpg</url>
      <title>DEV Community: ZeroSecurity</title>
      <link>https://dev.to/zerosecurity</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/zerosecurity"/>
    <language>en</language>
    <item>
      <title>Chinese Cyber Espionage Reaches New Heights: US Internet Providers Compromised</title>
      <dc:creator>ZeroSecurity</dc:creator>
      <pubDate>Tue, 03 Sep 2024 10:22:33 +0000</pubDate>
      <link>https://dev.to/zerosecurity/chinese-cyber-espionage-reaches-new-heights-us-internet-providers-compromised-3272</link>
      <guid>https://dev.to/zerosecurity/chinese-cyber-espionage-reaches-new-heights-us-internet-providers-compromised-3272</guid>
      <description>&lt;p&gt;Chinese state-sponsored hackers have successfully infiltrated several major American internet service providers (ISPs) &lt;a href="https://zerosecurity.org/2024/09/chinese-hackers-exploit-software-vulnerability-hack-u-s-internet-service-providers/" rel="noopener noreferrer"&gt;in recent months&lt;/a&gt;. This sophisticated campaign has granted the attackers unprecedented access to networks serving millions of customers, including potentially sensitive government and military personnel.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Scale and Sophistication of the Attacks
&lt;/h2&gt;

&lt;p&gt;Security experts and government officials familiar with the ongoing situation describe these intrusions as exceptionally aggressive and technically advanced. The hackers have managed to penetrate at least two large US providers and several smaller ones, demonstrating a significant escalation in China's cyber capabilities.&lt;/p&gt;

&lt;p&gt;Brandon Wales, who recently held the position of executive director at the Cybersecurity and Infrastructure Security Agency (CISA), emphasized the gravity of the situation. "What we're seeing from China now is business as usual, but on a dramatically larger scale. The threat has increased by an order of magnitude," Wales stated.&lt;/p&gt;

&lt;h2&gt;
  
  
  Targeting High-Value Information
&lt;/h2&gt;

&lt;p&gt;The choice of targets suggests a clear strategic focus. By compromising ISPs, the attackers gain access to a wealth of data flowing through these networks. Of particular concern is the potential surveillance of government employees, undercover operatives, and other groups of interest to Chinese intelligence services.&lt;/p&gt;

&lt;p&gt;Mike Horka, a former FBI agent now working as a researcher at Lumen Technologies, noted the significance of this access. "This represents a privileged, high-level connection to interesting customers," Horka explained. He also pointed out that the hackers were willing to expend valuable zero-day vulnerabilities in these attacks, underscoring the &lt;br&gt;
importance of the operation to Chinese interests.&lt;/p&gt;

&lt;h2&gt;
  
  
  Advanced Techniques and Possible Connections
&lt;/h2&gt;

&lt;p&gt;The methods employed in these intrusions share similarities with those attributed to a notorious Chinese hacking group known as Volt Typhoon. This group has previously targeted critical infrastructure, including Pacific ports, raising concerns about China's ability to disrupt US military logistics in a potential conflict scenario.&lt;/p&gt;

&lt;p&gt;One particularly sophisticated technique involved the exploitation of a previously unknown vulnerability in network management software from Versa Networks. This allowed the attackers to plant malware capable of intercepting user passwords within compromised ISP routers.&lt;/p&gt;

&lt;p&gt;In a separate but related campaign, another Chinese state-sponsored group demonstrated the ability to manipulate Domain Name System (DNS) records within a compromised ISP. This powerful technique can be used to redirect users to malicious sites or insert backdoors for ongoing surveillance.&lt;/p&gt;

&lt;h2&gt;
  
  
  Broader Implications and Ongoing Threats
&lt;/h2&gt;

&lt;p&gt;The breach of multiple ISPs represents a significant escalation in the cyber threat landscape. It provides potential avenues for widespread data collection, targeted surveillance, and even the possibility of disruptive attacks on critical infrastructure.&lt;/p&gt;

&lt;p&gt;US cybersecurity officials, including former NSA director Gen. Paul Nakasone, have expressed ongoing concern about the activities of groups like Volt Typhoon. &lt;/p&gt;

&lt;p&gt;The focus on gaining access for potential physical sabotage is particularly alarming, as it goes beyond traditional espionage into the realm of preparing for potential kinetic conflict.&lt;br&gt;
Chinese Response and Denial&lt;/p&gt;

&lt;p&gt;The Chinese Embassy in Washington has vehemently denied these &lt;br&gt;
accusations. &lt;/p&gt;

&lt;p&gt;In a statement, they claimed that "Volt Typhoon" is actually an independent ransomware group, not a state-sponsored entity. The embassy further alleged that US intelligence agencies and cybersecurity firms might be fabricating evidence to secure increased funding and contracts.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>China-Linked APT Group Velvet Ant Exploits Cisco Zero-Day (CVE-2024-20399) Vulnerability</title>
      <dc:creator>ZeroSecurity</dc:creator>
      <pubDate>Sat, 24 Aug 2024 05:04:26 +0000</pubDate>
      <link>https://dev.to/zerosecurity/china-linked-apt-group-velvet-ant-exploits-cisco-zero-day-cve-2024-20399-vulnerability-2bl5</link>
      <guid>https://dev.to/zerosecurity/china-linked-apt-group-velvet-ant-exploits-cisco-zero-day-cve-2024-20399-vulnerability-2bl5</guid>
      <description>&lt;p&gt;Cybersecurity researchers at Sygnia have discovered that the China-linked Advanced Persistent Threat (APT) group known as Velvet Ant has successfully exploited a recently disclosed zero-day vulnerability in Cisco switches to compromise network appliances.&lt;br&gt;
The Zero-Day Vulnerability: CVE-2024-20399&lt;/p&gt;

&lt;p&gt;In July 2024, Cisco addressed a critical security flaw, &lt;a href="https://zerosecurity.org/2024/08/china-linked-apt-group-velvet-ant-exploits-cisco-zero-day-cve-2024-20399-vulnerability/" rel="noopener noreferrer"&gt;identified as&lt;/a&gt; CVE-2024-20399, in its NX-OS software. This vulnerability, with a CVSS score of 6.0, allowed authenticated attackers to execute arbitrary commands as root on the underlying operating system of affected devices.&lt;/p&gt;

&lt;p&gt;The vulnerability stems from insufficient validation of arguments passed to specific configuration CLI commands. Exploiting this flaw requires administrator credentials, highlighting the importance of robust credential management practices.&lt;br&gt;
Velvet Ant’s Sophisticated Attack Strategy&lt;/p&gt;

&lt;p&gt;Sygnia researchers observed Velvet Ant exploiting CVE-2024-20399 as a zero-day vulnerability in April 2024. The APT group leveraged valid administrator credentials to escape the NX-OS command line interface (CLI) and execute arbitrary commands on the underlying Linux operating system.&lt;/p&gt;

&lt;p&gt;Following the initial exploit, Velvet Ant deployed a custom malware dubbed “VELVETSHELL” by Sygnia. This malware operates on the underlying OS and remains undetected by typical security tools, demonstrating the group’s advanced capabilities.&lt;br&gt;
VELVETSHELL: A Hybrid Malware Threat&lt;/p&gt;

&lt;p&gt;Sygnia managed to reconstruct the VELVETSHELL malware from device memory, despite the threat actor’s attempts to delete it. The malware is a sophisticated hybrid of two open-source tools: TinyShell and 3proxy.&lt;br&gt;
VELVETSHELL’s capabilities include:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Executing arbitrary commands
Downloading and uploading files
Establishing network traffic tunnels
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;These functionalities allow Velvet Ant to maintain persistent access and control over compromised systems, facilitating data exfiltration and ongoing espionage activities.&lt;br&gt;
Impacted Cisco Devices&lt;/p&gt;

&lt;p&gt;The vulnerability affects several Cisco device families, including:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;MDS 9000 Series Multilayer Switches
Nexus 3000 Series Switches
Nexus 5500 Platform Switches
Nexus 5600 Platform Switches
Nexus 6000 Series Switches
Nexus 7000 Series Switches
Nexus 9000 Series Switches in standalone NX-OS mode
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Mitigation and Response&lt;/p&gt;

&lt;p&gt;Cisco recommends that customers monitor the use of credentials for administrative users, particularly network-admin and vdc-admin accounts. The company has also provided the Cisco Software Checker to help customers determine if their devices are vulnerable to this flaw.&lt;/p&gt;

&lt;p&gt;In response to the severity of the threat, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-20399 to its Known Exploited Vulnerabilities (KEV) catalog.&lt;br&gt;
Evolving Tactics of APT Velvet Ant&lt;/p&gt;

&lt;p&gt;Sygnia’s research reveals a clear evolution in Velvet Ant’s tactics over time. The group has progressed from operating on ordinary endpoints to targeting legacy servers, and now focusing on network appliances using zero-day exploits.&lt;/p&gt;

&lt;p&gt;This shift towards compromising network appliances presents unique challenges for defenders. These devices typically prevent users from accessing the underlying operating system, making it extremely difficult to scan for indicators of compromise using traditional methods.&lt;/p&gt;

&lt;p&gt;The sophisticated nature of Velvet Ant’s operations underscores the ongoing threat posed by state-sponsored APT groups. Their ability to leverage zero-day vulnerabilities and develop custom malware tailored for network appliances demonstrates a high level of resources and expertise.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
