Demystifying: R00tK1t ATT&CK, Detect and D3FEND Initial Access
Sear Mahmood
CSOC Operational Engineer @ Emirates - | Detection Engineer | Incident Handler
Scope of the Article:
I'm mapping it on MITRE Att&ck Framework so that the readers can immediately implement it in the environment. we will also be discussing some Mitigations and hardening suggestions for the safeguard of the Digital landscape of an organization.
In this Article, we will only be covering initial access techniques which are most important to detect the initial intrusion.
Introduction:
According to reports. On January 26th, the hacking group R00TK1T announced via their Telegram channel their plan to launch a cyber-attack campaign against Malaysian infrastructure. The same threat was also posted on the dark web, warning that "chaos is brewing" and advising Malaysians to prepare for infrastructure collapse. The hackers' message ominously declared that "no system is safe, no data secure."
National Cyber Coordination and Command Centre, Malaysia (NC4) established that the R00TK1T plan was initially announced on the group’s Telegram group on January 26th. The multi-agency cybersecurity team also believed that the hacking group was part of a “retaliation team” that acts upon cyber-attacks ignited by the ongoing conflict in the Middle East. Based on historical data, the agency also established that the campaign would include web defacement, stealing confidential documents, and network intrusion with or without insider help.
Primary Targets of R00tK1t:
As per the reports and analyzing victims and their relations, it is safe to assume that the threat group is targeting the Muslim majority countries and due to the recent geopolitical situation of the region.
Industries Priority-wise:
As the behavior of the group is inline with a hacktivist group the priority of the targets for the this group is as below:
Technique Tactics and Procedures:
As per the latest findings against R00tK1t, they are hiding rootkits in sophisticated malwares such as Trojans, RATs, Droppers, Viruses and Worms. We will discuss some of the key stages and and techniques of MITRE Att&ck by which we can detect the threat and remediate it timely.
Initial Access:
It is the most initial and the vulnerable stage of an attack, I will discuss some of the techniques being used by R00tkit.
MITRE T1199: Trusted Relationship
Recent Examples of compromise:
Maxis has been reportedly hit by their cyberattack. “While we did not identify anything related to our own systems, we identified a suspected incident involving unauthorized access to one of our third-party vendor systems that resides outside of Maxis’ internal network environment” the telco said.
During the SolarWind Compromise, APT29 also gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems.
And there has been instances where threat groups leveraged third party software and MSPs to get the initial access within the environment.
Detection(s):
Mitigation(s):
领英推荐
MITRE T1190: Exploit Public-Facing Application
As per the reports, R00tK1t's main targets are the public facing servers and hosted websites.
APT Groups in the past has used vulnerabilities of VPNs, Firewalls, Proxies, Exchanges and Applications to gain the initial access.
Detection:
Mitigations:
MITRE T1133 External Remote Services:
APT29, has used compromised identities to access networks via VPNs and Citrix.
A group used legitimate credentials to login to an external VPN, Citrix, SSH, and other remote services.
Adversaries has used legitimate VPN, Citrix, or VNC credentials to maintain access to a victim environment.
Detection(s):
Mitigation(s):
MITRE T1566: Phishing
Phishing has been the most famous technique used by attackers to deliver there malicious code. there is no need to present any example of its destructive power as many of the infections spread from this technique.
Mitigations:
Conclusion:
While this article focuses on initial access, it serves as a technical resource for bolstering defenses against evolving threats. By implementing suggested mitigations and hardening suggestions, organizations can enhance resilience against adversaries like R00TK1T. Ongoing vigilance and proactive defense remain critical in safeguarding digital integrity.