Jeremy Dallman’s Post

View profile for Jeremy Dallman, graphic

Senior Director, Security Research @ Microsoft Threat Intelligence

Microsoft, in partnership with US and Poland Government, has taken steps to disrupt and mitigate a widespread campaign by the Russian nation-state threat actor Midnight Blizzard targeting TeamCity servers using the publicly available exploit for CVE-2023-42793. Microsoft's October analysis on North Korean actor exploit of TeamCity CVE-2023-42793 linked below. Additional related details from US Government and Poland Government also below. Following exploitation, Midnight Blizzard uses scheduled tasks to keep a variant of VaporRage malware persistent. The VaporRage variant, which is similar to malware deployed by the threat actor in recent phishing campaigns, abuses Microsoft OneDrive and Dropbox for C2. Post-compromise activity includes credential theft using Mimikatz, Active Directory enumeration using DSinternals, deployment of tunneling tool rsockstun, and turning off antivirus and EDR capabilities. In addition to disrupting the abuse of Microsoft OneDrive for command and control, Microsoft Defender Antivirus and Microsoft Defender for Endpoint protect customers against this and other Midnight Blizzard malware. Although many of the compromises appear to be opportunistic, affecting unpatched Internet-facing TeamCity servers, Microsoft continues to work with the international cybersecurity community to mitigate the potential risk to software supply chain ecosystems. We are especially grateful to our partners in the international cybersecurity community for their collaboration on this investigation. [edited/updated links] https://lnkd.in/eejCCtcH https://lnkd.in/eB5ptTsY https://lnkd.in/eG3s2n42 Midnight Blizzard is the latest nation-state threat actor observed exploiting the TeamCity CVE-2023-42793 vulnerability. In October, North Korean threat actors Diamond Sleet and Onyx Sleet exploited the same vulnerability in separate attacks: https://lnkd.in/gUv4SU24

To view or add a comment, sign in

Explore topics