Threat analysis by The RabitaNoor (RBTN) Cyber Research Center
The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.
The document is a product of the RBTN - CYOI Pulpit
Photo by Yeshi Kangrang
Chinese state-sponsored hackers, including groups like Drifting Cloud, are targeting organizations in Afghanistan, Bhutan, India, Nepal, Pakistan, and Sri Lanka using a now-patched zero-day vulnerability in Sophos Firewall (CVE-2022-1040). Reports from Volexity, Sophos, and Recorded Future's Insikt Group highlight the exploitation of this vulnerability, which was patched in March 2022. The attackers, including groups like TA413 and a newly identified cluster TAG-40, have been using this vulnerability to install malware such as PupyRAT, Pantegana, and Sliver. The attacks involve modifying DNS responses to perform MITM attacks, allowing interception of user credentials and session cookies. Sophos has contacted affected organizations, noting that no user action is needed for those with automatic hotfix installation enabled.
Timestamp: 2022-06-17
Title: Chinese APT Groups Exploit Sophos Firewall Vulnerability in South Asia
Severity: High
The incident involves Chinese state-sponsored groups exploiting a Sophos firewall vulnerability (CVE-2022-1040) to target organizations in South Asia. The adversaries, including Drifting Cloud, TA413, and TAG-40, demonstrate high sophistication and motivation for cyber espionage. They employ capabilities such as malware installation and MITM attacks, leveraging compromised infrastructure to intercept sensitive data from government and private sector entities.
Adversary: Chinese state-sponsored groups targeting South Asia using Sophos firewall vulnerability.
Motivation: Cyber espionage
Sophistication: High
TTPs:
Capability: Exploitation of Sophos firewall vulnerability to install malware and perform MITM attacks.
Tools: PupyRAT, Pantegana, Sliver, Gh0st RAT
Evasion: DNS response modification
Description: Use of compromised Sophos firewalls to conduct attacks.
Communication Protocols: DNS
Targets: Organizations and governments in South Asia, including Afghanistan, Bhutan, India, Nepal, Pakistan, and Sri Lanka.
Industry: Government and private sector
Assets: Sophos firewalls, Content management systems
Data at Risk: User credentials, Session cookies
Impact: High
chinese-apt-groups-targeting-india-pakistan-and-more-with-sophos-firewall-vulnerability
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an ...
Chinese APT groups targeting India, Pakistan and more with ...
Chinese Hackers Exploited Sophos Firewall Zero-Day Flaw to ...
Pacific Rim timeline: Information for defenders from a braid of ...
RCE in Sophos Firewall is being exploited in the wild (CVE-2022 ...