HomeCyber BalkansUAT-5918: Hackers Exploit Zero-Day Vulnerabilities on Exposed Web and Application Servers

UAT-5918: Hackers Exploit Zero-Day Vulnerabilities on Exposed Web and Application Servers

Published on

spot_img

A recent cybersecurity threat, known as UAT-5918, has been actively targeting entities in Taiwan, focusing on critical infrastructure sectors like telecommunications, healthcare, and information technology. This advanced persistent threat (APT) group aims to gain long-term access for information theft and credential harvesting.

UAT-5918 gains initial access by exploiting known vulnerabilities, including N-day vulnerabilities, in unpatched web and application servers that are exposed to the internet. Once inside the target network, the group conducts manual post-compromise activities such as network reconnaissance and establishing persistence. They use various open-source tools like the Chopper web shell, FRPC, FScan, In-Swor, Earthworm, and Neo-reGeorg to move laterally within the compromised network, gather system information, and create new administrative user accounts.

Credential harvesting is a crucial tactic employed by UAT-5918, utilizing tools like Mimikatz, LaZagne, and browser credential extractors to obtain local and domain-level user credentials. Additionally, the group uses tools like Impacket and WMIC for lateral movement via RDP and PowerShell remoting.

The tactics, techniques, and procedures (TTPs) of UAT-5918 show significant overlaps with other APT groups like Volt Typhoon, Flax Typhoon, Earth Estries, and Dalbit. According to a report by Cisco Talos, these groups target similar geographies and industry verticals, indicating strategic alignment in their operations.

While some tools used by UAT-5918 overlap with other APT groups, tools like LaZagne and SNetCracker have not been publicly associated with these groups, suggesting exclusive use by UAT-5918. To mitigate the threats posed by UAT-5918, organizations can implement various security measures. Utilizing tools like Cisco Secure Endpoint can prevent malware execution, while Cisco Secure Email can block malicious emails. Cisco Secure Firewall and Malware Analytics are effective in detecting and analyzing malicious activity, offering comprehensive protection against such threats.

Implementing robust patch management to address N-day vulnerabilities is crucial in preventing initial access by UAT-5918 and similar APT groups. By staying proactive and vigilant, organizations can enhance their cybersecurity posture and defend against evolving threats in cyberspace.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...