HomeCyber BalkansUnveiling Server Configurations and TLS Certificates

Unveiling Server Configurations and TLS Certificates

Published on

spot_img

In a recent technical investigation, critical insights were discovered into the infrastructure associated with a suspected Chinese state-backed cyber actor known as “RedGolf.” The group, also referred to as APT41, BARIUM, or Earth Baku, came under scrutiny following a report by Recorded Future’s Insikt Group in March 2023. Their investigation unveiled significant connections to more recent campaigns, particularly infrastructure tied to mid-2024 attacks on Italian organizations.

The focal point of the analysis revolved around the utilization of historical Transport Layer Security (TLS) certificates, which offered distinct identifiers and operational patterns linked to the ongoing activity. The examination of GhostWolf’s infrastructure initiated with a comprehensive analysis of 39 IP addresses associated with the threat actor according to the Insikt Group’s IoC dataset.

A significant discovery involved certificates from the wolfSSL library, an open-source SSL/TLS library widely used in embedded systems and secure communications. One key anomaly identified was the alteration of the Organizational Unit (OU) field in these certificates – while legitimate example certificates used “Consulting_1024,” the malicious certificates changed this to “Support_1024,” resulting in a unique TLS fingerprint. Researchers proceeded to utilize the Hunt SSL History tool to unveil 122 IP addresses linked to this certificate’s SHA-256 hash.

Further refinement through JA4X fingerprinting – an advanced extension of the JA3 TLS fingerprinting method – narrowed down results to 41 unique IPs sharing a similar configuration. By amalgamating multiple distinctive indicators such as the anomalous OU field, certificate SHA-256 hash, and JA4X fingerprint, researchers developed advanced search queries to pinpoint still-active infrastructure related to GhostWolf.

Tools such as Hunt’s Advanced Search were instrumental in identifying six active IP addresses displaying consistent characteristics. These servers exhibited synchronized behavior, predominantly operating on HTTPS (port 443) or alternate ports like 8443. Noteworthy observations included the reuse of hosting providers spanning geographies such as The Constant Company, LLC, and Nebula Global LLC. Additionally, anomalies like overlapping IP ranges with previously identified threats reinforced suspicions of ongoing operations.

A server hosting a suspected variant of the GhostWolf certificate was also identified. This server’s certificate bore similarities to legitimate wolfSSL examples but showcased timestamps aligning closely with the Support_1024 infrastructure. Although definitive attribution to RedGolf remains ambiguous, the geographic location and hosting provider align with previously reported Command-and-Control operations.

This analysis underscores the tenacity of threat actors like RedGolf/APT41. Their consistent use of modified certificates, uniform hosting providers, and closely related IP ranges suggest a deliberate endeavor to sustain infrastructure longevity while evading detection. The findings accentuate the pivotal role of TLS certificate analysis and advanced fingerprinting techniques in detecting and tracking sophisticated threat actors.

The continuation of subtle certificate modifications, along with consistent infrastructure setups, necessitates vigilant defense strategies. Regular analysis of TLS certificates for unusual fields and leveraging enhanced fingerprinting tools like JA4+ are crucial steps in detecting and isolating malicious server configurations from benign traffic. By embracing these practices, defenders can anticipate adversary activity, mitigate risks, and bolster overall network security posture.

The investigation into GhostWolf’s infrastructure exemplifies the significance of persistent monitoring and historical data analysis in combatting resolute state-backed cyber threats. This case serves as a reminder of the ever-evolving landscape of cyber threats and the importance of proactive defense measures to thwart malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...