Key Takeaways
A sophisticated hacker group actively exploits zero-day flaws in critical enterprise infrastructure. First, Amazon's MadPot honeypot service detected exploitation attempts against Citrix. Further investigation revealed the same gang was targeting a previously undocumented endpoint in Cisco Identity Service Engine (ISE) that used vulnerable deserialization logic.
Amazon's threat intelligence division identified that the same advanced persistent threat (APT) was leveraging:
The campaign is notable for the threat actor's advanced capabilities and deep technical knowledge, the report notes. Following the exploitation of the Cisco ISE vulnerability, the APT deployed a custom web shell named IdentityAuditAction.Â
This backdoor was designed for stealth, operating entirely in memory to minimize forensic traces. It also used advanced evasion techniques, including Java reflection, DES encryption with non-standard Base64 encoding, and requiring specific HTTP headers for access.
The simultaneous use of multiple undisclosed zero-day exploits indicates a highly resourced and capable adversary targeting enterprise identity and network access control systems.
The discovery of this APT targeting enterprise systems highlights the significant risks posed by attacks on network edge appliances. The fact that the threat actor was weaponizing vulnerabilities before patches were widely available underscores the challenge of defending against such coordinated campaigns.Â
Amazon recommends:
In September, a critical Cisco SNMP RCE vulnerability in iOS and iOS XE software and a critical TP-Link zero-day that exposed millions of routers to full system takeover were observed.