• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      Computing Tech Marketing & Innovation Awards
      • Date: 12 Jun 2020
      • TBC, London
      event logo
      AI & Machine Learning Awards 2020

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 01 Jul 2020
      • TBC, London
      Digital Technology Leader Awards

      For too long the limelight has shone exclusively on marketing staff. The Computing Digital Technology Leaders Awards exist to recognise the achievements of the individuals and companies who are really making it happen at the coal face of the digital technology stack: from website design and coding to UX and project management, from scrum masters and product managers, all the way up to the CDO.

      • Date: 08 Jul 2020
      • London TBC, London
      event logo
      Computing DevOps Live 2020
      • Date: 14 Jul 2020
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    •  

       

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Security

Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
  • Graeme Burton
  • @graemeburton
  • 25 March 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

FireEye has warned of a surge in activity by APT41, also known as Winnti or Wicked Panda, a group linked to China's security services. The wave of attacks, carried out between January and March this year, targeted organisations across the world, including the US, UK, Singapore, Switzerland, Japan, Poland and Saudi Arabia - to name just a few.

APT41 sought to take advantage of security flaws in unpatched Citrix NetScaler servers, Cisco routers and Zoho ManageEngine Desktop Central, targeting 75 organisations in total. Targets included companies in telecoms, healthcare, defence and manufacturing, as well as public-sector organisations, non-profits and education.

Chinese state-sponsored APT41, notes FireEye, generally conducts espionage, but has also been engaged in financial motivated activity in the past. 

It's unclear whether APT41 scanned the internet for targets and attempted exploitation en masse, or selected specific organisations, but the victims appear to be more targeted in nature, according to FireEye.

The primary attack vector has been the CVE-2019-19781 Citrix Application Delivery Controller (ADC) security flaw that Citrix was accused of being lackadaisical in addressing. While discovered and publicised in December, it wasn't until late January that the company finally issued the last patches. On top of that, many organisations have been equally lackadaisical in applying the patches.

Initially, claims FireEye, APT41 probed endpoints to confirm whether a system was vulnerable, and without Citrix's rushed-out mitigation applied. The much-criticised mitigation for the vulnerability was published by Citrix on 17 December, pending a series of patches, which were published throughout January.

There was a lull in activity from the group between 23rd January and 1st February, consistent with the Chinese New Year holiday period - "a common activity pattern by Chinese APT groups", according to FireEye.

From 1st February, APT41 moved to using CVE-2019-19781 exploit payloads that initiate a download via FTP, FireEye reports.

"We did not observe APT41 activity at FireEye customers between 2nd February and 19th February 2020. China initiated COVID-19 related quarantines in cities in Hubei province starting on 23rd January and 24th January, and rolled out quarantines to additional provinces starting between 2nd February and 10th February.

"While it is possible that this reduction in activity might be related to the COVID-19 quarantine measures in China, APT41 may have remained active in other ways, which we were unable to observe with FireEye telemetry. We observed a significant uptick in CVE-2019-19781 exploitation on 24th February and 25th February."

On 21st February, APT41 exploited a Cisco RV320 router at a telecoms organisation using an unknown exploit, "but there is a Metasploit module that combines two CVE's (CVE-2019-1653 and CVE-2019-1652) to enable remote code execution on Cisco RV320 and RV325 small business routers and uses ‘wget' to download the specified payload", according to FireEye.

At the beginning of March APT41 also deployed a zero-day remote code execution vulnerability in Zoho ManageEngine Desktop Central versions prior to 10.0.474 at more than a dozen FireEye customers. Five separate customers were compromised as a result.

"This activity is one of the most widespread campaigns we have seen from China-nexus espionage actors in recent years," claimed FireEye in its report published today.

"While APT41 has previously conducted activity with an extensive initial entry... this scanning and exploitation has focused on a subset of our customers, and seems to reveal a high operational tempo and wide collection requirements for APT41."

The group used publicly available tools, such as the Cobalt Strike threat-emulation tools and Meterpreter, which enables users to control devices, upload and download files, using VNC.

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Security
  • Threats and Risks
  • Hacking
  • Zoho
  • CVE-2019-1653
  • CVE-2019-1652
  • Citrix
  • China
  • Security
  • APT41
  • Wicked Panda
  • FireEye

More on Security

Tupperware website infected with payment card skimmer
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group

  • Hacking
  • 26 March 2020
This is, literally, what a hacker looks like. No, really...
Half of all UK businesses hit by security breaches in the past 12 months, according to government Cyber Security Breaches Survey 2020

More businesses and charities than ever are being hit by cyber attacks, according to the latest survey – but organisation are also becoming more resilient

  • Security
  • 25 March 2020
Keeping systems patched as a matter of priority is the first line of defence against ransomware
More ransomware groups threaten to publish data stolen data from non-payers

More and more ransomware groups are starting to steal data before encryption in order to blackmail their victims into paying up

  • Security
  • 25 March 2020
Easy availability of ICS hacking tools poses big threat to industrial sector, researchers warn
Easy availability of ICS hacking tools poses major threat to industrial sector, researchers warn

Most tools are 'vendor agnostic' and can target products from some of the largest ICS original equipment manufacturers, warns FireEye

  • Threats and Risks
  • 24 March 2020
Spanish hospitals have been targeted with coronavirus-themed ransomware
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
blog comments powered by Disqus
Back to Top

Most read

NASA forgot about the egress costs for its 247 petabyte data store on AWS
NASA forgot about the egress costs for its 247 petabyte data store on AWS
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
BT: Working from home? We can handle it
BT: Working from home? We can handle it
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017