Malwarebytes targeted by Nation-State Actor implicated in SolarWinds breach

Share the Post:

Recently, various organizations in the security industry, have come under attack by a nation-state actor leveraging SolarWinds software. On December 14, 2020, Malwarebytes reported the event and informed its business customers using SolarWinds to take precautionary measures.

However, a new intrusion vector has been introduced by the same actor which works by abusing applications with privileged access to Microsoft Office 365 and Azure environments. This was confirmed by the security firm, Malwarebytes who was recently targeted using the new vector.

Fortunately, after an extensive investigation, they discovered that the attacker only gained access to a limited subset of internal company emails and there was no evidence to indicate unauthorized access or compromise of production environments.

How did this impact Malwarebytes?

On December 15, the Microsoft Security Response Center notified Malwarebytes of suspicious activity from a third-party application in the firm’s Microsoft Office 365 tenant consistent with the tactics, techniques and procedures (TTP) of the same advanced threat actor involved in the SolarWinds attacks, which occurred two days earlier.

In response, Malwarebytes and Microsoft’s Detection and Response Team (DART). Together, performed an extensive investigation of both their cloud and on-premises environments for any activity related to the API calls that prompted the initial alert. The findings of the investigation showed that attackers leveraged a dormant email protection product within Malwarebytes’ Office 365 app that allowed access to a limited subset of internal company emails.

The supply chain nature of the SolarWinds attack prompted the cybersecurity providers to conduct a thorough investigation of all Malwarebytes source code, build and delivery processes, including software reverse engineering.  No evidence of unauthorized access or compromise in any on-premises and production environments was discovered, rendering the company’s software safe to use.

What we know: SolarWinds Attackers Also Target Administrative and Service Credentials

First, we know that the attackers did not only rely on the SolarWinds supply-chain attack but also leveraged additional means to compromise high-value targets by exploiting administrative or service credentials as highlighted As the US Cybersecurity and Infrastructure Security Agency (CISA).

Also, Azure Active Directory has a major vulnerability that essentially leads to backdoor access to principals’ credentials into Microsoft Graph and Azure AD Graph and third-party applications can be compromised if an attacker with sufficient administrative privilege gains access to a tenant.

In Malwarebytes’ case, the threat actor included a self-signed certificate with credentials to the service principal account. Which they can authenticate using the key and make API calls to request emails via MSGraph.

Securing Azure tenants is a challenging task for many organizations, particularly when dealing with third-party applications or resellers. This is why CrowdStrike introduced a tool to help companies identify and mitigate risks in Azure Active Directory.

Coming together as an industry

According to Malwarebytes, much about nation-state actors has been learnt in a relatively short time, but there is more yet to be discovered about this long and active campaign that has disrupted the activities of multiple high-profile targets. It is therefore crucial that security providers continue to share information that can help the security industry in times like these, especially with the surge of new and complex attacks.

Related Posts

Colonial Pipeline Hack: What We Know So Far

On May 7th, Colonial Pipeline experienced a significant cyberattack that resulted in a total shutdown of its operations, leading to widespread fuel shortages. Shortly thereafter, it became evident that the incident involved ransomware, with reports indicating that the company made a payment of nearly US$5 million to the attackers, which contradicted their public statements. The cybercriminal organization, known as DarkSide, issued an atypical apology, asserting that their motive was profit rather than chaos. As Colonial Pipeline initiates the process of resuming operations, developments concerning DarkSide follow a surprising trajectory. Explore the complete narrative behind this critical cyber incident and its broader implications.

Read More

Ransomware attack halts Sierra Wireless Production Activities

Sierra Wireless, a leader in internet-of-things solutions, recently fell victim to a significant ransomware attack that brought its production activities to a standstill. The incident, which began on March 20th, not only disrupted manufacturing but also affected internal operations and the company’s website. As the team works diligently to restore systems, questions loom about the potential impact on customer data and the overall financial repercussions. With cybersecurity protocols in place, the company remains tight-lipped about the specifics of the attack. Discover how this incident reflects the growing threat of ransomware in today’s digital landscape.

Read More