TRENDING

Microsoft Zero Day Vulnerability CVE-2023-36884 Being Actively Exploited

CRIL analyzes the impact of Zero-Day Exploit for CVE-2023-36884 in cyber espionage and ransomware operations.

Storm-0978 Group Deploys RomCom Variant and Underground Ransomware in Targeted Attacks

 

On July 11, 2023, Microsoft unveiled its latest Patch Tuesday, comprising 132 vulnerabilities, with six being actively exploited and thirty-seven categorized as Remote Code Execution (RCE) vulnerabilities. Additionally, Microsoft has published a dedicated article addressing CVE-2023-36884, an Office and Windows HTML Remote Code Execution Vulnerability. Microsoft is aware of this targeted attack that attempts to exploit this vulnerability using specially crafted Microsoft Office documents. The specially crafted Office document enables the attacker to perform remote code execution. However, for the exploit to be successful, the attacker must persuade the victims to open the malicious Office document.

Microsoft detected a phishing campaign carried out by a Threat Actor (TA) known as Storm-0978. The campaign specifically targeted defense and government entities in Europe and North America. To carry out the attack, the TA employed lures related to the Ukraine World Congress and exploited the vulnerability identified as CVE-2023-36884.

The cybercriminal group Storm-0978, operating from Russia, is notorious for engaging in various illegal activities. These activities include conducting ransomware and extortion operations and targeted campaigns to gather credentials. This group is also known for developing and distributing the RomCom backdoor and deploying Underground Ransomware.

Underground ransomware is connected significantly to Industrial Spy Ransomware, detected in the wild in May 2022. Additionally, Microsoft has reported that a recent campaign identified in June 2023 utilized the exploitation of CVE-2023-36884 to distribute a backdoor that shares similarities with RomCom.

This Storm-0978 group uses a phishing site masquerading as a well-known legitimate software for initial infection. The impersonated products include Adobe products, SolarWinds Network Performance Monitor, SolarWinds Orion, Advanced IP Scanner, KeePass, and Signal. By visiting these phishing sites, users unknowingly download and execute files that result in the infection of the RomCom backdoor.

Cyber Espionage

 

Microsoft has identified a series of campaigns known as Storm-0978, which have been active since late 2022. These operations have exhibited post-compromise activities and have targeted specific entities, indicating a high likelihood of espionage-related motives behind them.

In October 2022, Storm-0978 initiated a series of phishing campaigns by establishing fraudulent websites that resembled authentic software installers. The primary targets of these campaigns were individuals associated with the Ukrainian government and military organizations. The objective behind these activities was to distribute the RomCom malware and potentially acquire the login credentials of important individuals.

In December 2022, according to CERT-UA, Storm-0978 gained unauthorized access to an email account that belongs to the Ukrainian Ministry of Defense. Using this compromised account, the threat actor proceeded to send phishing emails. These deceptive emails included PDF attachments that served as lures, enticing recipients to click on links leading to a website controlled by the malicious actor. The website hosted malware designed to steal sensitive information from the victims’ devices.

A deceptive phishing campaign, attributed to Storm-0978, was executed in June 2023, focusing on defense and government entities in Europe and North America. The campaign employed a disguised OneDrive loader to distribute a backdoor resembling the RomCom malware. The below figure shows the spam email used by Storm-0978 to exploit the vulnerability CVE-2023-36884.

NATO, Spam Mail, Phishing
Figure 1 – Spam email with the NATO summit subject (Source: Microsoft)

 

The figure below displays the MS Word document utilized as bait throughout the campaign, specifically designed to align with the NATO Summit.

Microsoft Word, NATO Summit, Phishing
Figure 2 – Lure document used in the campaign

 

Ransomware Activities

 

In documented instances of ransomware infiltrations, Storm-0978 has gained access to credentials by extracting password hashes from the Security Account Manager (SAM) through the Windows registry. Subsequently, Storm-0978 has employed the SMBExec and WMIExec functionalities of the Impacket framework for lateral movement within the compromised systems.

Microsoft has linked Storm-0978 to previous management of the Industrial Spy ransomware market and crypter. However, as early as July 2023, Storm-0978 adopted a ransomware variant named Underground, which exhibits significant code similarities with the Industrial Spy ransomware.

Cyble Research and Intelligence Labs (CRIL) recently published a blog post about the newly identified underground ransomware variant involved in the ongoing Storm-0978 campaign.

The figure below shows the Underground Team ransomware login panel, which appears upon accessing the Onion URL mentioned in the ransom note.

Underground Team, Ransomware, Login panel
Figure 3 – Login panel of Underground Team ransomware

 

Conclusion:

 

Zero-day vulnerabilities are difficult to predict and detect in advance; hence zero days are very dangerous for any organization’s cyber infrastructure. The Storm-0978 group identified and exploited a zero-day vulnerability (CVE-2023-36884) in Microsoft Office to compromise multiple systems and performed espionage and ransomware operations.

The attackers used the RomCom variant for espionage, and Underground Ransomware was deployed for ransomware operations. The campaign indicates that Storm-0978 is a highly sophisticated group that seems to be also targeting multiple organizations in the future.

Recommendations

 

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:

  • Block process creations originating from PsExec and WMI commands – Microsoft recommends that some organizations might experience compatibility issues with this rule on certain server systems but should deploy it to other systems to prevent lateral movement originating from PsExec and WMI, including Impacket’s WMIexec.
  • Block executable files from running unless they meet a prevalence, age, or trusted list criterion.

Safety Measures Needed to Prevent Ransomware Attacks

  • Conduct regular backup practices and keep those backups offline or in a separate network.
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.
  • Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.
  • Refrain from opening untrusted links and email attachments without verifying their authenticity.

See Cyble Vision in Action

Users Should Take the Following Steps After the Ransomware Attack

  • Detach infected devices on the same network.
  • Disconnect external storage devices if connected.
  • Inspect system logs for suspicious events.

Impact of Ransomware

  • Loss of Valuable data
  • Loss of the organization’s reputation and integrity
  • Loss of the organization’s sensitive business information
  • Disruption in organization operation
  • Financial loss

Remediation For CVE-2023-36884

 

  • Implement a restriction to prevent all Office applications from generating child processes.
  • Organizations that cannot utilize these protective measures can configure the FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION registry key to prevent exploitation. However, it is important to note that while these registry settings can help mitigate the risks associated with this issue, they may impact the normal functionality of certain applications in specific use cases.
  • Add the following application names as REG_DWORD values to the registry key “HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION” with a data value of 1.
    • Excel.exe
    • Graph.exe
    • MSAccess.exe
    • MSPub.exe
    • PowerPoint.exe
    • Visio.exe
    • WinProj.exe
    • WinWord.exe
    • Wordpad.exe

MITRE ATT&CK® Techniques

 

Tactic  Technique ID  Technique Name 
Initial Access T1566 Phishing
Execution T1204 User Execution
Discovery T1082 
T1217
T1083
System Information Discovery 
Browser Information Discovery File and Directory Discovery
Defense Evasion T1070 Delete shadow drive data
Lateral Movement T1534
T1550
Internal Spearphishing
Use Alternate Authentication Material
Impact T1486
T1490
Data encrypted for impact
Inhibit System Recovery
Command and Control T1071 Application Layer Protocol

Indicators Of Compromise

 

Indicators  Indicator  
Type
 
Description 
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666
fb4ad5d21f0d8c6755eb4addba0ac288bd2574b6
059175be5681a633190cd9631e2975f6
Sha256
Sha1
Md5
Underground Team Ransomware

References

 

Share the Post:

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading

Scroll to Top