Faraway Russian hackers breached US organization via Wi-Fi

Teilen:

Forest Blizzard, a threat group associated with Russia’s GRU military intelligence service, repeatedly breached a US-based organization via compromised computer systems of nearby firms, which they leveraged to authenticate to the target’s enterprise Wi-Fi network.

The repeated attacks

Volexity, a company that specializes in helping organizations detect the presence of and boot out nation-state level intruders from their systems and networks, said that the attackers were first spotted on a server on the target US organization’s network in early February 2022, when trying to exfitrate sensitive registry hives after having gained access by logging in (over RDP) with an unprivileged user account.

Their investigation revealed that prior to this, the attackers mounted password spraying attacks against the organization’s internet-facing webservices to discover valid login credentials. But, they couldn’t use them directly, because multi-factor authentication (MFA) was implemented.

“The Enterprise Wi-Fi network, however, did not require MFA and only required a user’s valid domain username and password to authenticate. Meanwhile, the threat actor was halfway around the world and could not actually connect to [the target organization’s] Enterprise Wi-Fi network,” Volexity’s Sean Koessel, Steven Adair and Tom Lancaster shared.

They solved the problem by:

  • Breaching a nearby organization’s system
  • Moving laterally within that organization to find accessible systems that are connected to the network via a wired Ethernet connection and have a Wi-Fi adapter
  • Using that Wi-Fi adapter to connect to the target organization’s Wi-Fi and authenticate to it by using credentials they previous compromised via password spraying.

That nearby organization was breached by leveraging stolen VPN credentials – they had no MFA enabled on those accounts. The attackers also used the previously described technique to jump on this second organization’s enterprise Wi-Fi from a compromised system of a third nearby organization.

And after getting booted out, the attackers returned and compromised a system connected to the targeted organization’s guest Wi-Fi network, which ended up not being completely isolated from the corporate wired network.

“Using the Nearest Neighbor Attack method, the attacker was able to daisy-chain their way from organization to organization without ever deploying malware, using only valid user credentials as their access method. The attacker then focused on using living-of-the-land techniques to avoid deploying malware and to evade detection by EDR products,” the company noted.

The group used Windows’ built-in tools like VSSAdmin, to create a volume shadow copy, and Cipher, to overwrite deleted files they have written to disk during the attack.

Orgs, secure your Wi-Fi

In 2024, after Microsoft shared information about a post-compromise tool named GooseEgg that the group had used in other attacks, Volexity was able to tie this intrusions to Forest Blizzard (aka APT28, aka GruesomeLarch).

With this clever attack method, the group was able to connect to the target organization’s enterprise Wi-Fi network without one of their members having to be physically near enough to do it.

“A significant amount of effort over the last several years has been placed on attack surface reduction where Internet-facing services have been secured with MFA or removed altogether. This attack was possible due to a lower level of security controls on targeted Wi-Fi systems than other resources, such as email or VPN,” Volexity explained.

Zeljka Zorz

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:04 pm, Feb. 2, 2025
Wetter-Symbol 3°C
L: 1° | H: 4°
broken clouds
Luftfeuchtigkeit: 88 %
Druck: 1025 mb
Wind: 3 mph SSW
Windböe: 4 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 73%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:37 am
Sonnenuntergang: 4:51 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
1° | 4°°C 0 mm 0% 3 mph 88 % 1026 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
2° | 9°°C 0 mm 0% 9 mph 89 % 1026 mb 0 mm/h
Di. Feb. 04 9:00 pm
Wetter-Symbol
7° | 11°°C 0.2 mm 20% 13 mph 89 % 1027 mb 0 mm/h
Mi. Feb. 05 9:00 pm
Wetter-Symbol
4° | 8°°C 0 mm 0% 10 mph 84 % 1045 mb 0 mm/h
Do. Feb. 06 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 8 mph 84 % 1045 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
3° | 4°°C 0 mm 0% 3 mph 88 % 1026 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 3 mph 85 % 1026 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
2° | 3°°C 0 mm 0% 4 mph 85 % 1025 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
2° | 2°°C 0 mm 0% 4 mph 85 % 1025 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 85 % 1025 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
8° | 8°°C 0 mm 0% 7 mph 80 % 1025 mb 0 mm/h
Tomorrow 3:00 pm
Wetter-Symbol
8° | 8°°C 0 mm 0% 9 mph 87 % 1024 mb 0 mm/h
Tomorrow 6:00 pm
Wetter-Symbol
9° | 9°°C 0 mm 0% 7 mph 80 % 1023 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€94,664.26
-3.45%
Ethereum(ETH)
€2,852.47
-7.44%
XRP(XRP)
€2.57
-9.10%
Fesseln(USDT)
€0.96
-0.02%
Solana(SOL)
€196.29
-8.28%
USDC(USDC)
€0.96
0.00%
Dogecoin(DOGE)
€0.264660
-12.96%
Shiba Inu(SHIB)
€0.000015
-12.44%
Pepe(PEPE)
€0.000011
-14.57%
Nach oben scrollen