Over the past few months NCC Group has observed an increasing number of data breach extortion cases, where the attacker steals data and threatens to publish said data online if the victim decides not to pay. Given the current threat landscape, most notable is the absence of ransomware or any technical attempt at disrupting the victim’s operations.
Within the data breach extortion investigations, NCC Group has identified a cluster of activities defining a relatively constant modus operandi described in this article. NCC Group tracks this adversary as SnapMC and has not yet been able to link it to any known threat actors. The name SnapMC is derived from the actor’s rapid attacks, generally completed in under 30 minutes, and the exfiltration tool mc.exe it uses.
Extortion emails threatening their recipients have become a trend over time. The lion’s share of these consist of empty threats sent by perpetrators hoping to profit easily without investing in an actual attack. SnapMC, however, has shown itself capable of actual data breach attacks. The extortion emails NCC Group has seen from SnapMC give victims 24 hours to get in contact and 72 hours to negotiate. Even so, NCC Group has seen this actor start increasing the pressure well before countdown hits zero. SnapMC includes a list of the stolen data as evidence that they have had access to the victim’s infrastructure. If the organization does not respond or negotiate within the given timeframe, the actor threatens to (or immediately does) publish the stolen data and informs the victim’s customers and various media outlets.
At the time of writing, NCC Group’s Security Operations Centers (SOCs) have seen SnapMC scanning for multiple vulnerabilities in both webserver applications and VPN solutions. NCC Group has observed this actor successfully exploiting and stealing data from servers that were vulnerable to remote code execution in Telerik UI for ASPX.NET, as well as SQL injections.
After successfully exploiting a webserver application, the actor executes a payload to gain remote access through a reverse shell. Based on the observed payloads and characteristics, the actor appears to use a publicly available Proof-of-Concept Telerik Exploit.
Directly afterwards, PowerShell is started to perform some standard reconnaissance activity. Observed commands include: whoami; whoami /priv; wmic logicaldisk get caption,description,providername; and net users /priv.
Note that in the last command the adversary used the /priv option, which is not a valid option for the net users command.
In most of the cases, NCC Group analyzed that the threat actor did not perform privilege escalation. However, in one case, it did observe SnapMC trying to escalate privileges by running a handful of PowerShell scripts: Invoke-Nightmare; Invoke-JuicyPotato; Invoke-ServiceAbuse; Invoke-EventVwrBypass; and Invoke-PrivescAudit.
NCC Group observed the actor preparing for exfiltration by retrieving various tools to support data collection, such as 7zip and Invoke-SQLcmd scripts. Those, and artifacts related to the execution or usage of these tools, were stored in the following folders: C:WindowsTemp; C:WindowsTempAzure; and C:WindowsTempVmware.
SnapMC used the Invoke-SQLcmd PowerShell script to communicate with the SQL database and export data. The actor stored the exported data locally in CSV files and compressed those files with the 7zip archive utility.
The actor used the MinIO client to exfiltrate the data. Using the PowerShell commandline, the actor configured the exfil location and key to use, which were stored in a config.json file. During the exfiltration, MinIO creates a temporary file in the working directory with the file extension […].par.minio.
First, initial access was generally achieved through known vulnerabilities, for which patches exist. Patching in a timely manner and keeping (internet connected) devices up-to-date is the most effective way to prevent falling victim to these types of attacks. Make sure to identify where vulnerable software resides within your network by (regularly performing) vulnerability scanning.
Furthermore, third parties supplying software packages can make use of the vulnerable software as a component as well, leaving the vulnerability outside of your direct reach. Therefore, it is important to have an unambiguous mutual understanding and clearly defined agreements between your organization and software suppliers about patch management and retention policies. The latter also applies to a possible obligation to have your supplier provide you with systems for forensic and root cause analysis in case of an incident.
It’s worth mentioning that, when reference-testing the exploitability of specific versions of Telerik, it became clear that when the software component resided behind a well-configured Web Application Firewall (WAF), the exploit would be unsuccessful. Finally, having properly implemented detection and incident response mechanisms and processes seriously increases the chance of successfully mitigating severe impact on your organization. Timely detection and efficient response will reduce the damage even before it materializes.
NCC Group’s Threat Intelligence team predicts that data breach extortion attacks will increase over time, as it takes less time and technical in-depth knowledge or skill in comparison to a full-blown ransomware attack. In a ransomware attack, the adversary needs to achieve persistence and become domain administrator before stealing data and deploying ransomware. In the data breach extortion attacks, most of the activity could be automated and takes less time while still having a significant impact. Therefore, making sure you are able to detect such attacks, in combination with having an incident response plan ready to execute at short notice, is vital to efficiently and effectively mitigate the threat SnapMC poses to your organization.
This story originally appeared on Research.nccgroup.com. Copyright 2021
VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact.
Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:
- up-to-date information on the subjects of interest to you
- our newsletters
- gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
- networking features, and more
Become a member