Cyber Threat Report: 'Connect:fun Detailing an exploitation campaign targeting FortiClient EMS via CVE-2023-48788'

Report Author ForeScout - Vedere Labs
Publication Date 2024-04-11
Original Reporting Source
Identified CVEs CVE-2023-48788
Victim Sectors Media

This report from Vedere Labs at Forescout Research details an exploitation campaign which they have designated Connect:fun. The attacks exploit CVE-2023-48788 in Fortinet’s FortiClient EMS before using ScreenConnect and Powerfun tools for post-exploitation activities. The report discusses a specific incident at a media company targeted by the attack. Although the report doesn't name a specific threat actor or intrusion set, the researchers suggest that the actor behind the attack has been active since 2022 and uses Vietnamese and German languages in their infrastructure.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1059.003 Windows Command Shell Execution
T1105 Ingress Tool Transfer Command and Control
T1027 Obfuscated Files or Information Defense Evasion
T1190 Exploit Public-Facing Application Initial Access
T1059.001 PowerShell Execution
T1133 External Remote Services Initial Access, Persistence
T1218.007 Msiexec Defense Evasion
T1219 Remote Access Software Command and Control