Cyber Threat Report: 'Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials'

Report Author Microsoft Threat Intelligence
Publication Date 2024-04-22
Original Reporting Source
Attributed to Nation Russia
Related Intrusion Sets Fancy Bear , APT28 , Forest Blizzard
Related Threat Actors GRU Unit 26165 , GRU - Russian Main Directorate of the General Staff
Identified CVEs CVE-2022-38028 , CVE-2023-23397
Victim Sectors Non Profit, Transportation, National Government, Education

This blog post by researchers at Microsoft Threat Intelligence outlines activity they observed by Forest Blizzard using a tool they named 'GooseEgg' to exploit CVE-2022-38028. CVE-2022-38028 is a vulnerability in Windows Print Spooler service which was exploited with GooseEgg by modifying a JavaScript constraints file and executing it with SYSTEM-level permissions. According to the post, the researchers observed Forest Blizzard using GooseEgg for post-compromise activity - it is a simple launcher application capable of spawning other applications with elevated permissions. Microsoft Threat Intelligence has observed Forest Blizzard using GooseEgg against government, NGO (non-government organisations), education and transport sectors. Forest Blizzard, referred to by other researchers as APT28, is identified as being linked to Russia's General Staff Main Intelligence Directorate (GRU). The provides some technical analysis of GooseEgg as well as recommendations for defending against GooseEgg attacks.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph