Cyber Threat Report: 'ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices'

Report Author Cisco Talos
Publication Date 2024-04-24
Original Reporting Source
Related Intrusion Sets STORM-1849 , UAT4356
Identified CVEs CVE-2024-20359 , CVE-2024-20353
Victim Sectors National Government, Ministries of Foreign Affairs

This blog post from Cisco Talos discusses ArcaneDoor, an espionage-focused campaign targeting perimeter network devices, which are crucial for data transfer in and out of networks. Talos identify the associated intrusion set as UAT4356, a sophisticated state-sponsored actor who has targeted government networks globally as part of the campaign. Two critical vulnerabilities in Cisco ASA devices, CVE-2024-20353 and CVE-2024-20359, were exploited as zero days by the campaign and patches have no been released to address them. The actors deployed advanced custom malware: Line Dancer and Line Runner. Line Dancer is described as an in-memory only implant which enables adversaries to upload and execute arbitrary shellcode whilst Line Runner is more a persistent backdoor. The post provides recommendations for identifying potential compromises as well as outlining indicators of compromise (IoCs) which they associate with the group.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques