Cyber Threat Report: 'ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices'

Report Author Cisco Talos
Publication Date 2024-04-24
Original Reporting Source
Related Intrusion Sets STORM-1849 , UAT4356
Identified CVEs CVE-2024-20353 , CVE-2024-20359
Victim Sectors Ministries of Foreign Affairs, National Government

This blog post from Cisco Talos discusses ArcaneDoor, an espionage-focused campaign targeting perimeter network devices, which are crucial for data transfer in and out of networks. Talos identify the associated intrusion set as UAT4356, a sophisticated state-sponsored actor who has targeted government networks globally as part of the campaign. Two critical vulnerabilities in Cisco ASA devices, CVE-2024-20353 and CVE-2024-20359, were exploited as zero days by the campaign and patches have no been released to address them. The actors deployed advanced custom malware: Line Dancer and Line Runner. Line Dancer is described as an in-memory only implant which enables adversaries to upload and execute arbitrary shellcode whilst Line Runner is more a persistent backdoor. The post provides recommendations for identifying potential compromises as well as outlining indicators of compromise (IoCs) which they associate with the group.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1055 Process Injection Defense Evasion, Privilege Escalation
T1562 Impair Defenses Defense Evasion
T1102 Web Service Command and Control
T1557 Adversary-in-the-Middle Collection, Credential Access
T1653 Power Settings Persistence
T1140 Deobfuscate/Decode Files or Information Defense Evasion
T1040 Network Sniffing Credential Access, Discovery
T1037 Boot or Logon Initialization Scripts Persistence, Privilege Escalation
T1059 Command and Scripting Interpreter Execution
T1041 Exfiltration Over C2 Channel Exfiltration
T1070 Indicator Removal Defense Evasion
T1556 Modify Authentication Process Credential Access, Defense Evasion, Persistence
T1071 Application Layer Protocol Command and Control