Cyber Threat Report: 'Cloaked and Covert: Uncovering UNC3886 Espionage Operations'
Report Author | Mandiant |
---|---|
Publication Date | 2024-06-18 |
Original Reporting | Source |
Attributed to Nation | China |
Related Intrusion Sets | UNC3886 |
Identified CVEs | CVE-2023-34048 , CVE-2022-22948 , CVE-2023-20867 , CVE-2022-41328 , CVE-2022-42475 |
Victim Sectors | Aerospace, Defense, Telecommunications, Energy, Utilities, National Government, Technology |
This article by researchers from Google's Mandiant outlines intrusion activity by UNC3886, a suspected China-nexus cyber espionage group. The group has been observed targeting strategic organizations worldwide by exploiting vulnerabilities in Fortinet and VMware technologies. The group employs sophisticated techniques, including custom malware like REPTILE and MEDUSA rootkits, to maintain persistent access and evade detection. Their operations are characterized by advanced persistence mechanisms that allow them to remain undetected for extended periods. One of the key tactics used by UNC3886 is credential harvesting through backdoored SSH clients and daemons. This method enables the group to collect SSH credentials, facilitating lateral movement within compromised networks. By gaining access to these credentials, UNC3886 can move freely within the network, increasing the scope and impact of their espionage activities. This approach highlights the group's technical capabilities and their focus on maintaining long-term access to targeted systems. UNC3886 has also been seen targeting TACACS+ servers and using tools like LOOKOVER to extend their access to network appliances. These attacks indicate a potential for broader supply chain compromises, leveraging access to network infrastructure used to administer other networks under management of the original victim.
Cyber Threat Graph Context
Explore how this report relates to the wider threat graph