Cyber Threat Report: 'Cloaked and Covert: Uncovering UNC3886 Espionage Operations'

Report Author Mandiant
Publication Date 2024-06-18
Original Reporting Source
Attributed to Nation China
Related Intrusion Sets UNC3886
Identified CVEs CVE-2023-34048 , CVE-2022-22948 , CVE-2023-20867 , CVE-2022-41328 , CVE-2022-42475
Victim Sectors Aerospace, Defense, Telecommunications, Energy, Utilities, National Government, Technology

This article by researchers from Google's Mandiant outlines intrusion activity by UNC3886, a suspected China-nexus cyber espionage group. The group has been observed targeting strategic organizations worldwide by exploiting vulnerabilities in Fortinet and VMware technologies. The group employs sophisticated techniques, including custom malware like REPTILE and MEDUSA rootkits, to maintain persistent access and evade detection. Their operations are characterized by advanced persistence mechanisms that allow them to remain undetected for extended periods. One of the key tactics used by UNC3886 is credential harvesting through backdoored SSH clients and daemons. This method enables the group to collect SSH credentials, facilitating lateral movement within compromised networks. By gaining access to these credentials, UNC3886 can move freely within the network, increasing the scope and impact of their espionage activities. This approach highlights the group's technical capabilities and their focus on maintaining long-term access to targeted systems. UNC3886 has also been seen targeting TACACS+ servers and using tools like LOOKOVER to extend their access to network appliances. These attacks indicate a potential for broader supply chain compromises, leveraging access to network infrastructure used to administer other networks under management of the original victim.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1014 Rootkit Defense Evasion
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1003 OS Credential Dumping Credential Access
T1071 Application Layer Protocol Command and Control