{"id":5506,"date":"2024-05-24T13:30:00","date_gmt":"2024-05-24T16:30:00","guid":{"rendered":"https:\/\/www.blog.lineasdns.com\/hackers-created-rogue-vms-to-evade-detection-in-recent-mitre-cyber-attack\/"},"modified":"2024-05-24T13:30:00","modified_gmt":"2024-05-24T16:30:00","slug":"hackers-created-rogue-vms-to-evade-detection-in-recent-mitre-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.blog.lineasdns.com\/en\/hackers-created-rogue-vms-to-evade-detection-in-recent-mitre-cyber-attack\/","title":{"rendered":"Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/1737162903_866_server.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the threat actor creating rogue virtual machines (VMs) within its VMware environment.<\/p>\n<p>&#8220;The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access,&#8221; MITRE researchers Lex Crumpton and Charles Clancy <a target=\"_blank\" href=\"https:\/\/medium.com\/mitre-engenuity\/infiltrating-defenses-abusing-vmware-in-mitres-cyber-intrusion-4ea647b83f5b\" rel=\"noopener\" target=\"_blank\">said<\/a>.<\/p>\n<p>&#8220;They wrote and deployed a JSP web shell (BEEFLUSH) under the vCenter Server&#8217;s Tomcat server to execute a Python-based tunneling tool, facilitating SSH connections between adversary-created VMs and the ESXi hypervisor infrastructure.&#8221;<\/p>\n<p>The motive behind such a move is to sidestep detection by obscuring their malicious activities from centralized management interfaces like vCenter and maintain persistent access while reducing the risk of being discovered.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/gartner-endpoint-protection-d-v3\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/GartnerMQ-d-v3.jpg\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>Details of the attack <a target=\"_blank\" href=\"https:\/\/thehackernews.com\/2024\/04\/mitre-corporation-breached-by-nation.html\" rel=\"noopener\" target=\"_blank\">emerged<\/a> last month when MITRE revealed that the China-nexus threat actor &#8212; tracked by Google-owned Mandiant under the name UNC5221 &#8212; breached its Networked Experimentation, Research, and Virtualization Environment (NERVE) by exploiting two ICS flaws CVE-2023-46805 and CVE-2024-21887.<\/p>\n<p>Upon bypassing multi-factor authentication and gaining an initial foothold, the adversary moved laterally across the network and leveraged a compromised administrator account to take control of the VMware infrastructure and <a target=\"_blank\" href=\"https:\/\/thehackernews.com\/2024\/05\/china-linked-hackers-used-rootrot.html\" rel=\"noopener\" target=\"_blank\">deploy various backdoors and web shells<\/a> to retain access and harvest credentials.<\/p>\n<p>This consisted of a Golang-based backdoor codenamed BRICKSTORM that was embedded within the rogue VMs and two web shells referred to as BEEFLUSH and BUSHWALK, allowing UNC5221 to execute arbitrary commands and communicate with command-and-control servers.<\/p>\n<p>&#8220;The adversary also used a default VMware account, VPXUSER, to make seven API calls that enumerated a list of mounted and unmounted drives,&#8221; MITRE said.<\/p>\n<p>&#8220;Rogue VMs operate outside the standard management processes and do not adhere to established security policies, making them difficult to detect and manage through the GUI alone. Instead, one needs special tools or techniques to identify and mitigate the risks associated with rogue VMs effectively.&#8221;<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/itdr-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/01\/1735742824_221_per-d.png\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>One effective countermeasure against threat actors&#8217; stealthy efforts to bypass detection and maintain access is to enable secure boot, which prevents unauthorized modifications by verifying the integrity of the boot process.<\/p>\n<p>The company said it&#8217;s also making available two PowerShell scripts named <a target=\"_blank\" href=\"https:\/\/github.com\/center-for-threat-informed-defense\/public-resources\/tree\/master\/nerve-incident#rogue-vm-detection-script\" rel=\"noopener\" target=\"_blank\">Invoke-HiddenVMQuery<\/a> and <a target=\"_blank\" href=\"https:\/\/github.com\/CrowdStrike\/VirtualGHOST\" rel=\"noopener\" target=\"_blank\">VirtualGHOST<\/a> to help identify and mitigate potential threats within the VMware environment.<\/p>\n<p>&#8220;As adversaries continue to evolve their tactics and techniques, it is imperative for organizations to remain vigilant and adaptive in defending against cyber threats,&#8221; MITRE said.<\/p>\n<p><\/p>\n<div class=\"cf note-b\">Found this article interesting?  Follow us on <a target=\"_blank\" href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter <i class=\"icon-font icon-twitter\">\uf099<\/i><\/a> and <a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/>\n<center><\/p>\n<p>________________________________________________<\/p>\n<p><\/center><\/p>\n<p>Here, we deliver the latest insights from the world of cybersecurity, featuring updates from industry leaders and our trusted partners. Stay ahead of emerging threats, cutting-edge solutions, and the opportunities defining the future of digital security. \ud83d\udee1\ufe0f\ud83c\udf10<\/p>\n<p>Thank you for trusting us as your guide. \ud83d\udd12 Together, we\u2019re building a safer digital world!<\/p>\n<p>\n<a href=\"https:\/\/thehackernews.com\/2024\/05\/hackers-created-rogue-vms-to-evade.html?rand=1734\">Source Link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by&hellip;","protected":false},"author":1,"featured_media":5507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[68],"tags":[84,77,70,69,71,72,73,78,74,75,80,82,81,79,76,83],"class_list":{"0":"post-5506","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacker-news","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-hacker-news","17":"tag-hacking-news","18":"tag-how-to-hack","19":"tag-information-security","20":"tag-network-security","21":"tag-ransomware-malware","22":"tag-software-vulnerability","23":"tag-the-hacker-news","24":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/5506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/comments?post=5506"}],"version-history":[{"count":0,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/5506\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media\/5507"}],"wp:attachment":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media?parent=5506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/categories?post=5506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/tags?post=5506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}