Category: Adversary Intelligence | Industry: IT & Technology | Motivation: Financial | Region: USA/North America | Source: A1
Executive Summary
On 12 September 2024, CloudSEK's XVigil platform discovered a threat actor named “Fortibitch” leaking 440GB of data allegedly exfiltrated from Fortinet's SharePoint repository. The actor attempted to extort the company but, after unsuccessful negotiations, released the data. is highly unlikely that a ransomware was used in the breach. "Fortibitch" referenced the Ukrainian hacking group DC8044, though no direct connection is established between them. Based on available information, it is believed with medium confidence that the threat actor is based in Ukraine.
This blog is now updated after analyzing the leaked data for impact, please refer to the Analysis section
Analysis and Attribution
Information from the Post
- On 12 SEPTEMBER 2024, CloudSEK’s contextual AI digital risk platform XVigil discovered a threat actor with the moniker “Fortibitch” that leaked 440GB of data allegedly harvested from Fortigate’s Sharepoint repository.
- The actor mentioned in the post that they have attempted negotiating with the leadership of the affected company, with no success. As a part of their extortion strategy, they have now leaked the data exfiltrated from Fortinet. The threat actor mentions the two acquisitions by Fortinet; Next DLP and Lacework, that are operating in the Data loss prevention and Cloud Security sectors respectively.
- It is unclear if Fortinet servers got infected by ransomware or not, given that the threat actor who posted the data did not mention the use of ransomware.
- The threat actor has mentioned a few groups in the thread, the most interesting of them being DC8044, which is a local hacking group based out of Ukraine. The threat actor “Fortibitch” has collaborated with DC8044 in the past. DC8044 Socials:some text
- https://x.com/dc8044_cr3w
- https://t.me/DC8044
- There are no direct links between “Fortibitch” and DC8044, but the tone suggests a history between the two. Based on the available information, we can ascertain with medium confidence that the threat actor is based out of Ukraine.
- There’s a fair amount of chances that the data obtained from Fortinet was not critical in nature. If it was, the threat actor would have tried to sell the data off to interested buyers. However, we did not notice any sales threads related to the same. Our investigation is ongoing.
- The leaked data includes Employee resources, finance documents, HR documents from India, product offering, US sales, professional services and marketing documents, as well as customer information. The sensitivity and contents of the data indicates that this was indeed exfiltrated from a sharepoint server belonging to Fortinet.
Here’s a detailed overview on the type of data that can be accessed:
- EDR Alerts and Dashboard Information: Internal alerts related to various environments, hosted on a locally accessible dashboard tied to enSilo. In the hands of an attacker, this information provides visibility into the organization’s internal threat detection and response, potentially allowing them to understand weaknesses and bypass defenses.
- Anti-Phishing Council Details: Information about the members and rules of a cybersecurity initiative. This could be exploited to target individuals involved in anti-phishing efforts.
- Client Signed NDAs and Agreements: Confidential client contracts and agreements. An attacker could use this sensitive legal and business information for extortion, fraud, or reputaton damage.
- Packet Captures: Network packet captures from internal environments. These could allow attackers to analyze traffic, identify vulnerabilities, and launch targeted attacks based on network data.
- Network Diagrams and Configurations: Detailed network topology diagrams, firewall configurations, logs, and backups. This data offers insight into network architecture and security settings, making it easier for attackers to identify entry points, misconfigurations, and plan lateral movement.
- RCA (Root Cause Analysis) and Incident Reports: Detailed post-incident reports that outline vulnerabilities and security incidents. Attackers could leverage this information to exploit known weaknesses or re-target specific vulnerabilities that have not been fully mitigated.
- Internal Email Dumps: Access to internal emails. These could provide attackers with sensitive communications, giving insight into internal operations, potential spear-phishing opportunities, and additional entry points for further compromise
Threat Actor Activity and Rating
References
Appendix