Category: Adversarial Intelligence | Threat Type: Threat Actor Services | Motivation: Financial | Region: Global | Source*: D4 |
---|
Executive Summary
THREAT | IMPACT | MITIGATION |
---|---|---|
|
|
|

Analysis and Attribution
Information from Cybercrime Forum
- On 07 May 2022, a threat actor published a post on a cybercrime forum describing the story of breaching a big company by exploiting a vulnerability in the Jenkins dashboard.
- It is interesting to note that the same threat actor was previously seen offering access to IBM.
- The actor has also proved a sample screenshot as a proof of their claimed access to a Jenkins dashboard.

TTPs (Tactics, Techniques, and Procedures)
- The threat actor encountered a Jenkins dashboard bypass which contained internal hosts and scripts along with database credentials and logins.
- The actor used search engines like Shodan to target port 9443 of the compromised company’s public asset.
- After getting the results, the actor used a private script for fuzzing to get vulnerable instances to exploit rproxy misconfiguration bypass.
- In their subsequent posts, the actor also mentioned the following exploit story about gaining access to the Stanford University:
- The actor used the Sudomy tool to enumerate all the subdomains related to the University.
- The actor then used httpx to provided the domains with a path such as -path /wp-content/plugins/.
- A vulnerable zero-day exploit on the above plugin returns data from all the subdomains that have a valid path with the zero-day, which then allows an attacker to execute RCE on it.
The Threat Actor
- The actor has been actively posting about different exploits and accesses on the cybercrime forum. Few of the entities targeted by them include:
- Network access to IBM Tech Company, including internal administrators scripts and firewall configurations for internal network. It contained the following information:
- Active Directory Users’ data
- SMTP login credentials
- RDP internal login credentials
- Access to two databases
- AWS RDS-based database
- 1 Log4j dashboard access
- 1 RCE dashboard access
- 1 WordPress dashboard access.
- Jozef Safarik University, Slovakia.
- Government accesses of the domains are from multiple countries including:
- Ukraine
- United Arab Emirates
- Pakistan
- Nepal
- Bhutan
- Kenya
- Srilanka
- Indonesia
Source Rating
- The actor is quite active on the cybercrime forum.
- The posts shared by the actor could be possibly true, but there is no proof of the exploits.
- The reliability of the actor can be rated Not usually reliable (D).
- The credibility of the advertisement can be rated Doubtful (4).
- Giving overall source credibility of D4.
Impact & Mitigation
Impact | Mitigation |
---|---|
|
|
References
Appendix
