ATI Update ATI-2022-26

New Protocols & Applications (2)

Name Category Info
DuckDuckGo Dec22 Social Networking/Search DuckDuckGo (DDG) is an internet search engine that emphasizes protecting searchers' privacy and avoiding personalized search results.
Mastodon Dec22 Social Networking/Search Mastodon is a free and open-source software for running self-hosted social networking services. It has microblogging features similar to the Twitter service, which are offered by a large number of independently run nodes, each with its own code of conduct and moderation policies.

New Superflows (7)

Name Category Tags
DuckDuckGo Dec22 Social Networking/Search HTTP/2 Simulates the use of the DuckDuckGo application as of December 2022 where a user opens the homepage, initiates a search, and then browses the image and news results.
DuckDuckGo Dec22 Get Images Social Networking/Search HTTP/2 Simulates the use of the DuckDuckGo application as of December 2022 where a user opens the homepage, initiates a search, and then browses the image results.
DuckDuckGo Dec22 Bandwidth Social Networking/Search HTTP/2 Simulates the use of the DuckDuckGo application as of December 2022 where a user initiates a search, and then browses the image and news results.
Mastodon Dec22 Social Networking/Search HTTP/2 Simulates the use of Mastodon instance mastodon.sdf.org, where the user gets the log in page, logs in, publishes a post, reposts and favourites another user's post before sending a direct message to a user.
Mastodon Dec22 Login Social Networking/Search HTTP/2 Simulates the use of Mastodon instance mastodon.sdf.org, where the user gets the log in page and logs in.
Mastodon Dec22 Bandwidth Social Networking/Search HTTP/2 Simulates the use of Mastodon instance mastodon.sdf.org, where the user publishes a post, reposts and favourites another user's post before sending a direct message to a user.
Mastodon Dec22 Send Direct Message Social Networking/Search HTTP/2 Simulates the use of Mastodon instance mastodon.sdf.org, where the user gets the log in page and logs in before sending a direct message to another user.

New Security Tests (1)

Name Info
CryptoLocker Ransomware Dec 2022 Campaign This strike list contains 2 strikes simulating the 'CryptoLocker Dec 2022 Campaign'.

1. The first strike simulates the download and initial infection of the 'CryptoLocker Ransomware Dec 2022 Campaign - Malware File Transfer' malware via a file transfer.
2. The second strike simulates the 'CryptoLocker Ransomware Dec 2022 Campaign - CryptoLocker Command and Control' traffic that occurs after executing the malware. After the ransomware has enabled persistence on the host, it begins communicating with the external C2 servers. This strike sends encrypted phone-home HTTP POST requests to the attacker controlled Command and Control Servers. This communication will retrieve the RSA public key which will then be used throughout the encryption process to encrypt all of the files on the victim's machine.

It contains the following sequence of strikes:
1) /strikes/malware/apt/cryptolocker_dec_2022_campaign/malware_04fb36199787f2e3e2135611a38321eb.xml
2) /strikes/botnets/apt/cryptolocker_dec_2022_campaign/cryptolocker_dec_2022_campaign_command_control.xml

# Strike ID Name Description
1 C22-M1p61 CryptoLocker Ransomware Dec 2022 Campaign - Malware File Transfer This strike simulates the download and initial infection of the 'CryptoLocker Ransomware Dec 2022 Campaign - Malware File Transfer' malware via a file transfer. The CryptoLocker Ransomware has been around since 2013, and has recently been seen in the wild. Once the host has been infected, the malware ensures it will persist upon a reboot, and then attempts to send encrypted phone-home HTTP GET requests to the attacker controlled Command and Control Servers. This communication will retrieve the RSA public key which will then be used throughout the encryption process to encrypt all of the files on the victim's machine.
2 C22-B0661 CryptoLocker Ransomware Dec 2022 Campaign - CryptoLocker Command and Control This strike simulates the 'CryptoLocker Ransomware Dec 2022 Campaign - CryptoLocker Command and Control' traffic that occurs after executing the malware. After the ransomware has enabled persistence on the host, it begins communicating with the external C2 servers. This strike sends encrypted phone-home HTTP POST requests to the attacker controlled Command and Control Servers. This communication will retrieve the RSA public key which will then be used throughout the encryption process to encrypt all of the files on the victim's machine.

New Strikes (5)

CVSS ID References Category Info
9.3 E22-ebgz1 CVE-2022-21971CVSSCVSSv3CWE-119URL Exploits This strike exploits a remote code execution vulnerability in Microsoft Windows. The vulnerability is due to memory corruption issue that occurs due to deallocation attempt of uninitialized pointer. An attacker can execute code by enticing an user to click on a malicious RTF file leveraging this vulnerability.
9.0 E22-epws1 CVE-2022-40684CVSSCVSSv3CWE-288URL Exploits This strike exploits an Authentication Bypass vulnerability in multiple Fortinet products, including FortiOS, FortiProxy, and FortiSwitchManager. The vulnerability is due to errors in handling certain HTTP headers in user requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result an attacker bypassing authentication and executing commands as an admin user on the target system.
7.2 E22-ebeh1 CVE-2022-21881CVSSCVSSv3CWE-269URLURL Exploits This strike exploits a privilege escalation vulnerability in Microsoft Windows Kernel. The vulnerability is due to use-after-free caused by a race condition. A remote attacker can exploit this vulnerability by enticing a user to open a maliciously crafted PE file. Successful exploitation might result in code execution in the context of another user. Note: The file transferred in this strike crashes the kernel.
7.2 E22-ec1n1 CVE-2022-22715CVSSCVSSv3CWE-269URLURL Exploits This strike exploits a sandbox escape vulnerability in Windows. The vulnerability is due to improper privilege management. A local attacker confined in a sandbox environment can exploit this vulnerability by executing the malicious program to escape the sandbox environment and further escalate the privileges.
6.5 E22-ehu01 CVE-2022-30216CVSSCVSSv3CWE-434URLURL Exploits This strike exploits the vulnerability targeting Server Service in Microsoft Windows. The vulnerability is due to an off-by-one check. A remote authenticated attacker can exploit this vulnerability by sending crafted DCERPC packets and might result in certificate tampering or be used as part of a NTLM replay attack.

Defects Resolved

Component Info
Apps The number of application transactions in "FW - Small Images" superflow has been fixed.
Security Strike E22-eg2c1 has had 3 of its four variants removed to more appropriately reflect the description of the vulnerability's attack vector.

Enhancements

Component Info
Security Campaign related strikes have had their Strike IDs changed to a new format. From now on, all Campaign related strikes (except phishing**), will start with the letter 'C' to more easily distinguish them from our other malware content. To function properly, Campaign related strikes need to be run with the Security Component. To ensure this, all Campaign strikes have been removed from Live Malware smart strike lists, so that the strikes in that strike list may be run with either the Malware or Security components.
**Phishing strikes (even if tied to a campaign) can be run individually.