Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather than Skill — Intelligence for Vulnerability Management, Part One

Read the original article: Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather
than Skill — Intelligence for Vulnerability Management, Part One


One of the critical strategic and tactical roles that cyber threat
intelligence (CTI) plays is in the tracking, analysis, and
prioritization of software vulnerabilities that could potentially
put an organization’s data, employees and customers at risk. In this
four-part blog series, FireEye
Mandiant Threat Intelligence
highlights the value of CTI in
enabling vulnerability management, and unveils new research into the
latest threats, trends and recommendations.

FireEye Mandiant Threat Intelligence documented more zero-days
exploited in 2019 than any of the previous three years. While not
every instance of zero-day exploitation can be attributed to a tracked
group, we noted that a wider range of tracked actors appear to have
gained access to these capabilities. Furthermore, we noted a
significant increase over time in the number of zero-days leveraged by
groups suspected to be customers of companies that supply offensive
cyber capabilities, as well as an increase in zero-days used against
targets in the Middle East, and/or by groups with suspected ties to
this region. Going forward, we are likely to see a greater variety of
actors using zero-days, especially as private vendors continue feeding
the demand for offensive cyber weapons.

Zero-Day Usage by Country and Group

Since late 2017, FireEye Mandiant Threat Intelligence noted a
significant increase in the number of zero-days leveraged by groups
that are known or suspected to be customers of private companies that
supply offensive cyber tools and services. Additionally, we observed
an increase in zero-days leveraged against targets in the Middle East,
and/or by groups with suspected ties to this region.

Examples include:

  • A group described by researchers as Stealth
    Falcon
     and FruityArmor is
    an espionage group that has reportedly targeted
    journalists and activists in the Middle East
    . In 2016, this
    group used malware sold by NSO group, which leveraged three iOS
    zero-days. From 2016 to 2019, this group used more zero-days than
    any other group.
  • The activity dubbed SandCat in open
    sources, suspected to be linked to Uzbekistan
    state intelligence
    , has been observed using zero-days in
    operations against targets in the Middle East. This group may have
    acquired their zero-days by purchasing malware from private
    companies such as NSO group, as the zero-days used in SandCat
    operations were also used in Stealth Falcon operations, and it is
    unlikely that these distinct activity sets independently discovered
    the same three zero-days.
  • Throughout 2016 and 2017,
    activity referred to in open sources as BlackOasis,
    which also primarily targets entities in the Middle East and likely
    acquired at least one zero-day in the past from private
    company Gamma Group
    , demonstrated similarly frequent access to
    zero-day vulnerabilities.

We also noted examples of zero-day exploitation that have not been
attributed to tracked groups but that appear to have been leveraged in
tools provided by private offensive security companies, for instance:

  • In 2019, a zero-day exploit in WhatsApp (CVE-2019-3568) was reportedly
    used to distribute spyware
    developed by NSO group, an Israeli
    software company.
  • FireEye analyzed activity targeting a
    Russian healthcare organization that leveraged a 2018 Adobe Flash
    zero-day (CVE-2018-15982) that may be linked to leaked source code
    of Hacking Team.
  • Android zero-day vulnerability
    CVE-2019-2215 was reportedly
    being exploited in the wild
    in October 2019 by NSO Group
    tools.

Zero-Day Exploitation by Major Cyber Powers

We have continued to see exploitation of zero days by espionage
groups of major cyber powers.

  • According to researchers, the Chinese espionage group APT3
    exploited CVE-2019-0703 in targeted
    attacks in 2016
    .
  • FireEye observed North Korean group
    APT37 conduct a 2017 campaign that leveraged Adobe Flash
    vulnerability CVE-2018-4878. This group has also demonstrated an
    increased capacity to quickly exploit vulnerabilities shortly after
    they have been disclosed.
  • From December 2017 to January
    2018, we observed multiple Chinese groups leveraging CVE-2018-0802
    in a campaign targeting multiple industries throughout Europe,
    Russia, Southeast Asia, and Taiwan. At least three out of six
    samples were used before the patch for this vulnerability was
    issued.
  • In 2017, Russian groups APT28
    and Turla leveraged multiple zero-days
    in Microsoft Office
    products. 

In addition, we believe that some of the most dangerous state
sponsored intrusion sets are increasingly demonstrating the ability to
quickly exploit vulnerabilities that have been made public. In
multiple cases, groups linked to these countries have been able to
weaponize vulnerabilities and incorporate them into their operations,
aiming to take advantage of the window between disclosure and patch application. 

Zero-Day Use by Financially Motivated Actors

Financially motivated groups have and continue to leverage
zero-days in their operations
, though with less frequency than
espionage groups.

In May 2019, we reported that FIN6 used a Windows server 2019
use-after-free zero-day (CVE-2019-0859) in a targeted intrusion in
February 2019. Some evidence suggests that the group may have used the
exploit since August 2018. While open sources have suggested that the
group potentially acquired the zero-day from criminal underground
actor "BuggiCorp,"
we have not identified direct evidence linking this actor to this
exploit’s development or sale.

Conclusion

We surmise that access to zero-day capabilities is becoming
increasingly commodified based on the proportion of zero-days
exploited in the wild by suspected customers of private companies.
Possible reasons for this include:

  • Private companies are likely creating and supplying a larger
    proportion of zero-days than they have in the past, resulting in a
    concentration of zero-day capabilities among highly resourced
    groups.
  • Private companies may be increasingly providing
    offensive capabilities to groups with lower overall capability
    and/or groups with less concern for operational security, which
    makes it more likely that usage of zero-days will be observed.

It is likely that state groups will continue to support internal
exploit discovery and development; however, the availability of
zero-days through private companies may offer a more attractive option
than relying on domestic solutions or underground markets. As a
result, we expect that the number of adversaries demonstrating access
to these kinds of vulnerabilities will almost certainly increase and
will do so at a faster rate than the growth of their overall offensive
cyber capabilities—provided they have the ability and will to spend
the necessary funds.

Register today to hear FireEye Mandiant Threat Intelligence experts
discuss the latest in vulnerability
threats, trends and recommendations
in our upcoming April 30 webinar. 

Sourcing Note: Some vulnerabilities and zero-days were identified
based on FireEye research, Mandiant breach investigation findings,
and other technical collections. This paper also references
vulnerabilities and zero-days discussed in open sources including 

Google
Project Zero’s zero-day "In the Wild" Spreadsheet

. While we believe these sources are reliable as used in this
paper, we do not vouch for the complete findings of those sources.
Due to the ongoing discovery of past incidents, we expect that this
research will remain dynamic.


Read the original article: Zero-Day Exploitation Increasingly Demonstrates Access to Money, Rather
than Skill — Intelligence for Vulnerability Management, Part One