Threats Feed|TunnelVision|Last Updated 25/07/2024|AuthorCertfa Radar|Publish Date09/03/2022

TunnelVision Threat Actor Exploits Log4Shell Vulnerability in VMware Horizon Servers

  • Actor Motivations: Exfiltration
  • Attack Vectors: Vulnerability Exploitation,Zero-Day Attack,Malware
  • Attack Complexity: Very High
  • Threat Risk: High Impact/Low Probability

Threat Overview

In early February 2022, the TunnelVision threat actor exploited a vulnerable VMware Horizon server using the Log4Shell vulnerability (CVE-2021-44228) to gain unauthorized access. The attack involved suspicious account creation, credential harvesting, and lateral movement using PSexec and RDP. The adversaries also harvested credentials using Procdump and downloaded Sysinternals and SSH tools. The intrusion was attributed to the Iranian-aligned TunnelVision activity cluster, based on observed TTPs and artifacts. The targeted sectors and countries are not specified in the report.

Extracted IOCs

  • activate-microsoft[.]cf
  • microsoft-updateserver[.]cf
  • 142[.]44.135.86
download

Tip: 3 related IOCs (1 IP, 2 domain, 0 URL, 0 email, 0 file hash) to this threat have been found.

Overlaps

Cobalt MirageDrokbk Malware: A Tool for COBALT MIRAGE's Cyber Arsenal

Source: Secureworks - December 2022

Detection (one case): activate-microsoft[.]cf

PhosphorusStealth in the System: PHOSPHORUS Exploits Exchange Server in Infrastructure Sector Attack

Source: Deep Instinct - June 2022

Detection (one case): microsoft-updateserver[.]cf

Cobalt MirageCOBALT MIRAGE's Exploits: Targeting Israeli and Western Organizations

Source: Secureworks - May 2022

Detection (one case): microsoft-updateserver[.]cf

TunnelVisionTunnelVision Exploits 1-Day Vulnerabilities to Unleash Ransomware

Source: SentinelLabs - February 2022

Detection (one case): 142[.]44.135.86

Hint: Overlaps are extracted automatically by examining the IOCs associated with all indexed threats and actors.

About Affiliation
TunnelVision