Author:
Kaustubh Jagtap, Product Marketing Director, SafeBreach
On November 21st, the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) released an advisory highlighting the ongoing exploit of the Citrix Bleed Vulnerability (CVE-2023-4966) by Lockbit 3.0 affiliates. This vulnerability affects Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances. Detailed information is listed in US-CERT Alert AA23-325A – #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability.
According to the advisory, Boeing observed LockBit 3.0 threat actors actively exploiting CVE-2023-4966 to gain access to Boeing Distribution Inc. – a subsidiary of Boeing that is hosted in a separate network environment from the parent Boeing company. Based on previously available information, LockBit 3.0 affiliates have targeted organizations of various sizes across several critical infrastructure verticals including, education, energy, financial services, food and agriculture, government and emergency services, healthcare, manufacturing, and transportation. As LockBit 3.0 affiliates are free to choose from a wide variety of available TTPs, attacks across organizations may vary in style.
By exploiting the Citrix Bleed vulnerability, LockBit 3.0 threat actors can bypass password requirements and multifactor authentication (MFA), allowing them to get access to active user sessions on Citrix NetScaler web application delivery control (ADC) and Gateway appliances. By performing a legitimate hijack of active user sessions, they can easily elevate their permissions, and move laterally to access available data and resources. Below are some of the technical details made available in the advisory.
The CVE-2023-4966 Vulnerability – This vulnerability was first identified in August 2023 and allows threat actors to bypass MFA and gain access to active user sessions. They gain this access by sending an HTTP GET request to the affected appliance allowing them to get a valid NetScaler AAA session cookie. After receiving this valid session cookie, they proceed by creating an authenticated session within the NetScaler appliance without a username, password, or access to MFA tokens. This vulnerability is known to affect the following software versions:
Related Threat Actor Activity – Malware identified in this campaign is generated beginning with the execution of a PowerShell script (123.ps1) which concatenates two base64 strings together, converts them to bytes, and writes them to the designated file path. The resulting file (adobelib.dll) is then executed by the PowerShell script using rundll32. Following the execution, the DLL attempts to send a POST request to https://adobe-us-updatefiles[.]digital/index.php which resolves to IP addresses 172.67.129[.]176 and 104.21.1[.]180 Although adobelib.dll and adobe-us-updatefiles[.]digital have the appearance of legitimacy, the file and domain have no association with legitimate Adobe software and no identified interaction with the software.
Additionally, other observed activities include the use of a variety of TTPs commonly associated with ransomware activity. LockBit 3.0 affiliates have been observed using AnyDesk and Splashtop remote management and monitoring (RMM), Batch and PowerShell scripts, the execution of HTA files using the Windows native utility mshta.exe and other common software tools typically associated with ransomware incidents.
Important Note for SafeBreach Customers – Coverage for AA23-325A (Citrix Bleed Vulnerability)
As soon as details were made available, the SafeBreach Labs teams mapped existing attacks and added new attacks to the Hacker’s Playbook immediately. It is important to note that existing SafeBreach customers already had a wide amount of coverage against the IOCs and TTPs being leveraged by the LockBit 3.0 threat actors. Please run/ re-run the attacks listed below to ensure your environments are protected against this malware variant.
NEW Behavioral Attacks Related to LockBit 3.0 Ransomware
NEW IOC-Based Attacks
NEW Vulnerability Exploitation Attack
Existing IOC-Based Attacks Related to LockBit 3.0 Ransomware
What You Should Do Now
The playbook has been updated with new attacks that map to the IOCs identified in this US-CERT Alert. SafeBreach customers can now validate their security controls against these TTPs and IOCs in multiple ways.
Method 1 – You can go to the “SafeBreach Scenarios” page and choose the AA23-325A (LockBit 3.0 Ransomware) scenario from the list of available scenarios.
Method 2 – From the Attack Playbook, select and filter attacks related to US-CERT Alert AA23-325A. Additionally, you can refer to the list above as well to ensure a comprehensive level of coverage.
Method 3 – From the Known Attack Series report, select the AA23-325A (LockBit 3.0 Ransomware) report and select Run Simulations which will run all attack methods.
NOTE: CISA recommends continually validating your security program, at scale, in a production environment to ensure optimal performance against the growing threat of advanced cyber threats. Additional recommendations include: