UNC3524

Threat Actor updated 4 months ago (2024-05-05T05:17:41.213Z)
Download STIX
Preview STIX
UNC3524, also known as Cranefly, is a newly identified threat actor suspected of espionage activities. This group primarily targets corporate emails, focusing on employees involved in corporate development, mergers and acquisitions, and large corporate transactions. UNC3524 has demonstrated serious commitment to maintaining its presence within compromised systems. The initial compromise method remains unknown; however, once access is gained, the group deploys a novel backdoor named QUIETEXIT, tracked by Mandiant. This backdoor is based on the open-source Dropbear SSH client-server software and supports full SSH functionality, which UNC3524 uses to establish a SOCKS tunnel into victim environments. The activities of UNC3524 have now been attributed to APT29. Interestingly, their use of the tool REGEORG matches identically with the version reported by the NSA as used by APT28. While APT28 utilized TOR and commercial VPNs, UNC3524 primarily exploits compromised internet-facing devices. They target opaque network appliances, often the most insecure and unmonitored systems within a victim's environment. This approach makes host-based hunting and detection extremely difficult, as UNC3524 can avoid detection by operating from compromised infrastructure connected directly to the public internet, such as IP cameras. Detection of UNC3524's activities is challenging due to their use of compromised appliances. It is believed that they exploit default credentials rather than using an exploit to compromise these devices, forming an IoT botnet. Once authenticated to the exchange infrastructure, UNC3524 extracts mail items from targeted mailboxes through EWS API requests. In each victim environment, they focus on a subset of mailboxes, particularly those belonging to executive teams, corporate development, mergers and acquisitions staff, or IT security personnel. For effective detection methods and configuration recommendations, refer to Mandiant's UNC2452 Microsoft 365 Hardening Guide.
Description last updated: 2024-05-05T04:46:11.874Z
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Backdoor
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the UNC3524 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
a year ago
Lazarus Group Targets Microsoft IIS Servers
MITRE
9 months ago
UNC3524: Eye Spy on Your Email