Skip to content

C0029 Cutting Edge

Cutting Edge was a campaign conducted by suspected China-nexus espionage actors, variously identified as UNC5221/UTA0178 and UNC5325, that began as early as December 2023 with the exploitation of zero-day vulnerabilities in Ivanti Connect Secure (previously Pulse Secure) VPN appliances. Cutting Edge targeted the U.S. defense industrial base and multiple sectors globally including telecommunications, financial, aerospace, and technology. Cutting Edge featured the use of defense evasion and living-off-the-land (LoTL) techniques along with the deployment of web shells and other custom malware.45132

Item Value
ID C0029
Associated Names
First Seen December 2023
Last Seen February 2024
Version 1.0
Created 01 March 2024
Last Modified 28 March 2024
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1595 Active Scanning -
enterprise T1595.002 Vulnerability Scanning During Cutting Edge, threat actors used the publicly available Interactsh tool to identify Ivanti Connect Secure VPNs vulnerable to CVE-2024-21893.2
enterprise T1071 Application Layer Protocol -
enterprise T1071.004 DNS During Cutting Edge, threat actors used DNS to tunnel IPv4 C2 traffic.3
enterprise T1560 Archive Collected Data -
enterprise T1560.001 Archive via Utility During Cutting Edge, threat actors saved collected data to a tar archive.3
enterprise T1059 Command and Scripting Interpreter During Cutting Edge, threat actors used Perl scripts to enable the deployment of the THINSPOOL shell script dropper and for enumerating host data.34
enterprise T1059.006 Python During Cutting Edge, threat actors used a Python reverse shell and the PySoxy SOCKS5 proxy tool.52
enterprise T1554 Compromise Host Software Binary During Cutting Edge, threat actors trojanized legitimate files in Ivanti Connect Secure appliances with malicious code.453
enterprise T1584 Compromise Infrastructure -
enterprise T1584.008 Network Devices During Cutting Edge, threat actors used compromised and out-of-support Cyberoam VPN appliances for C2.41
enterprise T1005 Data from Local System During Cutting Edge, threat actors stole the running configuration and cache data from targeted Ivanti Connect Secure VPNs.53
enterprise T1190 Exploit Public-Facing Application During Cutting Edge, threat actors exploited CVE-2023-46805 and CVE-2024-21887 in Ivanti Connect Secure VPN appliances to enable authentication bypass and command injection. A server-side request forgery (SSRF) vulnerability, CVE-2024-21893, was identified later and used to bypass mitigations for the initial two vulnerabilities by chaining with CVE-2024-21887.45132
enterprise T1562 Impair Defenses -
enterprise T1562.001 Disable or Modify Tools During Cutting Edge, threat actors disabled logging and modified the compcheckresult.cgi component to edit the Ivanti Connect Secure built-in Integrity Checker exclusion list to evade detection.35
enterprise T1070 Indicator Removal During Cutting Edge, threat actors cleared logs to remove traces of their activity and restored compromised systems to a clean state to bypass manufacturer mitigations for CVE-2023-46805 and CVE-2024-21887.35
enterprise T1070.004 File Deletion During Cutting Edge, threat actors deleted /tmp/test1.txt on compromised Ivanti Connect Secure VPNs which was used to hold stolen configuration and cache files.32
enterprise T1070.006 Timestomp During Cutting Edge, threat actors changed timestamps of multiple files on compromised Ivanti Secure Connect VPNs to conceal malicious activity.32
enterprise T1105 Ingress Tool Transfer During Cutting Edge, threat actors leveraged exploits to download remote files to Ivanti Connect Secure VPNs.5
enterprise T1056 Input Capture -
enterprise T1056.001 Keylogging During Cutting Edge, threat actors modified a JavaScript file on the Web SSL VPN component of Ivanti Connect Secure devices to keylog credentials.5
enterprise T1056.003 Web Portal Capture During Cutting Edge, threat actors modified the JavaScript loaded by the Ivanti Connect Secure login page to capture credentials entered.5
enterprise T1095 Non-Application Layer Protocol During Cutting Edge, threat actors used the Unix socket and a reverse TCP shell for C2 communications.2
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.013 Encrypted/Encoded File During Cutting Edge, threat actors used a Base64-encoded Python script to write a patched version of the Ivanti Connect Secure dsls binary.3
enterprise T1588 Obtain Capabilities -
enterprise T1588.002 Tool During Cutting Edge, threat actors leveraged tools including Interactsh to identify vulnerable targets, PySoxy to simultaneously dispatch traffic between multiple endpoints, BusyBox to enable post exploitation activities, and Kubo Injector to inject shared objects into process memory.42
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory During Cutting Edge, threat actors used Task Manager to dump LSASS memory from Windows devices to disk.5
enterprise T1003.003 NTDS During Cutting Edge, threat actors accessed and mounted virtual hard disk backups to extract
ntds.dit.5
enterprise T1055 Process Injection During Cutting Edge, threat actors used malicious SparkGateway plugins to inject shared objects into web process memory on compromised Ivanti Secure Connect VPNs to enable deployment of backdoors.2
enterprise T1572 Protocol Tunneling During Cutting Edge, threat actors used Iodine to tunnel IPv4 traffic over DNS.3
enterprise T1021 Remote Services -
enterprise T1021.001 Remote Desktop Protocol During Cutting Edge, threat actors used RDP with compromised credentials for lateral movement.5
enterprise T1021.002 SMB/Windows Admin Shares During Cutting Edge, threat actors moved laterally using compromised credentials to connect to internal Windows systems with SMB.5
enterprise T1021.004 SSH During Cutting Edge, threat actors used SSH for lateral movement.5
enterprise T1594 Search Victim-Owned Websites During Cutting Edge, threat actors peformed reconnaissance of victims’ internal websites via proxied connections.5
enterprise T1505 Server Software Component -
enterprise T1505.003 Web Shell During Cutting Edge, threat actors used multiple web shells to maintain presence on compromised Connect Secure appliances such as WIREFIRE, GLASSTOKEN, BUSHWALK, LIGHTWIRE, and FRAMESTING.45
enterprise T1082 System Information Discovery During Cutting Edge, threat actors used the ENUM4LINUX Perl script for discovery on Windows and Samba hosts.3
enterprise T1205 Traffic Signaling During Cutting Edge, threat actors sent a magic 48-byte sequence to enable the PITSOCK backdoor to communicate via the /tmp/clientsDownload.sock socket.2
enterprise T1078 Valid Accounts -
enterprise T1078.002 Domain Accounts During Cutting Edge, threat actors used compromised VPN accounts for lateral movement on targeted networks.5

Software

ID Name Description
S1118 BUSHWALK 32

References