Security

China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

No word on when or if the issue will be fixed


Chinese government-linked snoops are exploiting a zero-day bug in Fortinet's Windows VPN client to steal credentials and other information, according to memory forensics outfit Volexity.

The Volexity threat intelligence team reported the zero-day vulnerability to Fortinet on July 18 after identifying its exploitation in the wild. Fortinet acknowledged the issue on July 24, according to a November 15 report by the vendor’s Callum Roxan, Charlie Gardner, and Paul Rascagneres.

"At the time of writing, this issue remains unresolved and Volexity is not aware of an assigned CVE number," the trio wrote.

Fortinet did not respond to The Register's inquiries regarding a fix for the flaw and whether the vendor is aware of anyone exploiting the vulnerability. We will update this story if Fortinet replies.

According to Volexity, however, a Beijing-backed crew it tracks as “BrazenBamboo” has been exploiting the Fortinet flaw and also developed a post-exploit tool for Windows dubbed “DeepData”. This is a modular malware that, among other capabilities, can extract credentials from FortiClient VPN client process memory.

Volexity found the Fortinet zero-day in July while analyzing a new sample of DeepData that has at least 12 unique plugins attackers can use for all sorts of criminal activity after infecting victims' machines. This includes the FortiClient plugin that steals credential from the memory of FortiClient VPN processes.

Some of the other DeepData plugins can be used to steal credentials from 18 other sources on the compromised device. The malware can also:

"The FortiClient plugin looks for the username, password, remote gateway, and port from two different JSON objects in memory," Veloxity’s threat hunters wrote, noting that this is similar to a previous bug documented in 2016.

The new vulnerability, we're told, is due to Fortinet not clearing credentials and other sensitive data from memory after user authentication. It only affects recent versions of the Fortinet VPN client, including the latest, v7.4.0.

BrazenBamboo also developed DeepPost, a tool used to steal files from compromised systems.

The group allegedly also worked on LightSpy, a malware family isn't new first spotted in 2020 by Kaspersky and Trend Micro.

Volexity thinks BrazenBamboo developed a new version of LightSpy for Windows that, unlike the macOS variant, is mostly executed in memory. The malware includes plugins to record keystrokes, audio, and video; collect cookies, stored credentials, and details on installed software and services; and provide a remote shell for the attacker to maintain access and execute commands.

"The timestamps associated with the latest payloads for DEEPDATA and LIGHTSPY are evidence that both malware families continue to be developed," Volexity's team wrote.

Until and unless Fortinet issues a fix, it is recommended that organizations use these rules to detect potentially malicious activity, and block these indicators of compromise (IOCs). ®

Send us news
2 Comments

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Chinese cyber-spies peek over shoulder of officials probing real-estate deals near American military bases

Gee, wonder why Beijing is so keen on the – checks notes – Committee on Foreign Investment in the US

Charter, Consolidated, Windstream reportedly join China's Salt Typhoon victim list

Slow drip of compromised telecom networks continues

More telcos confirm China Salt Typhoon security breaches as White House weighs in

Intrusions allowed Beijing to 'geolocate millions of individuals, record phone calls at will'

China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says

We are only seeing 'the tip of the iceberg,' Easterly warns

FBI wipes Chinese PlugX malware from thousands of Windows PCs in America

Hey, Xi: Zài jiàn!

Chinese cyber-spies reportedly targeted sanctions intel in US Treasury raid

OFAC, Office of the Treasury Secretary feared hit in data-snarfing swoop

Akamai to quit its CDN in China, seemingly not due to trouble from Beijing

Security and cloud compute have so much more upside than the boring business of shifting bits

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

China's cyber intrusions took a sinister turn in 2024

From targeted espionage to pre-positioning - not that they are mutually exclusive