A recent post by Vietnamese cybersecurity company GTSC detailed findings from a #MicrosoftExchange breach that stemmed from CVE-2022-41040 and CVE-2022-41082. @Volexity ties this to a CN threat actor it tracks that targets organizations using #OWA and #Zimbra. #volexintel 1/7
Specifically the post highlights IP 206.188.196.77, which hosted the domain rkn-redirect[.]net. @Volexity previously identified this domain as a phishing domain targeting #OWA users. Note some subdomains offer clues about the likely targeting.
2/7
.@Volexity has linked the rkn-redirect[.]net domain to several others through domain registration patterns & banner data patterns.
3/7
Examples of domains @Volexity has linked to rkn-redirect[.]net include:
•tr-redirect[.]net
•webmail.sanayi[.]gov.tr-redirect[.]net (imitates Turkish Ministry of Industry and Technology)
•mail.ticaret[.]gov.tr-redirect[.]net (imitates Turkish Ministry of Trade)
4/7
Pivoting further, this infrastructure can be linked to exploitation of a #Zimbra#vulnerability@Volexity discovered late last year that allows email theft from #Zimbra users by exploiting CVE-2022-24682. Specifically, the following file: virustotal.com/gui/file/100f5…
5/7
This is a particularly unusual case. Like the #Zimbra “mail theft” code, the attacker used an almost 1:1 copy of example marked-up code previously shared by @Volexity relating to exploitation of CVE-2022-24682.
6/7
In summary, @Volexity links at least some of the recent #MicrosoftExchange exploitation activity described by GTSC to a known CN attacker conducting various webmail attacks against organizations in Asia for the past 12 months.
7/7
UPDATE: Working with different partners, Volexity no longer links the Exchange 0day to the threat actor described in this thread. Two different threat actors used the same infra (206.188.196.77) in close proximity but the two events should not be linked to the same group.
• • •
Missing some Tweet in this thread? You can try to
force a refresh