Exploiting VMware: Examining the MITRE NERVE Cyberattack and its Business Takeaways
June 19, 2024
3 min read
June 19, 2024
3 min read
By Ben Lipczynski
Head of Security Services, Origina
In April 2024, MITRE, a nonprofit organization that operates federally funded research and development centers for various U.S. government agencies, disclosed an attack against its Networked Experimentation, Research, and Virtualization Environment (NERVE), a collaborative network used for research, development, and prototyping, by a Chinese nation-state adversary.
Known for its extensive work in aviation, defense, healthcare, homeland security, and cybersecurity, MITRE is also famous for its ATT&CK framework, a free, globally accessible resource providing comprehensive cybersecurity threat information.
To gain initial access, the attackers exploited two zero-day vulnerabilities in Ivanti Connect Secure, a remote access VPN identified as CVE-2023-46805 (CVSS score 8.2) and CVE-2024-21887 (CVSS score 9.1). They deployed the Rootrot web shell, which provided the backdoor for persistent access.
After gaining initial access, the attackers hijacked sessions and used RDP over HTML5 to move within MITRE’s network. They gained entrance to vCenter from the compromised Ivanti appliance, interacted with multiple ESXi hosts, and used hijacked credentials to log into user accounts, mapping the network topology.
The attackers then deployed malicious payloads, including the Brickstorm backdoor, known as a “Golang-based backdoor for VMware vCenter servers,” according to Dark Reading, and the Beeflush web shell, establishing persistent access and enabling command execution and communication with command-and-control (C2) servers.
The attackers manipulated MITRE’s VMware infrastructure by using compromised administrative credentials they authenticated from an internal NERVE IP address, created new VMs, and logged into them, while the Beeflush web shell facilitated internal communications and executed suspicious scripts within the vCenter server.
Following Ivanti’s disclosure of the zero-day vulnerabilities, the attackers prepared for data exfiltration. They used the Ivanti help website as a staging area, uploaded a Python script containing the Wirefire web shell (a Python-based implant), and exfiltrated data using their hijacked C2 infrastructure.
The adversary maintained a presence over the next two months, trying further lateral movements within MITRE’s systems despite unsuccessful attempts to pivot to other resources.
This incident is a reminder that any company, including one such as MITRE, can fall victim to a large-scale cyberattack. Advanced threat actors across the globe have increasingly targeted corporate victims as they attempt to steal secrets, gauge responses, and search for avenues of disruption. Hackers are likewise highly prevalent, skilled, and motivated, and their skills are often available to the highest bidder.
Despite following best practices and upgrading their systems, MITRE did not detect the lateral movement into the VMware infrastructure. To enhance detection and prevention of similar attacks, we recommend using the following strategies:
This attack on MITRE underscores the need for continuous vigilance that leverages monitoring and intelligence and proactive measures to protect infrastructure from sophisticated adversaries.
Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.
LEARN MORE