17 June 2022

Chinese APT exploited Sophos Firewall zero-day vulnerability weeks before fix


Chinese APT exploited Sophos Firewall zero-day vulnerability weeks before fix

Cybersecurity company Volexity published a report about the Chinese state-sponsored threat actor which has been using a zero-day vulnerability in Sophos Firewall weeks before a fix was released.

According to Volexity researchers, on March 8, 2022, they spotted abnormal activity engaged with a customer's Sophos Firewall. The researchers analyzed files and disk images of the firewall and discovered a backdoor. Based on the analyzed data, the exploitation of a zero-day vulnerability in the customer’s Sophos Firewall was dating back to March 5, 2022, three weeks before the patch was released.

On March 25, Sophos published an advisory which described a critical remote code execution vulnerability in its firewalls (CVE-2022-1040). Volexity believes that this is the same vulnerability exploited to breach its customer’s network at the beginning of March, because at the time this firewall was up to date. The researchers attribute this attack to a Chinese APT group tracked as DriftingCloud.

DriftingCloud used the access to the firewall to conduct man-in-the-middle attack in the victim’s network. Using webshell backdoors and malware, the hackers collected data during this attack and used it to compromise additional systems outside the firewall’s network.

DriftingCloud even tried to blend malicious traffic by accessing the installed webshell through requests to the legitimate file "login.jsp." At the first glance, it looked like a brute-force login attempt, but in reality it was an interaction with a backdoor.

The flaw (CVE-2022-1040) is an authentication bypass vulnerability that affects the User Portal and Webadmin of Sophos Firewall. The remote attackers can use it to execute arbitrary code on a vulnerable system.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024