Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Campaigns
  3. Operation MidnightEclipse

Operation MidnightEclipse

Operation MidnightEclipse was a campaign conducted in March and April 2024 that involved initial exploit of zero-day vulnerability CVE-2024-3400, a critical command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS.[1][2]

ID: C0048
First Seen: March 2024[1]
Last Seen: April 2024[1][2]
Version: 1.0
Created: 15 January 2025
Last Modified: 15 January 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

DuringOperation MidnightEclipse, threat actors usedwget via HTTP to retrieve payloads.[1][2]

EnterpriseT1059.004Command and Scripting Interpreter:Unix Shell

DuringOperation MidnightEclipse, threat actors piped output from stdout to bash for execution.[1][2]

EnterpriseT1584.003Compromise Infrastructure:Virtual Private Server

DuringOperation MidnightEclipse, threat actors abused Virtual Private Servers to store malicious files.[1]

.006Compromise Infrastructure:Web Services

DuringOperation MidnightEclipse, threat actors abused compromised AWS buckets to store files.[1]

EnterpriseT1005Data from Local System

DuringOperation MidnightEclipse, threat actors stole saved cookies and login data from targeted systems.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

DuringOperation MidnightEclipse, threat actors copied files to the web application folder on compromised devices for exfiltration.[2]

EnterpriseT1190Exploit Public-Facing Application

DuringOperation MidnightEclipse, threat actors exploited CVE-2024-3400 in Palo Alto Networks GlobalProtect.[1][2]

EnterpriseT1105Ingress Tool Transfer

DuringOperation MidnightEclipse, threat actors downloaded additional payloads on compromised devices.[1][2]

EnterpriseT1559Inter-Process Communication

DuringOperation MidnightEclipse, threat actors wrote output to stdout then piped it to bash for execution.[1]

EnterpriseT1588.002Obtain Capabilities:Tool

DuringOperation MidnightEclipse, threat actors used the GO Simple Tunnel (GOST) reverse proxy tool.[1]

EnterpriseT1003.003OS Credential Dumping:NTDS

DuringOperation MidnightEclipse, threat actors obtained active directory credentials via the NTDS.DIT file.[1]

EnterpriseT1090Proxy

DuringOperation MidnightEclipse, threat actors used the GO Simple Tunnel reverse proxy tool.[1]

EnterpriseT1021.002Remote Services:SMB/Windows Admin Shares

DuringOperation MidnightEclipse, threat actors used SMB to pivot internally in victim networks.[1]

.006Remote Services:Windows Remote Management

DuringOperation MidnightEclipse, threat actors used WinRM to move laterally in targeted networks.[1]

EnterpriseT1053.003Scheduled Task/Job:Cron

DuringOperation MidnightEclipse, threat actors configured cron jobs to retrieve payloads from actor-controlled infrastructure.[1][2]

EnterpriseT1078Valid Accounts

DuringOperation MidnightEclipse, threat actors extracted sensitive credentials while moving laterally through compromised networks.[1]

.002Domain Accounts

DuringOperation MidnightEclipse, threat actors used a compromised domain admin account to move laterally.[1]

Software

IDNameDescription
S1164 UPSTYLE

DuringOperation MidnightEclipse, threat actors made multiple attempts to installUPSTYLE[1][2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp