The Register: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

Source URL: https://www.theregister.com/2024/11/19/china_brazenbamboo_fortinet_0day/
Source: The Register
Title: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

Feedly Summary: No word on when or if the issue will be fixed
Chinese government-linked snoops are exploiting a zero-day bug in Fortinet’s Windows VPN client to steal credentials and other information, according to memory forensics outfit Volexity.…

AI Summary and Description: Yes

Summary: The text discusses a zero-day vulnerability in Fortinet’s Windows VPN client, which is being exploited by a Beijing-backed group called BrazenBamboo. This group has developed sophisticated malware tools, including DeepData, designed to steal credentials and exploit information from compromised devices. The situation underscores the urgent need for organizations to adopt enhanced security measures and monitor for indicators of compromise as a temporary defense while awaiting a patch from Fortinet.

Detailed Description:

– **Zero-Day Vulnerability**: A newly identified flaw in Fortinet’s Windows VPN client is being taken advantage of by cybercriminals. The vulnerability, reported to Fortinet by Volexity, has yet to receive a CVE identifier or patch from the vendor.

– **Exploitation by BrazenBamboo**:
– A Beijing-linked cyber group named “BrazenBamboo” is actively exploiting this vulnerability, using a malware tool known as DeepData.
– DeepData has multiple plugins capable of extracting credentials not only from FortiClient VPN processes but also from various messaging applications and web browsers.

– **Modular Malware Capabilities**:
– The malware’s plugins enable the theft of sensitive data from various sources including:
– **Messaging Applications**: Vulnerable to credential theft from WeChat, WhatsApp, QQ, and more.
– **Email Clients**: Can extract contacts and emails from local Microsoft Outlook.
– **Web Browsers**: Able to gather history, cookies, and passwords from major browsers like Firefox, Chrome, and Edge.

– **Weaknesses in Fortinet’s Security Design**: The problem arises from Fortinet’s failure to clear sensitive information from memory after user authentication in recent VPN client versions (v7.4.0 and above).

– **Recommendations for Organizations**:
– Until a fix is provided, organizations are advised to implement detection rules for indicators of compromise (IOCs) related to this vulnerability and monitor for malicious activity.

– **Related Malware Developments**:
– BrazenBamboo’s malware family also includes LightSpy, which has been updated for Windows use, further indicating the group’s ongoing development and sophistication in exploiting vulnerabilities for espionage and data theft.

Key Implications for Security Professionals:
– Organizations utilizing Fortinet VPN clients must consider immediate risk assessments and implement detection mechanisms to safeguard against potential exploits.
– Continuous monitoring and a proactive approach to incident response are essential, especially given the evolving tactics of cybercriminal groups like BrazenBamboo.
– The ongoing threat underscores the importance of regular software patches and updates as critical aspects of an effective security posture.