Breaking

The Red Cross Data Breach exploited a ManageEngine vulnerability by APT27

The Red Cross Data Breach made the headlines last month, after the hack on its network and accused state sponsored hackers of the take down. In this update to the breach, the Red Cross mentioned that the attack happened on November 09, 2021 and it was identified only on Jan 18.

The attackers were able to breach the network by exploiting the CVE-2021-40539 vulnerability on Zoho ManageEngine ADSelfService Plus version 6113 and its prior versions that was vulnerable to the REST API authentication bypass allowing remote code execution.

Source: The Record

Details on the ManageEngine Software

ADSelfService Plus is a password management and Single Sign-On (SSO) software from a Indian SaaS firm. The vulnerability in this tool allowed hackers to bypass authentication, drop web shells on the servers and then make a lateral distribution across their network while compromising admin credentials. Furthermore, the hackers compromised Restoring Family Links, a Red Cross Program used by volunteers to reunite family members separated due to disaster, conflict or migration.

After the breach last month, Robert Mardini, Director General of the International Committee of the Red Cross begged hackers not to leak the personal information of those subjects as it belongs to highly vulnerable people who have already gone through so much in their life time. The breached information starting with names, addresses, reason for separation, location, contact details and other details belongs to 515,000 separated individuals.

Hackers behind the Red Cross Data Breach

As per the Red Cross, the entity behind the data breach is found to be a Advanced Persistent Treat (APT) Group based on the hacking tools involved in the incident. APT is usually a state-sponsored hacking group that operates for social or political reasons.

Furthermore, the Red Cross had the following beak-down to accuse APT group,

  • The attack was carried out using a specific set of hacking tools designed for intrusions. The tools are similar to the APT group modus operandi and are not available for in the web.
  • Sophisticated obfuscation techniques were employed to keep the malicious program invisible, which requires high skill.
  • The attack is a targeted act as the codes were created specifically for ICRC servers and the unique identifiers used by the hackers matches the MAC address of the Red Cross Servers.
  • The malicious programs escaped security solutions that are meant to detect the breach. Those programs had bypassed antivirus solutions except for a few files, which we believe should be negligible amount of other malicious programs. Only after the installation of Endpoint Detection and Response (EDR) agents on our devices we were able to identify the breach.

It was found that the attackers were inside the organization’s network for more than two months until the EDR detected the same last month. However, as per Palo Alto Networks Report that was published on November 2021 has connected a similar Zoho Vulnerability to a Chinese State-Sponsored Hacker as APT27.

Following the Red Cross Data Breach news, the German Government published a security warning for state and private companies about the APT27 attack that is leveraging Zoho vulnerability. These cases bring us closer to the entity behind the Red Cross Data Breach mapping it to APT27.

The US State Department made the following statement on Red Cross Data Breach last month, “Targeting the Red Cross and Red Crescent Movement’s sensitive and confidential data is a dangerous development.  It has real consequences: this cyber incident has harmed the global humanitarian network’s ability to locate missing people and reconnect families.  This is why it is so vital that humanitarian data be respected and only used for intended purposes. To ensure states and vulnerable people can continue to trust and rely on the Red Cross and Red Crescent Movement for the help they need, states should join the ICRC in raising the alarm about this breach”.

When hackers have started targeting organizations like the ICRC then this becomes a major concern, as they are not after monetary benefits but even more nefarious thought of disrupting the society, political stability and humanity as a whole.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago