Upwardly Mobile - API & App Security News

US Treasury Department: Chinese Hackers Exploit API Vulnerability


Listen Later

Episode Title: US Treasury Department: Chinese Hackers Exploit API Vulnerability

Introduction:
  • This episode examines the cyberattack on the U.S. Treasury Department, which was facilitated by a compromised API key from BeyondTrust's Remote Support SaaS platform.
  • The breach is attributed to Chinese state-sponsored threat actors.
Key Events and Timeline:
  • Compromised API Key: A BeyondTrust API key was exploited by attackers to gain initial access. The method of initial access remains unclear.
  • Detection: BeyondTrust detected suspicious activity on December 2, 2024.
  • Key Revoked: The compromised API key was revoked on December 8 after the breach was confirmed.
  • Zero-Day Exploitation: The attackers exploited two zero-day vulnerabilities, CVE-2024-12356 and CVE-2024-12686.
    • CVE-2024-12356 was a critical command injection flaw, allowing execution of arbitrary commands on the system. This flaw was due to improper input sanitization.
  • Unauthorized Access: Attackers reset passwords and gained unauthorized access to several Treasury workstations.
  • Data Exfiltration: The attackers were able to steal unclassified documents.
Technical Details:
  • The attackers used a compromised API key to access BeyondTrust’s Remote Support SaaS platform.
  • The exploitation of CVE-2024-12356 allowed attackers to execute arbitrary commands without authentication.
  • This command injection vulnerability allowed the attackers to run commands on the operating system and enabled further attacks, such as resetting passwords.
  • The use of zero-day vulnerabilities indicates the sophistication of the attack.
Impact:
  • The U.S. Treasury Department was breached, resulting in the theft of unclassified documents.
  • The incident is considered a major security breach involving a third-party provider.
  • The attack highlights the risk of supply chain vulnerabilities where a breach of a third-party provider like BeyondTrust can lead to significant impacts on their customers.
Response and Remediation:
  • BeyondTrust revoked the compromised API key.
  • Patches were released to address the exploited vulnerabilities.
  • The vulnerability CVE-2024-12356 was addressed with an urgent patch by BeyondTrust .
Attribution:
  • The attack is attributed to Chinese state-sponsored threat actors.
  • The specific APT (Advanced Persistent Threat) group involved was not named, but they are linked to the Chinese government.
Conclusion:
  • The breach of the U.S. Treasury Department through the exploitation of a vulnerability in BeyondTrust's platform highlights the need for robust cybersecurity practices and vigilance regarding third-party risks.
  • The incident emphasizes the importance of patching vulnerabilities promptly and monitoring for suspicious activities.
Additional Notes:
  • The initial access point of the API key remains unclear.
  • This incident underscores the potential damage from compromised third-party services and API keys.
  • The incident involved the compromise of BeyondTrust's Remote Support SaaS instances.
...more
View all episodesView all episodes
Download on the App Store

Upwardly Mobile - API & App Security NewsBy Approov Limited