Incident: Compromised Certificates Used in Ransomware Attacks by Cuba Group

Published Date: 2022-12-13

Postmortem Analysis
Timeline 1. The software failure incident involving the use of malicious drivers certified by Microsoft occurred at least as early as July of the same year [136908]. Therefore, the software failure incident happened in July of the same year.
System 1. Microsoft's Windows Hardware Developer Program certified drivers [136908] 2. NVIDIA certificate [136908] 3. Compromised certificates from Zhuhai Liancheng Technology Co. [136908]
Responsible Organization 1. The group known as "Cuba," believed to be based in Russia, was responsible for causing the software failure incident by using malicious drivers certified by Microsoft [136908].
Impacted Organization 1. Microsoft [136908] 2. NVIDIA [136908] 3. Zhuhai Liancheng Technology Co. [136908]
Software Causes 1. The failure incident was caused by the use of malicious drivers that were certified by Microsoft, which were used by the Cuba ransomware group to disable security scanning tools and change settings on compromised systems [136908]. 2. The attackers exploited vulnerabilities in the software signing process to legitimize their malware, compromising certificates and abusing the signing process [136908]. 3. Compromised certificates from Microsoft's Windows Hardware Developer Program were used maliciously in post-exploitation activities, such as deploying ransomware, indicating a flaw in the certificate validation mechanism [136908]. 4. The incident involved the abuse of developer accounts for the Microsoft Partner Center to submit malicious drivers and obtain Microsoft signatures, highlighting a security weakness in the partner account system [136908].
Non-software Causes 1. Compromised certificates from Chinese tech company Zhuhai Liancheng Technology Co. [136908] 2. Compromised NVIDIA certificate leaked by the Lapsus$ hacking group [136908]
Impacts 1. The software failure incident led to the compromise of Microsoft-certified drivers by the Cuba ransomware group, which were used to disable security scanning tools and change settings on compromised systems [136908]. 2. The incident resulted in the abuse of developer accounts for the Microsoft Partner Center to submit malicious drivers and obtain Microsoft signatures, facilitating post-exploitation intrusion activities such as deploying ransomware [136908]. 3. As a response to the incident, Microsoft suspended the abused Partner Center accounts, revoked the rogue certificates, and released security updates for Windows to address the situation [136908]. 4. The incident highlighted the exploitation of cryptographic software signing mechanisms by attackers to legitimize their malware, raising concerns about the trustworthiness of signed software [136908]. 5. The compromised certificates used in the incident were also linked to the Manuscrypt remote access tool, indicating a broader impact on Android device makers and potential implications for cybersecurity beyond the specific ransomware attacks [136908].
Preventions 1. Implementing robust security measures to prevent unauthorized access and compromise of developer accounts, as well as ensuring strict verification processes for driver submissions could have prevented the incident [136908]. 2. Regular monitoring and auditing of certificate usage and revoking any suspicious or compromised certificates promptly could have helped prevent the misuse of certificates in signing malicious drivers [136908]. 3. Enhancing security awareness and training among developers and software vendors to recognize and report any suspicious activities related to software signing and submission could have potentially prevented the incident [136908].
Fixes 1. Revoking the rogue certificates used by the attackers and releasing security updates for Windows related to the situation [136908]. 2. Suspending the Partner Center accounts that were abused for submitting malicious drivers [136908]. 3. Implementing additional security measures to prevent similar attacks in the future, as suggested by Sophos' director of threat research [136908].
References 1. United States Cybersecurity & Infrastructure Security Agency and FBI 2. Researchers 3. Security firm Sophos 4. Palo Alto Networks Unit 42 5. Lapsus$ hacking group 6. Security firm Mandiant 7. Zhuhai Liancheng Technology Co. 8. Microsoft 9. SentinelOne 10. Christopher Budd, director of threat research at Sophos 11. Google

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the abuse of signed malicious drivers by threat actors has happened again at Microsoft. The incident involved malicious drivers certified by Microsoft's Windows Hardware Developer Program being used in post-exploitation activity, such as the deployment of ransomware. Microsoft suspended the Partner Center accounts that were abused, revoked the rogue certificates, and released security updates for Windows in response to the incident [136908]. (b) The incident of compromised certificates being used to sign malicious software has also been observed at other organizations. Google found that compromised "platform certificates" managed by Android device makers like Samsung and LG were used to sign malicious Android apps. Additionally, the FBI and CISA have previously attributed activity associated with the Manuscrypt malware family to North Korean state-backed hackers, who used compromised certificates to sign components of the Manuscrypt remote access tool [136908].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article where it mentions that the Cuba ransomware group used malicious drivers that were certified by Microsoft after compromising a target's systems to disable security scanning tools and change settings. These drivers were signed by legitimate authorities, such as Microsoft, through fraudulent means, indicating a failure in the design phase where attackers exploited weaknesses in the software signing process to legitimize their malware [136908]. (b) The software failure incident related to the operation phase is highlighted in the article when it discusses how the Cuba ransomware group used the compromised certificates from tech companies like Zhuhai Liancheng Technology Co. to facilitate post-exploitation intrusion activities, such as deploying ransomware. This misuse of certificates obtained through fraudulent means points to a failure in the operation phase where attackers abused the trust chain to carry out malicious processes without detection [136908].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident described in the articles is primarily due to contributing factors that originate from within the system. Specifically, the failure involved the malicious use of drivers certified by Microsoft's Windows Hardware Developer Program to facilitate post-exploitation intrusion activities, such as deploying ransomware. The attackers compromised certificates and abused the signing process to legitimize their malware [136908]. (b) outside_system: The software failure incident also involved contributing factors that originate from outside the system. For instance, the attackers obtained certificates from legitimate authorities through fraudulent means, indicating a weakness in the infrastructure related to cryptographic software signing. Additionally, compromised "platform certificates" managed by Android device makers were used to sign malicious Android apps, highlighting vulnerabilities in the broader ecosystem [136908].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the articles is related to non-human actions, specifically the misuse of cryptographically signed drivers by the Cuba ransomware group. The group used malicious drivers certified by Microsoft to disable security scanning tools and change settings after compromising a target's systems [136908]. (b) The failure was also influenced by human actions, as the malicious drivers were submitted by developer accounts for the Microsoft Partner Center that were engaged in submitting malicious drivers to obtain a Microsoft signature. This abuse of partner accounts led to the deployment of ransomware through the signed malicious drivers [136908].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The incident involved the misuse of drivers certified by Microsoft's Windows Hardware Developer Program to facilitate post-exploitation intrusion activities, such as deploying ransomware [136908]. - Attackers compromised certificates from tech companies like NVIDIA and Zhuhai Liancheng Technology Co. to sign malicious drivers, which were used to disable security scanning tools and change settings on compromised systems [136908]. (b) The software failure incident related to software: - The incident involved the use of malicious drivers that were signed by legitimate authorities, such as Microsoft, to carry out malicious processes without detection [136908]. - The compromised certificates and abuse of the signing process by attackers legitimized their malware, highlighting weaknesses in the infrastructure meant to validate software [136908].
Objective (Malicious/Non-malicious) malicious (a) The objective of the software failure incident was malicious, as it involved the Cuba ransomware group using malicious drivers that were certified by Microsoft to facilitate post-exploitation intrusion activities, such as the deployment of ransomware [136908]. (b) The incident involved the abuse of certificates and signing processes by threat actors to legitimize their malware, indicating a non-malicious failure in terms of the certificates being compromised or fraudulently obtained [136908].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was related to poor decisions made by the attackers. The Cuba ransomware group made poor decisions by using malicious drivers certified by Microsoft to facilitate post-exploitation intrusion activities, such as deploying ransomware. These drivers were signed by legitimate authorities, making them difficult to detect and allowing the attackers to carry out processes without question [136908].
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the incident where the Cuba ransomware group used malicious drivers certified by Microsoft to facilitate post-exploitation intrusion activity, such as deploying ransomware. These drivers were signed by legitimate authorities after compromising certificates from various tech companies, including Microsoft. The attackers showed a high level of competence in creating and utilizing malicious drivers to bypass security measures [136908]. (b) The accidental aspect of the software failure incident is not explicitly mentioned in the provided article.
Duration permanent (a) The software failure incident described in the articles is more of a permanent nature. The incident involved the malicious use of drivers certified by Microsoft in ransomware attacks by the group known as "Cuba." The attackers compromised certificates and abused the signing process to legitimize their malware, indicating a persistent and ongoing threat. Microsoft took actions such as suspending Partner Center accounts, revoking rogue certificates, and releasing security updates for Windows in response to the incident [136908]. (b) The software failure incident can also be considered temporary in the sense that immediate actions were taken to address the issue. Microsoft suspended the abused Partner Center accounts, revoked the rogue certificates, and released security updates for Windows related to the situation. The company stated that it hadn't identified any compromise of its systems beyond the partner account abuse, suggesting a containment of the immediate threat [136908].
Behaviour other (a) crash: The software failure incident in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. The incident is more focused on malicious activities related to the use of compromised certificates and drivers [136908]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s). Instead, it revolves around the misuse of signed drivers and certificates for malicious purposes [136908]. (c) timing: The failure is not related to the system performing its intended functions correctly but too late or too early. The focus is on the abuse of certificates and drivers for post-exploitation intrusion activities [136908]. (d) value: The software failure incident is not about the system performing its intended functions incorrectly. It is more about the misuse of signed drivers and certificates to facilitate malicious activities like deploying ransomware [136908]. (e) byzantine: The incident does not involve the system behaving erroneously with inconsistent responses and interactions. It is primarily about the exploitation of trusted mechanisms like cryptographic software signing for malicious purposes [136908]. (f) other: The behavior of the software failure incident can be categorized as a security breach or compromise where attackers abuse the trust in signed drivers and certificates to carry out post-exploitation activities like deploying ransomware [136908].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, non-human, theoretical_consequence (a) unknown (b) unknown (c) unknown (d) The software failure incident led to the compromise of certificates from Microsoft's Windows Hardware Developer Program, NVIDIA, and a Chinese tech company, impacting the security and trustworthiness of these certificates [136908]. (e) unknown (f) The compromised certificates were used to sign malicious software, impacting the security of systems and potentially leading to further cyberattacks [136908]. (g) The software failure incident did have consequences, such as the abuse of certificates for malicious activities, but there were no direct observed consequences like physical harm or loss of life reported [136908]. (h) The potential consequences discussed include the abuse of signed drivers for post-exploitation intrusion activities like deploying ransomware, as well as the undermining of the software signing process by attackers [136908]. (i) unknown
Domain information, finance (a) The software failure incident mentioned in the articles is related to the information industry, specifically cybersecurity and software security. The incident involved the compromise of certificates and the signing of malicious drivers to facilitate post-exploitation intrusion activities, such as the deployment of ransomware [136908]. (h) The incident also has implications for the finance industry, as the malicious drivers signed with Microsoft certificates were likely used to facilitate post-exploitation intrusion activities, potentially leading to financial losses for affected organizations [136908]. (m) Additionally, the incident highlights the broader issue of software security and the potential impact on various industries beyond those explicitly mentioned in the articles. The compromised certificates and misuse of software signing mechanisms can have far-reaching consequences for organizations across different sectors, emphasizing the importance of robust cybersecurity measures [136908].

Sources

Back to List