Top Threats

CISA / MS-ISAC Joint Advisory - Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization

  • 1.  CISA / MS-ISAC Joint Advisory - Threat Actor Leverages Compromised Account of Former Employee to Access State Government Organization

    Posted Feb 16, 2024 10:44:00 AM
      |   view attached

    Hi All,

    The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) conducted an incident response assessment of a state government organization's network environment after documents containing host and user information, including metadata, were posted on a dark web brokerage site. Analysis confirmed that an unidentified threat actor compromised network administrator credentials through the account of a former employee-a technique commonly leveraged by threat actors-to successfully authenticate to an internal virtual private network (VPN) access point, further navigate the victim's on-premises environment, and execute various lightweight directory access protocol (LDAP) queries against a domain controller.[1] Analysis also focused on the victim's Azure environment, which hosts sensitive systems and data, as well as the compromised onpremises environment. Analysis determined there were no indications the threat actor further compromised the organization by moving laterally from the on-premises environment to the Azure environment. CISA and MS-ISAC are releasing this Cybersecurity Advisory (CSA) to provide network defenders with the tactics, techniques, and procedures (TTPs) used by the threat actor and methods to protect against similar exploitation of both unnecessary and privileged accounts. 

    @Sean Heide



    ------------------------------
    Michael Roza CPA, CISA, CIA, CC, MBA, Exec MBA, CSA Research Fe
    ------------------------------