IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security

Red skull and crossbones atop binary code

The Cybersecurity and Infrastructure Security Agency (CISA) has published a new alert warning of 13 malware samples related to exploited Pulse Secure devices. The samples flew under the radar of antivirus detection products.

At least two major hacking groups have deployed a dozen malware families to exploit vulnerabilities in Pulse Connect Secure’s suite of virtual private network (VPN) devices to spy on the US defense sector. It is thought that several Chinese-backed hacking groups were behind the attacks.

Now CISA has issued several analysis reports detailing the files on Pulse Secure devices that hackers modified to carry out cyber attacks.

Hackers have used several flaws  (CVE-2019-11510CVE-2020-8260CVE-2020-8243, CVE-2021-2289) to access devices and create webshells to expand backdoor access. 

In its advisory, CISA encouraged users and administrators to review the following 13 malware analysis reports (MARs) for threat actor techniques, tactics, and procedures (TTPs) and indicators of compromise (IOCs).

All the files CISA analyzed were found on hacked Pulse Connect Secure devices. Some samples contained modified versions of legitimate Pulse Secure scripts.

Most samples contained malicious files that installed webshells that opened backdoors into devices to run remote commands and maintain persistence. 

Related Resource

Five questions to ask before you upgrade to a modern SIEM

Do you need a better defense strategy?

White title against a dark blue background - whitepaper from IBMFree download

In one instance, hackers modified a version of a Pulse Secure Perl Module, called DSUpgrade.pm, to inject a malicious webshell into the Pulse Secure system file /pkg/do-install.  

The purpose of the injected webshell was to accept a parameter named "id" from within an incoming web application post. The webshell will then process the data provided within the "id" parameter as an operating system command by executing it locally utilizing the system() function.

In another analysis, CISA found a modified version of the Unix umount application that is designed to "hook" the umount functionality of a compromised Unix device. The added functionality provided via this umount "hook" makes several system modifications that provide a remote operator persistent command and control (C2) access to a compromised Pulse Secure device, according to CISA.

CISA recommended administrators carry out several tasks to ensure the security posture of their organization's systems. The recommendations were to maintain up-to-date antivirus signatures and engines, keep operating system patches up to date, and disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Costa Rica declares state of emergency following Conti ransomware attack
ransomware

Costa Rica declares state of emergency following Conti ransomware attack

10 May 2022
LinkedIn to pay $1.8 million to employees after settling gender discrimination charges
Careers & training

LinkedIn to pay $1.8 million to employees after settling gender discrimination charges

4 May 2022

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Microsoft says it's provided over $100 million in tech support to Ukrainian government
cyber attacks

Microsoft says it's provided over $100 million in tech support to Ukrainian government

20 May 2022