Karakurt rises from its lair
December 10, 2021
December 10, 2021
The information outlined in this blog is based on information collected from CIFR incident response engagements, threat intelligence insights, open-source intelligence (OSINT) analysis and various media and industry reports.
This is a developing story; additional technical analysis of the intrusion clusters, attacker TTPs and indicators of compromise (IOCs) will be released to the community in a separate blog post.
<<< Start >>>
<<< End >>>
Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.
High level timeline:
<<< Start >>>
<<< End >>>
<<< Start >>>
<<< End >>>
<<< Start >>>
<<< End >>>
<<< Start >>>
<<< End >>>
Based on our collection sources, Accenture Security is currently aware of over 40 victims spanning multiple industry verticals and size. The Karakurt group does not appear to focus on a specific industry vertical or size. Of known victims, 95% are based in North America with the remaining 5% in Europe. From our investigations into the group’s activity, we determined that it typically uses credential access as the initial vector into victims’ networks and utilizes applications already installed to move laterally and exfiltrate data, if available. In addition, the threat group will typically contact the victim multiple times, using different communication methods, to apply additional pressure during extortion attempts. Figure 5 includes the known impacted industry verticals to date, based on Accenture Security’s collection sources.
<<< Start >>>
<<< End >>>
The primary method for initial access into victim networks includes internet-facing systems via virtual private network (VPN) using legitimate credentials. Due to a lack of forensic evidence, it is unclear how the credentials were obtained by the threat group. One possibility is exploitation of vulnerable VPN devices, but all cases included inconsistent or absent enforcement of multi-factor authentication (MFA) for user accounts.
In Table 1 below, Accenture Security noted logons from four different hosting providers, to include the autonomous system that currently hosts the Karakurt group’s blog site.
Login time | Autonomous system |
2021-10-12 07:24:45 | RELIABLESITE |
2021-09-28 04:22:54 | Datasource AG |
2021-09-28 03:50:08 | DEDIPATH-LLC |
2021-09-27 03:41:05 | DEDIPATH-LLC |
2021-09-23 04:42:20 | Clouvider Limited |
The use of legitimate credentials, service creation, remote management software and distribution of command and control (C2) beacons across victim environments using Cobalt Strike are the predominant approaches used by the threat group to further its foothold and maintain persistence.
However, in recent intrusions, the threat group did not deploy backup persistence using Cobalt Strike. Instead, it persisted within the victim’s network via the VPN IP pool or installed AnyDesk to allow external remote access to compromised devices. The group was then able to leverage previously obtained user, service, and administrator credentials to move laterally and take action on objectives.
Accenture Security observed the threat group leveraging Mimikatz in at least one intrusion set, as well as PowerShell to dump ntds.dit and exfiltrate it for offline analysis.
However, the threat group appears to escalate privileges using the aforementioned techniques and tools only if needed, typically using previously obtained credentials.
Using valid credentials, pre-existing “living off the land” tools and techniques and remote management software has enabled the threat group to further evade defenses.
In one intrusion, Accenture Security also observed the threat group avoiding the use of common post-exploitation tools or commodity malware in favor of credential access. This approach enabled it to evade detection and bypass security tools such as common endpoint detection and response (EDR) solutions.
If the threat group’s preferred tools are not present within victims’ networks, it will download common remote management and file transfer utilities via a browser to support subsequent exfiltration activities (e.g., AnyDesk, FileZilla, 7zip, etc.).
The threat group was also observed running internet speed tests via a browser to check for upload speeds before executing exfiltration activities. In addition, the use of Angry IP Scanner was identified in at least one intrusion set.
The threat group has been known to use AnyDesk, or other available remote management tools, remote desktop protocol (RDP), Cobalt Strike, PowerShell commands and valid credentials taken from initial access to move laterally.
In addition to using valid credentials to log into the VPN directly, the threat group has utilized Cobalt Strike for C2 for backup persistence, if needed.
The threat group has been seen utilizing 7zip and WinZip for compression, as well as Rclone or FileZilla (SFTP) for staging and final exfiltration to Mega.io cloud storage.
The staging directories utilized for exfiltration were C:\Perflogs and C:\Recovery.
<<< Start >>>
<<< End >>>
Tactic | Technique |
Initial access | T1133: External Remote Services T1078: Valid Accounts |
Execution | T1059: Command and Scripting Interpreter T1086: PowerShell T1035: Service Execution |
Persistence | T1078: Valid Accounts T1050: New Service |
Privilege escalation | T1078: Valid Accounts |
Defense Evasion | T1078: Valid Accounts T1036: Masquerading T1027: Obfuscated Files or Information |
Credential Access | T1110: Brute Force T1003: Credential Dumping |
Discovery | T1083: File and Directory Discovery T1082: System Information Discovery T1087: Account Discovery T1135: Network Share Discovery T1069: Permission Groups Discovery T1018: Remote System Discovery T1016: System Network Configuration Discovery |
Lateral Movement | T1076: Remote Desktop Protocol T1028: Windows Remote Management |
Collection | T1005: Data from Local System T1039: Data from Network Shared Drive |
Command & Control | T1043: Commonly Used Port T1105: Remote File Copy T1071: Standard Application Layer Protocol |
Exfiltration | T1002: Data Compressed T1048: Exfiltration Over Alternative Protocol |
Impact | T1489: Service Stop |
If you have an incident or need additional information on ways to prevent, detect, respond to, or recover from, cyberthreats, contact a member of our CIFR team 24/7/365 by phone 888-RISK-411 or email CIFR.hotline@accenture.com
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. All materials are intended for the original recipient only. The reproduction and distribution of this material is forbidden without express written permission from Accenture. The opinions, statements, and assessments in this report are solely those of the individual author(s) and do not constitute legal advice, nor do they necessarily reflect the views of Accenture, its subsidiaries, or affiliates.
Given the inherent nature of threat intelligence, the content contained in this alert is based on information gathered and understood at the time of its creation. It is subject to change. The information in this alert is general in nature and does not take into account the specific needs of your IT ecosystem and network, which may vary and require unique action. As such, all information and content set out is provided on an “as-is” basis without representation or warranty and the reader is responsible for determining whether or not to follow any of the suggestions, recommendations or potential mitigations set out in this report, entirely at their own discretion. Accenture accepts no liability for any action or failure to act in response to the information contained or referenced in this alert.
Copyright © 2021 Accenture. All rights reserved.