Security

Cyber-crime

Cybercrime crew Magnet Goblin bursts onto the scene exploiting Ivanti holes

Plus: CISA pulls plug on couple of systems feared compromised


There's yet another group of miscreants out there hijacking insecure Ivanti devices: A new, financially motivated gang dubbed Magnet Goblin has emerged from the shadowy digital depths with a knack for rapidly exploiting newly disclosed vulnerabilities before vendors have issued a fix.

The cybercrime crew has targeted US medical, manufacturing, and energy-sector organizations, according to Check Point, which said it spotted Magnet Goblin abusing security holes in Ivanti's code to break into networks back in January just one day after a proof-of-concept, or PoC, exploit was made public.

Specifically, the crooks appear to have hit vulnerable Ivanti Connect Secure VPN servers, compromising that equipment and using those footholds to deploy backdoors in victims' IT environments. Please make sure you're patched or have mitigations in place, and have checked for indications of compromise, if you're using Ivanti gear to secure your stuff.

"We were able to confirm less than 10 organizations in the US, but we assume the real number is much higher," Sergey Shykevich, threat intelligence manager at Check Point Research, told The Register, referring to Magnet Goblin's victims. 

"We think it is an opportunistic cybercrime group that we currently can't affiliate to a specific geographical location or a known group," Shykevich added. "This group was able to utilize the Ivanti exploit extremely quickly, just one day after a POC for it was published."

On Friday, Shykevich's team shared its research about Magnet Goblin. We're told the cyber-gang deployed remote-control and data-stealing malware after breaking into organizations via Ivanti holes, malware that was submitted to VirusTotal as early as January 2022 and also used in attacks against Adobe Magento 2 that same year.

This malicious software included MiniNerbian, a Linux backdoor used in those Magento 2 attacks, as well as a newer, novel Linux version of NerbianRAT, and a JavaScript credential stealer called WARPWIRE. The crew also uses legit remote monitoring and management tools such as ScreenConnect and AnyDesk once inside victims' IT environments, which makes their illicit activities a little more difficult to detect.

"Magnet Goblin distinguishes itself by its rapid adoption of newly disclosed vulnerabilities, notably targeting platforms such as Ivanti Connect Secure VPN, Magento, Qlik Sense, and possibly Apache ActiveMQ," according to the report. 

The criminals move quickly, according to the security shop, exploiting these so-called "one-day vulnerabilities" in edge devices and public facing services shortly after proof-of-concept exploits have been made public, but before the vendors have pushed patches to slam shut the security holes.

This strategy, "signifies a profound threat to digital infrastructures worldwide," the infosec outfit noted.

Check Point said it first spotted the criminal gang while it was tracking the Ivanti Connect Secure vulnerabilities. 

While the US government's Cybersecurity and Infrastructure Security Agency (CISA) along with private-sector security analysts at Mandiant and Volexity initially linked these attacks to Chinese government-sponsored crews, including Bejing-backed Volt Typhoon, all types of cybercriminals soon jumped into the fray. 

And despite the quick turnaround, from when the bugs were disclosed in the Ivanti devices to when Magnet Goblin began exploiting them, Shykevich said his threat intel team can't definitely connect this gang to a specific region or existing crime group.

Check Point did, however, link Magnet Goblin's infrastructure to the Qlink Sense exploits reported in late November and early December. 

After using the Qlink Sense bugs to gain initial access, security researchers at Arctic Wolf said at least some of the miscreants then infected victims with Cactus ransomware. ®

Send us news
2 Comments

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

North Korean scammers plan wave of stealth attacks on crypto companies, FBI warns

Feds warn of 'highly tailored, difficult-to-detect social engineering campaigns'

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

UK trio pleads guilty to running $10M MFA bypass biz

Crew bragged they could help crooks raid victims' bank accounts

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

Novel attack on Windows spotted in phishing campaign run from and targeting China

Resources hosted at Tencent Cloud involved in Cobalt Strike campaign

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Iran hunts down double agents with fake recruiting sites, Mandiant reckons

Farsi-language posts target possibly-pro-Israel individuals

Feds claim sinister sysadmin locked up thousands of Windows workstations, demanded ransom

Sordid search history 'evidence' in case that could see him spend 35 years for extortion and wire fraud