Velvet Ant Threat Group Exploits Zero-Day Vulnerability in Cisco Nexus Switches to Deploy Malware

On August 22, 2024, Sygnia released a detailed report uncovering a sophisticated cyber espionage campaign conducted by the China-nexus threat group "Velvet Ant." This group recently exploited a zero-day vulnerability (CVE-2024-20399) in Cisco Nexus Switch appliances

Velvet Ant Threat Group Exploits Zero-Day Vulnerability in Cisco Nexus Switches to Deploy Malware
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 22, 2024, Sygnia released a detailed report uncovering a sophisticated cyber espionage campaign conducted by the China-nexus threat group "Velvet Ant." This group recently exploited a zero-day vulnerability (CVE-2024-20399) in Cisco Nexus Switch appliances, enabling them to deploy stealthy malware dubbed VELVETSHELL. The report highlights the advanced tactics used by Velvet Ant to maintain persistent access within compromised networks, evading detection and escalating their control over critical infrastructure.

Report Overview

Velvet Ant is a well-known China-nexus threat group with a history of conducting long-term, targeted cyber espionage operations. The group has evolved its tactics over the years, moving from exploiting vulnerabilities in traditional endpoints to targeting legacy systems and, more recently, network appliances. In a campaign observed earlier in 2024, Velvet Ant leveraged a zero-day exploit in Cisco Nexus Switches to infiltrate enterprise networks, gaining unauthorized access to the underlying Linux operating system and deploying malware designed to avoid detection.

The zero-day vulnerability CVE-2024-20399 resides in the NX-OS command-line interface (CLI) of Cisco Nexus Switches. The vulnerability allows an attacker with valid administrator credentials to bypass the CLI and execute arbitrary commands on the underlying Linux OS. Once exploited, Velvet Ant deployed the VELVETSHELL malware, which operates at the OS level and is nearly invisible to traditional security tools.

Sygnia's investigation revealed that the threat actors used Base64-encoded commands to exploit the vulnerability. They uploaded a malicious script that eventually loaded the VELVETSHELL malware. The attackers then executed various post-exploitation tasks, including renaming legitimate binaries to masquerade their activities and deleting traces of their presence.

Velvet Ant's exploitation of this zero-day vulnerability poses significant risks to organizations relying on Cisco Nexus Switches. By gaining control of the underlying OS, threat actors can manipulate network traffic, exfiltrate sensitive data, and maintain a persistent presence within the network. The stealthy nature of VELVETSHELL, combined with the use of legitimate administrative credentials, makes detection extremely challenging, potentially leaving organizations vulnerable to prolonged espionage activities.

Insights and Analysis

Sygnia's analysis highlights the importance of continuous monitoring and enhanced logging in network devices to detect advanced persistent threats. Using network appliances as a new vector for cyber attacks raises concerns about third-party hardware and software security within organizational infrastructures.

Organizations are advised to implement the following measures to mitigate the threat posed by Velvet Ant:

  1. Enhanced Logging and Monitoring: Ensure comprehensive logging of all activities on network appliances and regularly review logs for suspicious behaviour.
  2. Regular Software Updates: Apply patches and updates to all network devices as soon as they are released to minimize the risk of exploitation.
  3. Threat Hunting: Conduct systematic threat hunts focused on identifying signs of compromise within network devices, particularly those that could indicate the presence of VELVETSHELL or similar malware.

The discovery of Velvet Ant's exploitation of a zero-day vulnerability in Cisco Nexus Switches marks a significant escalation in the group's tactics. This highlights the need for organizations to remain vigilant and proactive in their cybersecurity efforts. By following the recommended preventative measures, organizations can better protect themselves from similar attacks and minimize the risk of long-term compromise.

Indicators of Compromise

IndicatorTypeDescription
/bootflash/id.txtFile pathPossibly used for storing malware-related information
/bootflash/1File pathUnusual file, could be part of malware artifacts
/root/ufdmFile pathRenamed curl binary used in the attack
/root/ufdm.soFile pathMalicious shared object (library) loaded by the attacker
/root/aFile pathUnspecified file, likely related to attack
/root/tFile pathUnspecified file, likely related to attack
/root/1File pathUnspecified file, likely related to attack
/root/2File pathUnspecified file, likely related to attack

MITRE ATT&CK Mapping

TacticTechniqueIDDescription
Initial AccessValid AccountsT1078Use of stolen or otherwise obtained valid administrator credentials to gain access
ExecutionCommand and Scripting InterpreterT1059Execution of commands through CLI and exploitation of command injection vulnerability
PersistenceImplantation of Persistent PayloadT1547.015Loading of a malicious shared object to maintain persistence within the compromised device
Defense EvasionMasqueradingT1036Renaming legitimate binaries to avoid detection (e.g., renaming curl to ufdm)
DiscoverySystem Information DiscoveryT1082Use of system commands to discover network configurations and connected devices
DiscoveryNetwork Service ScanningT1046Probing and mapping network devices using extended ping commands
CollectionData from Local SystemT1005Accessing and potentially exfiltrating sensitive information from the compromised device
Command and ControlProxyT1090.002Utilizing the 3proxy functionalities embedded in VELVETSHELL for covert communication
ExfiltrationExfiltration Over C2 ChannelT1041Exfiltrating data through an established command and control channel

References

China-Nexus Threat Group ‘Velvet Ant’ Exploits Zero-Day on Cisco Nexus Switches
Sygnia uncovers the China-Nexus group ‘Velvet Ant’ leveraging a zero-day exploit (CVE-2024-20399) on Cisco Switch appliances, escalating evasion tactics to maintain long-term network persistence.
NVD - CVE-2024-20399