Update 4.29.24 3:37PM ET:
One new detection and one new global report have been released to track ArcaneDoor activity.
Detection: Cisco ASA: ArcaneDoor IOC IP Addresses
Report: Cisco ASA: ArcaneDoor Activity Audit
I also wanted to specifically call out that the existing detection, "Cisco ASA: Excessive Authentication Errors" may help identify brute forcing and password spraying against these devices. This is a default disable detection, so you will need to enable this in your Blumira tenant if not already done so.
On April 24th, 2024, Cisco disclosed that a state-sponsored hacking group, dubbed "ArcaneDoor," has been actively exploiting three zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls since November 2023. The group has been targeting government networks worldwide, focusing on espionage and gaining in-depth knowledge of the compromised devices. While the attack vector used to provide attackers initial access remains unknown, Cisco has provided details on the specific vulnerabilities used during the hacking group’s campaign.
The ArcaneDoor hacking group has been observed exploiting three zero-day vulnerabilities, CVE-2024-20353, CVE-2024-20358, and CVE-2024-20359 in Cisco ASA and FTD firewalls. They used these vulnerabilities in conjunction with two custom-built tools, "Line Dancer" and "Line Runner," to gain unauthorized access, disable logging, exfiltrate captured packets, and execute arbitrary code on the compromised devices.
The group's primary objectives appear to be espionage and gaining in-depth knowledge of the targeted devices. They exfiltrated device configuration files, disabled syslog services to cover their tracks, and modified AAA configurations to allow their own devices access to the network.
Severity of the CVEs:
To mitigate the risk posed by these vulnerabilities, administrators should take the following actions:
The ArcaneDoor hacking group's exploitation of zero-day vulnerabilities in Cisco ASA and FTD firewalls highlights the importance of timely patching and maintaining a robust security posture. Administrators should prioritize patching affected devices, implement secure logging and monitoring practices, and follow Cisco's guidance to ensure the integrity of their networks.
For additional information refer to these resources:
Blumira continues to actively monitor this issue, and look for ways that we can detect any stage of exploitation of these vulnerabilities.
If you are an MSP and not already using Blumira, please submit a request for a “free for internal use” NFR account.
Blumira’s Free SIEM is easy to deploy; IT and security teams can start seeing immediate security value for their organizations.