Names | WIREFIRE | |
Category | Malware | |
Type | Backdoor | |
Description | (Mandiant) WIREFIRE is a web shell written in Python that exists as trojanized logic to a component of the Connect Secure appliance. WIREFIRE supports downloading files to the compromised device and executing arbitrary commands. It contains logic inserted before authentication that responds to specific HTTP POST requests to /api/v1/cav/client/visits. If formdata entry “file” exists, the web shell saves the content to the device with a specified filename; if not, the web shell attempts to decode, decrypt, and zlib decompress any raw data existing after a GIF header to execute as a subprocess. The output of the executed process will be zlib compressed, AES-encrypted with the same key, and Base64-encoded before being sent back as JSON with a “message” field via an HTTP 200 OK. | |
Information | <https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S1115> |
Last change to this tool card: 19 June 2024
Download this tool card in JSON format
Previous: WIPERIGHT
Next: WITCHCOVEN
Changed | Name | Country | Observed | ||
APT groups | |||||
UNC5221, UTA0178 | [Unknown] | 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |