Recorded Futureβs Insikt Group tracks TAG-100 as a suspected cyber-espionage operation that leveraged internet-facing devices and open-source tools such as the Go backdoor Pantegana. The campaign targeted two Asia-Pacific intergovernmental organizations and a broad set of diplomatic, trade, and private-sector entities globally. #TAG100 #Pantegana #SparkRAT #GlobalProtect #CVE-2024-3400
Keypoints
- TAG-100 has compromised organizations in at least ten countries across Africa, Asia, North America, South America, and Oceania.
- The group used open-source Go backdoors Pantegana and SparkRAT in post-exploitation activities.
- TAG-100 targeted a range of internet-facing products, including Citrix NetScaler, F5 BIG-IP, Zimbra, Microsoft Exchange, SonicWall, Cisco ASA, Palo Alto Networks GlobalProtect, and Fortinet FortiGate.
- After the PoC exploit for CVE-2024-3400, TAG-100 conducted reconnaissance and attempted exploitation against dozens of US-based organizations.
- The exploitation of vulnerable internet-facing devices reduces visibility and logging, increasing detection difficulty and risk of downtime, reputational damage, and fines.
- Mitigations emphasize IDS/IPS, monitoring external-facing services, prompt patching, network segmentation, MFA, and threat intelligence to detect and block TAG-100 infrastructure and activity.
MITRE Techniques
- [T1190] Exploit Public-Facing Application β Exploitation of internet-facing services, including the CVE-2024-3400 case. βFollowing the release of a PoC exploit for Palo Alto Networks GlobalProtect firewall vulnerability CVE-2024-3400, TAG-100 conducted reconnaissance and attempted exploitation against dozens of US-based organizations.β
- [T1133] External Remote Services β Gained initial access by targeting various internet-facing products to enable external access. βTAG-100 targeted various internet-facing products, including Citrix NetScaler, F5 BIG-IP, Zimbra, Microsoft Exchange, SonicWall, Cisco ASA, Palo Alto Networks GlobalProtect, and Fortinet FortiGate.β
- [T1595] Active Scanning β Conducted reconnaissance activities as part of preparing exploitation efforts. βTAG-100 conducted reconnaissance and attempted exploitation against dozens of US-based organizations.β
Indicators of Compromise
- [Tool] Pantegana β Go backdoor used post-exploitation; context: open-source tool referenced as part of the operation. Pantegana, SparkRAT
- [Tool] SparkRAT β Post-exploitation remote access tool used by TAG-100; context: open-source tool referenced in findings. SparkRAT
- [Vulnerability] CVE-2024-3400 β Palo Alto Networks GlobalProtect firewall vulnerability exploited; context: PoC exploit released and used. CVE-2024-3400
- [Software] Citrix NetScaler β Internet-facing product targeted; context: used as an initial access vector. Citrix NetScaler
- [Software] F5 BIG-IP β Internet-facing product targeted; context: used as an initial access vector. F5 BIG-IP