{"id":90305,"date":"2019-12-12T09:00:10","date_gmt":"2019-12-12T17:00:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90305"},"modified":"2023-05-26T14:11:10","modified_gmt":"2023-05-26T21:11:10","slug":"gallium-targeting-global-telecom","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/12\/12\/gallium-targeting-global-telecom\/","title":{"rendered":"GALLIUM: Targeting global telecom"},"content":{"rendered":"
Microsoft Threat Intelligence Center (MSTIC) is raising awareness of the ongoing activity by a group we call GALLIUM, targeting telecommunication providers. When Microsoft customers have been targeted by this activity, we notified them directly with the relevant information they need to protect themselves. By sharing the detailed methodology and indicators related to GALLIUM activity, we\u2019re encouraging the security community to implement active defenses to secure the broader ecosystem from these attacks.<\/p>\n
To compromise targeted networks, GALLIUM target unpatched internet-facing services using publicly available exploits and have been known to target vulnerabilities in WildFly\/JBoss. Once persistence is established in a network, GALLIUM uses common techniques and tools like Mimikatz to obtain credentials that allows for lateral movement across the target network. Within compromised networks, GALLIUM makes no attempt to obfuscate their intent and are known to use common versions of malware and publicly available toolkits with small modifications. The operators rely on low cost and easy to replace infrastructure that consists of dynamic-DNS domains and regularly reused hop points.<\/p>\n
This activity from GALLIUM has been identified predominantly through 2018 to mid-2019. GALLIUM is still active; however, activity levels have dropped when compared to what was previously observed.<\/p>\n
Following Microsoft\u2019s internal practices of assigning chemical elements to activity groups, GALLIUM is the code name for this activity group.<\/p>\n
Reconnaissance methods<\/strong><\/p>\n As is often the case with the reconnaissance methods, it\u2019s difficult to be definitive about those employed by GALLIUM. This is due to the passive nature of reconnaissance activities by the actor including the use of freely available data from open sources, such as public websites and social media outlets. However, based on MSTIC analyst assessments, GALLIUM\u2019s exploitation of internet-facing services indicates it\u2019s likely they use open source research and network scanning tools to identify likely targets.<\/p>\n To gain initial access a target network, GALLIUM locates and exploits internet-facing services such as web servers. GALLIUM has been observed exploiting unpatched web services, such as WildFly\/JBoss, for which exploits are widely available. Compromising a web server gives GALLIUM a foothold in the victim network that doesn\u2019t require user interaction, such as traditional delivery methods like phishing.<\/p>\n Following exploitation of the web servers, GALLIUM actors typically install web shells<\/a>, and then install additional tooling to allow them to explore the target network.<\/p>\n Lateral movement<\/strong><\/p>\n GALLIUM uses a variety of tools to perform reconnaissance and move laterally within a target network. The majority of these are off-the-shelf tools or modified versions of known security tools. MSTIC investigations indicate that GALLIUM modifies its tooling to the extent it evades antimalware detections rather than develop custom functionality. This behavior has been observed with GALLIUM actors across several operational areas.<\/p>\n GALLIUM has been observed using several tools. Samples of the most prevalent are noted in Table 1.<\/p>\nDelivery and exploitation<\/h3>\n