China-linked Flax Typhoon alters ArcGIS plugin into hidden backdoor
We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!
Brief Overview
- State-affiliated espionage organization Flax Typhoon discreetly altered an ArcGIS plugin into a remote shell.
- The breach sustained access for more than a year, even affecting system backups.
- Flax Typhoon mainly targets government entities and vital infrastructure.
- The organization employs legitimate system utilities to avoid being detected.
- Esri acknowledged the first recorded instance of a harmful SOE being weaponized.
- Behavioral monitoring and cryptographic integrity validations are crucial for detection.
Overview of Flax Typhoon’s Espionage
Security analysts have revealed how the state-affiliated espionage organization Flax Typhoon has cleverly transformed a reliable ArcGIS plugin into a remote shell. This surreptitious initiative enabled them to retain access to targeted systems for over a year, even affecting system backups.
Altering ArcGIS for Espionage
Flax Typhoon initially compromised an ArcGIS portal administrator account, executing harmful code on an internal server. They altered a legitimate ArcGIS server object extension (SOE), modifying the Java code to create a concealed command interface. This interface accepted base64-encoded commands and executed them on the host machine, facilitating undetected activities.
Enduring Persistence and Network Exploration
Once the compromised SOE became active, Flax Typhoon mapped the network and set up long-term persistence. They barred competing intruders with a hard-coded access key and deployed a renamed SoftEther VPN binary into the Windows System32 directory. This configuration maintained control via an encrypted channel, blending seamlessly with regular traffic.
Consequences for Critical Infrastructure
ArcGIS, developed by Environmental Systems Research Institute (Esri), is instrumental in managing spatial data vital for disaster recovery and urban planning. A single compromise can unveil sensitive infrastructure information, rendering the platform advantageous for espionage initiatives aimed at infrastructure weaknesses. Esri confirmed this innovative method as the first documented case of a malicious SOE being weaponized in such a fashion.
Identifying and Preventing Future Breaches
ReliaQuest recommends that behavioral monitoring could have potentially identified the attack earlier. Monitoring unusual network activity from server components and confirming the cryptographic integrity of trusted components is essential for protection. Solely depending on file names or digital signatures is inadequate.
A Quiet, Patient Threat Actor
Active since at least mid-2021, Flax Typhoon predominantly targets government offices, educational institutions, and essential manufacturing companies. The group also focuses on organizations in Southeast Asia, North America, and Africa. They utilize living-off-the-land strategies, applying legitimate system utilities to maintain a low profile and taking advantage of known vulnerabilities in public-facing servers.
Conclusion
The discovery of Flax Typhoon’s covert backdoor within an ArcGIS plugin underscores the advanced tactics of state-affiliated espionage operations. By modifying authentic software, the group successfully evaded detection while undermining critical infrastructure. Enhanced behavioral monitoring and cryptographic integrity checks are vital in safeguarding against such threats.