Description |
This article explains how Lacework FortiCNAPP can help detect post-exploitation behaviors following the exploitation of Ivanti Cloud Services Appliance (CSA) vulnerabilities (CVE-2024-9379, CVE-2024-9380, CVE-2024-9381). Although "Cloud" is in the name, Ivanti CSA is a perimeter authentication appliance rather than a cloud-native service. As a result, Lacework does not directly detect the initial exploitation of Ivanti CSA. However, if attackers use Ivanti CSA as an entry point to pivot into cloud environments, Lacework can identify post-compromise behaviors such as credential theft, privilege escalation, and lateral movement. |
Scope |
Attackers exploiting Ivanti CSA vulnerabilities may:
Lacework FortiCNAPP detects these post-exploitation behaviors using composite alerts that correlate multiple signals within cloud environments. |
Solution |
Detecting Post-Exploitation with Lacework FortiCNAPP Alerts (see next table) |
Additional Resources |
https://www.fortiguard.com/outbreak-alert/ivanti-csa-zero-day-attack
https://www.ivanti.com/blog/october-2024-security-update https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a |
How Lacework FortiCNAPP can help
Lacework composite alerts help detect attacker activity in cloud environments:
Threat Type | Lacework FortiCNAPP Alert | Description |
Unusual IAM Role Assumptions (Stolen Credentials) | Potentially Compromised AWS Keys | Detects anomalous use of AWS IAM credentials |
Potentially Compromised Azure Identity | Detects unexpected Azure identity usage | |
Potentially Compromised Google Cloud Identity | Detects unauthorized access to Google Cloud identities | |
AWS: Anomalous API Activity (Privilege Escalation, Cloud Modifications) |
|
Identifies API activity indicative of an attack on AWS |
Azure: Anomalous API Activity (Privilege Escalation, Cloud Modifications) |
New Azure API Failed with Error New Azure API Call Invoked by User Accessed Resource for the First Time |
Identifies API activity indicative of an attack on Azure |
Google Cloud: Anomalous API Activity (Privilege Escalation, Cloud Modifications) | Identifies API activity indicative of an attack on Google Cloud |
Recommended Actions
1) Apply Ivanti's security patches to mitigate initial exploitation
2) Monitor IAM & API activity logs for unusual access in AWS, Azure, and Google Cloud
3) Use Lacework FortiCNAPP anomaly detection to spot attack behavior across cloud environments