Hackers Exploit Cortex XDR Live Terminal For C2 Communications, Compromising Enterprise Security

Hackers Exploit Cortex XDR Live Terminal For C2 Communications, Compromising Enterprise Security
Hackers Exploit Cortex XDR Live Terminal For C2 Communications, Compromising Enterprise Security
The Live Terminal feature in Cortex XDR, a widely used endpoint detection and response (EDR) tool, has become a new target for cybercriminals.

This feature, originally designed to enable legitimate system administration, has been exploited by attackers as a covert Command and Control (C2)

channel to control victim systems without detection remotely.

The ability to manipulate Cortex XDR’s Live Terminal poses a severe risk to enterprises, compromising the security of their network infrastructure.

A Covert Command and Control Channel

Cortex XDR’s Live Terminal feature is rich with functionalities, including command execution, file exploration, and PowerShell support.

It also allows attackers to execute Python scripts and explore processes on compromised systems.

Attackers can use this built-in feature to communicate with their C2 server undetected by bypassing traditional network traffic monitoring methods.

This technique, often referred to as “Living off the Land” (LotL), requires minimal effort and is often overlooked by network defenses due to its native integration into enterprise traffic flows.

One significant risk of this vulnerability is that it does not require advanced development skills. Attackers can exploit this feature using basic tools and configurations, making it a popular choice for malicious actors.

Furthermore, Cortex XDR’s built-in security features, such as TLS interception and certificate enforcement, can be bypassed with minor tweaks, allowing attackers to use WebSockets for direct communication with their C2 servers.

Hackers Exploit Cortex XDR (Source: infoguard)
Hackers Exploit Cortex XDR (Source: infoguard)

Research and Methods Of Exploitation

Research by cybersecurity experts revealed that attackers can easily exploit the Live Terminal feature for C2 communication.

They identified that Cortex XDR’s agent does not employ certificate or CA pinning, which leaves the door open for attackers to intercept network traffic.

This means attackers can send WebSocket messages from the Live Terminal session to any malicious server they control.

The exploitation process can be done in two main ways: Cross-Tenant and Custom Server Creation. In the first method, an attacker with their own Cortex tenant can generate a WebSocket message containing the victim’s host details, thereby intercepting the victim’s connection.

The second method allows attackers to replicate the WebSocket communication on their own server, bypassing the need for a legitimate Cortex XDR tenant.

This method requires minimal development effort and can be achieved by modifying the Cortex agent’s configuration to accept a custom server host.

While this vulnerability requires local administrator privileges to exploit, there are detection methods to identify unusual activities.

For instance, defenders can monitor for suspicious parent process values in process creation events. If a non-standard parent process executes Cortex XDR’s payload, it should trigger an alert.

Unfortunately, this detection method is reactive, and an attacker could still potentially evade detection if they bypass prevention rules.

Hackers Exploit Cortex XDR (Source: infoguard)
Hackers Exploit Cortex XDR (Source: infoguard)

To fully mitigate this risk, a more secure-by-design approach is necessary. One key improvement would be implementing mutual authentication and cryptographic command signing to ensure the integrity of the communication.

Currently, there are no inherent mitigations within the Live Terminal feature’s architecture to prevent such abuse, highlighting a significant security design gap in the product.

According to Infoguard, this research underscores the need for enhanced security in EDR tools such as Cortex XDR.

While these tools are designed to protect against attacks, they can also be used by attackers to infiltrate networks.

Vendors need to adopt more robust security measures, such as cryptographic protections and secure communication protocols, to prevent such vulnerabilities from being exploited in the future.

Enterprises should stay vigilant, monitor for suspicious activity, and ensure their security tools are up to date with the latest protections.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Hackers Exploit Cortex XDR Live Terminal For C2 Communications, Compromising Enterprise Security appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading