cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
401
Views
2
Helpful
4
Replies

Stun Attack

ankitohc
Spotlight
Spotlight

One incident happened where a user in my company complained that phishing emails were being sent from her O365 account. When I analyzed the PCAP, I noticed a connection established using STUN. It seems the intruder may have sent a link, and the user clicked on it, allowing the attacker to obtain her public IP address and port information.

Upon further investigation, we discovered a VBS script placed in the user’s public folder, which was automatically sending phishing emails to all users in the company. We deleted the script and stopped the scheduled task.

My main question is: how did the attacker gain access to her system behind the NAT? If I obtain someone's public IP address and port, can I exploit their system? What methods might the intruder have used to compromise the machine?

Sorry, but I am really curious to know this.

ending with 63.147 is our o365 ip address and ending with 226.333 (intruder) may be and 10.100.54.228 is user's machine ip
 
 

 

ankitohc_0-1739909567029.png

 

4 Replies 4

Hello @ankitohc ,

take a look at the following document which describes STUN and what it does: https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/217599-understand-nat-to-enable-peer-to-peer-co.html

I think your user was the victim of an attacker who managed to get details about users phone number or IM account. If the user was texting the attacker from a client app installed on the users workstation, the attacker knowing the external NAT IP address and port could have gained access to the workstation using some crafted packets destined to the external NAT IP address and port.

HTH

Regards, LG
*** Please Rate All Helpful Responses ***

Sheraz.Salim
VIP Alumni
VIP Alumni

Here are my thoughts on this based on the incident described, it appears attacker employed a sophisticated multi-step approach to compromise the your user's system and Office 365 account. The attack mostly likely began with a phishing email containing a malicious link(url). Once clicked, this link probably take to a page that used WebRTC and STUN to obtain the user's public IP address and port information, bypassing NAT protection.

The attacker then likely used this information to scan the internal network, exploit vulnerabilities in public-facing applications, or take advantage of misconfigurations in the NAT/firewall to gain initial access. Once inside the network, the attacker probably stole the user's Office 365 credentials, either through a fake login page or by exploiting a vulnerability in the user's system.

Once With these stolen credentials, the attacker accessed the user's Office 365 account and placed a VBS script in the public folder. They also set up a scheduled task to run this script, establishing persistence and the ability to send phishing emails to other users in the company.

Be mindfull that while obtaining someone's public IP address and port information doesn't automatically allow for system exploitation (also know as reconnaissance), it can serve as a starting point for more targeted attacks, especially if there are vulnerabilities in the network configuration/public-facing services.

To mitigate such risks in the future, Consider implementing multi-factor authentication, regular system updates (vulnerability test/Pentest), strong network segmentation (with Layer 7 IPS), employee security training, advanced email filtering, and logging monitoring for suspicious activities are all crucial steps. Security is an ongoing process that requires continuous assessment and improvement to stay ahead of evolving threats.

please do not forget to rate.

Is there any way to know what vulnerabilities the attacker used to gain access to the system? If so, can you tell me what they are in general?

@ankitohcyou need to run/install vulnerabilities software in your production network inside network and outside network. Also make sure you have permission to do so in prior to run this scan as sometime they are quite noisy and generate alot of alerts.Check this link Here it will give you a start in order to protect your network.

please do not forget to rate.
Review Cisco Networking for a $25 gift card