Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Seashell Blizzard Subgroup's Campaign Exploiting Vulnerabilities for Data Exfiltration

Type
Campaign
Actors
Seashell Blizzard
Pub. date
February 13, 2025
Initial access
1-day vulnerability
Impact
Data exfiltration
Observed techniques
Vulnerability exploitationCredential theft
Observed tools
ChiselrsockstunLocalOlive shell
Targeted technologies
TeamCityZimbra ServerMicrosoft ExchangeOpenfireMicrosoft Outlook
References
https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/
Status
Finalized
Last edited
Feb 18, 2025 2:31 PM

The BadPilot campaign operates as a horizontally scalable cyber operation, compromising a wide range of internet-facing systems using publicly available exploits. The subgroup conducts broad scanning for vulnerable systems and leverages commodity exploits to infiltrate networks. Once inside, the attackers establish persistence through remote management tools, web shells, and Tor-based covert access.

Since late 2021, the subgroup has been exploiting multiple vulnerabilities, including Microsoft Exchange (CVE-2021-34473), Zimbra (CVE-2022-41352), OpenFire (CVE-2023-32315), JetBrains TeamCity (CVE-2023-42793), and Microsoft Outlook (CVE-2023-23397). In early 2024, they shifted tactics, increasingly deploying remote monitoring and management (RMM) software such as Atera Agent and Splashtop Remote Services. By exploiting ConnectWise ScreenConnect and Fortinet FortiClient EMS, attackers achieved remote code execution (RCE) and deployed ShadowLink, a persistence mechanism that uses Tor hidden services to evade detection.

The campaign follows a structured attack lifecycle, starting with initial access via public exploits, followed by persistence through web shells (LocalOlive), credential harvesting, and tunneling utilities like Chisel and rsockstun. Microsoft also observed modifications to Outlook Web Access (OWA) login pages and DNS configurations, likely aimed at credential theft and expanding network influence.

Made with 💙 by Wiz

Last Updated: April 3, 2025