/*! elementor-pro - v3.26.0 - 17-12-2024 */
(()=>{"use strict";class Screenshot extends elementorModules.ViewModule{getDefaultSettings(){return{empty_content_headline:"Empty Content.",crop:{width:1200,height:1500},excluded_external_css_urls:["https://kit-pro.fontawesome.com"],external_images_urls:["https://i.ytimg.com"],timeout:15e3,render_timeout:5e3,timerLabel:null,timer_label:`${ElementorScreenshotConfig.post_id} - timer`,image_placeholder:"data:image/gif;base64,R0lGODlhAQABAIAAAP///wAAACwAAAAAAQABAAACAkQBADs=",isDebug:elementorCommonConfig.isElementorDebug,isDebugSvg:!1,...ElementorScreenshotConfig}}getDefaultElements(){const e=jQuery(ElementorScreenshotConfig.selector),t=e.find(".elementor-section-wrap > .elementor-section, .elementor > .elementor-section");return{$elementor:e,$sections:t,$firstSection:t.first(),$notElementorElements:elementorCommon.elements.$body.find("> *:not(style, link)").not(e),$head:jQuery("head")}}onInit(){return super.onInit(),this.log("Screenshot init","time"),this.timeoutTimer=setTimeout(this.screenshotFailed.bind(this),this.getSettings("timeout")),this.captureScreenshot()}captureScreenshot(){return this.elements.$elementor.length||(elementorCommon.helpers.consoleWarn("Screenshots: The content of this page is empty, the module will create a fake conent just for this screenshot."),this.createFakeContent()),this.removeUnnecessaryElements(),this.handleIFrames(),this.removeFirstSectionMargin(),this.handleLinks(),this.loadExternalCss(),this.loadExternalImages(),Promise.resolve().then(this.createImage.bind(this)).then(this.createImageElement.bind(this)).then(this.cropCanvas.bind(this)).then(this.save.bind(this)).then(this.screenshotSucceed.bind(this)).catch(this.screenshotFailed.bind(this))}createFakeContent(){this.elements.$elementor=jQuery("
").css({fontSize:"85px"}).html(this.getSettings("empty_content_headline"))),document.body.prepend(this.elements.$elementor)}loadExternalCss(){const e=[this.getSettings("home_url"),...this.getSettings("excluded_external_css_urls")].map((e=>`[href^="${e}"]`)).join(", ");jQuery("link").not(e).each(((e,t)=>{const s=jQuery(t),n=s.clone();n.attr("href",this.getScreenshotProxyUrl(s.attr("href"))),this.elements.$head.append(n),s.remove()}))}loadExternalImages(){const e=this.getSettings("external_images_urls").map((e=>`img[src^="${e}"]`)).join(", ");jQuery(e).each(((e,t)=>{const s=jQuery(t);s.attr("src",this.getScreenshotProxyUrl(s.attr("src")))}))}handleIFrames(){this.elements.$elementor.find("iframe").each(((e,t)=>{const s=jQuery(t),n=jQuery("",{css:{background:"gray",width:s.width(),height:s.height()}});s.before(n),s.remove()}))}removeUnnecessaryElements(){let e=0;this.elements.$sections.filter(((t,s)=>{let n=!1;return e>=this.getSettings("crop.height")&&(n=!0),e+=jQuery(s).outerHeight(),n})).each(((e,t)=>{t.remove()})),this.elements.$notElementorElements.remove()}handleLinks(){elementorCommon.elements.$body.find("a").attr("href","/")}removeFirstSectionMargin(){this.elements.$firstSection.css({marginTop:0})}createImage(){const e=new Promise((e=>{window.addEventListener("load",(()=>{e()}))})),t=new Promise((e=>{setTimeout((()=>{e()}),this.getSettings("render_timeout"))}));return Promise.race([e,t]).then((()=>{if(this.log("Start creating screenshot."),this.getSettings("isDebugSvg"))return domtoimage.toSvg(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}).then((e=>this.download(e))),Promise.reject("Debug SVG.");return/^((?!chrome|android).)*safari/i.test(window.userAgent)?(this.log('Creating screenshot with "html2canvas"'),html2canvas(document.body).then((e=>e.toDataURL("image/png")))):(this.log('Creating screenshot with "dom-to-image"'),domtoimage.toPng(document.body,{imagePlaceholder:this.getSettings("image_placeholder")}))}))}download(e){const t=jQuery("",{href:e,download:"debugSvg.svg",html:"Download SVG"});elementorCommon.elements.$body.append(t),t.trigger("click")}createImageElement(e){const t=new Image;return t.src=e,new Promise((e=>{t.onload=()=>e(t)}))}cropCanvas(e){const t=this.getSettings("crop.width"),s=this.getSettings("crop.height"),n=document.createElement("canvas"),i=n.getContext("2d"),o=t/e.width;return n.width=t,n.height=s>e.height?e.height:s,i.drawImage(e,0,0,e.width,e.height,0,0,e.width*o,e.height*o),Promise.resolve(n)}save(e){return new Promise(((t,s)=>{elementorCommon.ajax.addRequest("screenshot_save",{data:{post_id:this.getSettings("post_id"),screenshot:e.toDataURL("image/png")},success:e=>{this.log(`Screenshot created: ${encodeURI(e)}`),t(e)},error:()=>{this.log("Failed to create screenshot."),s()}})}))}markAsFailed(){return new Promise(((e,t)=>{elementorCommon.ajax.addRequest("screenshot_failed",{data:{post_id:this.getSettings("post_id")},success:()=>{this.log("Marked as failed."),e()},error:()=>{this.log("Failed to mark this screenshot as failed."),t()}})}))}getScreenshotProxyUrl(e){return`${this.getSettings("home_url")}?screenshot_proxy&nonce=${this.getSettings("nonce")}&href=${e}`}screenshotSucceed(e){this.screenshotDone(!0,e)}screenshotFailed(e){this.log(e,null),this.markAsFailed().then((()=>this.screenshotDone(!1)))}screenshotDone(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:null;clearTimeout(this.timeoutTimer),this.timeoutTimer=null,window.parent.postMessage({name:"capture-screenshot-done",success:e,id:this.getSettings("post_id"),imageUrl:t},"*"),this.log(`Screenshot ${e?"Succeed":"Failed"}.`,"timeEnd")}log(e){let t=arguments.length>1&&void 0!==arguments[1]?arguments[1]:"timeLog";this.getSettings("isDebug")&&(console.log("string"==typeof e?`${this.getSettings("post_id")} - ${e}`:e),t&&console[t](this.getSettings("timer_label")))}}jQuery((()=>{new Screenshot}))})();{"id":841,"date":"2024-11-23T17:25:09","date_gmt":"2024-11-23T17:25:09","guid":{"rendered":"https:\/\/thetach.com\/?p=841"},"modified":"2024-11-23T17:25:11","modified_gmt":"2024-11-23T17:25:11","slug":"russian-hackers-exploit-wi-fi-to-breach-u-s-firm-in-nearest-neighbor-attack","status":"publish","type":"post","link":"https:\/\/thetach.com\/?p=841","title":{"rendered":"Russian Hackers Exploit Wi-Fi to Breach U.S. Firm in ‘Nearest Neighbor Attack’"},"content":{"rendered":"\n
Russian state-sponsored hackers, APT28<\/strong> Fancy Bear<\/strong>, Forest Blizzard<\/strong>, or Sofacy<\/strong> successfully executed a sophisticated Nearest Neighbor Attack<\/strong> on a U.S. company. This operation, involving a breach of the target’s enterprise Wi-Fi network<\/strong> from thousands of miles away, highlights the risks of advanced hacking techniques. The attack exploited the networks belonging to other related organizations as hop-points, revealing that even large organizations\u2019 corporate Wi-Fi <\/strong>often has weak security.<\/p>\n\n\n\n
The Russian hack was found out on February 4, 2022, by cybersecurity firm Volexity <\/strong>while investigating a compromised server at another firm with offices in Washington, D.C., that worked on Ukraine related projects. This incident opened the eyes to the weakness of Wi-Fi networks<\/strong> and proved the advancement of the APT such as APT28 which executed its operation from Russia\u2019s military unit 26165 of the Main Staff of the GRU.<\/p>\n\n\n\n
Understanding the ‘Nearest Neighbor Attack’ Strategy<\/strong><\/h2>\n\n\n\n
The Nearest Neighbor attack <\/strong>can be considered as a new concept of hacker tool that revolutionizes the way physical proximity to the target is no longer needed. Hackers can exploit these networks as intermediaries by breaching neighboring organizations within the Wi-Fi range<\/strong>. This tactic not only bypasses geographical limitations but also reduces the likelihood of detection, making it an attractive option for state-sponsored hackers<\/strong> like APT28. APT28 began by acquiring credentials to the target\u2019s enterprise Wi-Fi network<\/strong> using password-spraying attacks<\/strong> on public-facing services. However, multi-factor authentication (MFA)<\/strong> protections prevented these credentials from being used over the internet. <\/p>\n\n\n\n
To circumvent this, the hackers targeted nearby organizations, looking for dual-home devices<\/strong> those with both wired and wireless connections. These devices acted as bridges, enabling the hackers to connect to the target\u2019s Wi-Fi network<\/strong> without triggering MFA alerts. This approach highlighted a creative evolution in hacking tactics, underscoring the urgency for organizations to rethink traditional network security practices. Even small lapses in Wi-Fi network security<\/strong> can open the door for advanced cyberattacks<\/strong>, leading to severe consequences.<\/p>\n\n\n\n
Step-by-Step Execution of the Nearest Neighbor Attack<\/strong><\/h2>\n\n\n\n
The Nearest Neighbor Attack<\/strong> was executed through a series of calculated steps: Initial Breach:<\/strong> APT28 compromised a nearby organization using stolen credentials. Search for Dual-Home Devices:<\/strong> Devices capable of bridging wired and wireless networks were identified. Daisy-Chaining Connections:<\/strong> Multiple intermediary networks were breached, allowing the hackers to move closer to the target. Wi-Fi Network Infiltration:<\/strong> A device capable of connecting to the target’s enterprise Wi-Fi<\/strong> was located.<\/p>\n\n\n\n
Network Access:<\/strong> The hackers accessed the target\u2019s Wi-Fi network through wireless access points near a conference room. By leveraging these steps, APT28 successfully infiltrated the target network without being physically present, redefining the boundaries of close-access attacks<\/strong>. Their creativity in bypassing traditional network security measures demonstrates their high skill level and adaptability in exploiting novel attack vectors.<\/p>\n\n\n\n
Lateral Movement and Data Theft<\/strong><\/h2>\n\n\n\n
Once inside the target’s network, APT28 employed Remote Desktop Protocol (RDP)<\/strong> to navigate laterally. Using an unprivileged account, the hackers searched for sensitive systems and deployed a script named servtask.bat<\/strong>. This script enabled them to extract critical Windows registry hives<\/strong>, including SAM, Security, and System files. The extracted files compressed into a ZIP archive<\/strong> and prepared for exfiltration. To remain undetected, the hackers relied on native Windows tools<\/strong>, minimizing their operational footprint. Evidence suggests that APT28 exploited the CVE-2022-38028 zero-day vulnerability<\/strong> in the Windows Print Spooler service to escalate privileges.\u00a0<\/p>\n\n\n