GLASSTOKEN

GLASSTOKEN is a custom web shell used by threat actors during Cutting Edge to execute commands on compromised Ivanti Secure Connect VPNs.[1]

ID: S1117
Type: MALWARE
Platforms: Network
Version: 1.0
Created: 06 March 2024
Last Modified: 06 March 2024

Techniques Used

Domain ID Name Use
Enterprise T1140 反混淆/解码文件或信息

GLASSTOKEN has the ability to decode hexadecimal and Base64 C2 requests.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

GLASSTOKEN can use PowerShell for command execution.[1]

Enterprise T1132 .001 数据编码: Standard Encoding

GLASSTOKEN has hexadecimal and Base64 encoded C2 content.[1]

Enterprise T1505 .003 服务器软件组件: Web Shell

GLASSTOKEN is a web shell capable of tunneling C2 connections and code execution on compromised Ivanti Secure Connect VPNs.[1]

Campaigns

ID Name Description
C0029 Cutting Edge

[1]

References