Frequently Asked Questions

Attack Campaign Details & Technical Insights

What vulnerability was exploited in the ManageEngine ADSelfService Plus targeted attack campaign?

The attackers exploited CVE-2021-40539, a REST API authentication bypass vulnerability that allows remote code execution on vulnerable devices. This was achieved by delivering crafted POST statements to the REST API LicenseMgr, enabling the installation of malicious payloads.

What tools did the attackers deploy during the campaign?

The attackers deployed the Godzilla webshell, NGLite backdoor, and KdcSponge credential stealer. Godzilla enabled command execution and lateral movement, NGLite provided anonymous remote control via blockchain-based NKN infrastructure, and KdcSponge harvested credentials from domain controllers.

How does the Godzilla webshell evade detection?

Godzilla uses AES encryption to obfuscate network traffic and has a low static detection rate across security vendor products. It parses inbound HTTP POST requests, decrypts data with a secret key, executes the decrypted content, and returns results via HTTP response, minimizing its footprint and risk of early detection.

What is the role of NGLite in the attack?

NGLite is an anonymous cross-platform remote control program based on blockchain technology. It uses the New Kind of Network (NKN) infrastructure for command-and-control communications, providing attackers with theoretical anonymity and rare C2 channel usage.

How does KdcSponge steal credentials?

KdcSponge injects into the LSASS process and hooks Kerberos API functions to intercept usernames and passwords. It identifies the Kerberos module version, hooks relevant APIs, and logs stolen credentials encrypted with XOR (key 0x55) in the system.dat file.

What files did the attackers target for exfiltration?

The attackers targeted the Active Directory database file (ntds.dit) and the SYSTEM hive from the registry, which contain sensitive information for further attacks and maintaining long-term access.

What were the main objectives of the threat actors?

The main objectives were to steal credentials for privileged accounts, maintain persistent access to high-value systems, and exfiltrate sensitive data from victim networks.

How did the attackers ensure redundancy in their toolset?

The attackers deployed both Godzilla and NGLite, which are publicly available tools, to ensure redundancy. If one tool was detected or disrupted, the other could maintain access to the compromised systems.

Why is Godzilla preferred over ChinaChopper by threat groups?

Godzilla is preferred due to its advanced evasion capabilities, AES encryption for network traffic, low detection rates, and richer functionality compared to ChinaChopper.

How can organizations defend against attacks like this?

Organizations should apply timely patches, adopt robust security validation processes, and use advanced threat simulation tools to identify and mitigate vulnerabilities before attackers exploit them.

What is the significance of using blockchain-based C2 channels like NKN?

Blockchain-based C2 channels like NKN provide attackers with theoretical anonymity and make detection more challenging, as such channels are rare and less likely to be monitored by traditional security tools.

How does credential theft impact an organization's security?

Credential theft enables attackers to escalate privileges, maintain persistent access, and exfiltrate sensitive data, significantly increasing the risk of ransomware deployment, policy modification, and disabling security tools.

What is the role of lateral movement in targeted attacks?

Lateral movement allows attackers to traverse the network, escalate privileges, and access high-value systems such as domain controllers, facilitating credential theft and data exfiltration.

How do attackers maintain persistence in compromised networks?

Attackers maintain persistence by deploying multiple tools (e.g., Godzilla, NGLite), stealing credentials, and creating backdoors, ensuring continued access even if some tools are detected or removed.

What is the impact of exploiting domain controllers in an attack?

Exploiting domain controllers allows attackers to access sensitive files (ntds.dit, SYSTEM hive), harvest credentials, and potentially control the entire network, leading to widespread compromise.

How do attackers use publicly available tools in sophisticated attacks?

Attackers leverage publicly available tools like Godzilla and NGLite, often with advanced evasion features, to ensure redundancy, minimize detection, and maximize their ability to maintain access and exfiltrate data.

What is the importance of decrypting and logging credentials in attacks?

Decrypting and logging credentials enables attackers to systematically harvest authentication details, escalate privileges, and maintain persistent access to critical systems.

How does the attack demonstrate evolving tactics in cybercrime?

The attack showcases the use of advanced and publicly available tools, rapid exploitation of vulnerabilities, and sophisticated evasion techniques, reflecting the evolving tactics of cybercriminals.

Cymulate Platform Features & Security Validation

What types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain, including phishing, malware, lateral movement, data exfiltration, and zero-day exploits, using daily updated threat templates and AI-generated attack plans. Learn more.

How quickly does Cymulate update its immediate threats module?

Cymulate's immediate threats module is updated rapidly to reflect new attacks, allowing organizations to quickly assess their IT estate for exposure and implement remedial actions promptly. Customers appreciate the speed and relevance of these updates for proactive defense. Source.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its ease of use and intuitive design. For example, Raphael Ferreira, Cybersecurity Manager, stated, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Source.

What are Cymulate's security and compliance certifications?

Cymulate is certified for SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to industry-leading security and privacy standards. Source.

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing is determined by the specific package, number of assets, and scenarios selected for testing and validation. For a detailed quote, schedule a demo. Source.

What integrations does Cymulate offer?

Cymulate integrates with a wide range of technology partners, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Rapid7 InsightVM, SentinelOne, Wiz, and more. For a full list, visit our technology alliances and partners page.

What business impact can customers expect from using Cymulate?

Customers can expect a 30% improvement in threat prevention, 52% reduction in critical exposures, 60% increase in operational efficiency, 40X faster threat validation, 85% improvement in threat detection accuracy, and an 81% reduction in cyber risk within four months (as seen in the Hertz Israel case study). Read the case study.

Who is the target audience for Cymulate's products?

Cymulate's solutions are designed for Security Operations teams, CISOs, Vulnerability Management teams, and Red Teams across industries such as finance, healthcare, retail, and technology. Learn more.

How does Cymulate differ from competitors like AttackIQ, Mandiant, Pentera, Picus Security, SafeBreach, and Scythe?

Cymulate stands out with its unified platform, industry-leading threat scenario library, AI-powered capabilities, ease of use, continuous innovation, and comprehensive exposure validation. For detailed comparisons, visit our competitor comparison page.

What are the key capabilities and benefits of Cymulate's platform?

Cymulate offers continuous threat validation, exposure awareness, defensive posture optimization, scalable offensive testing, cloud validation, collaboration across teams, and comprehensive integration of BAS, CART, and Exposure Analytics. Benefits include improved threat prevention, reduced critical exposures, increased efficiency, faster validation, enhanced detection, proven ROI, and ease of use. Learn more.

What technical documentation is available for Cymulate?

Cymulate provides a product whitepaper, custom attacks data sheet, technology integrations data sheet, solution briefs, and analyst reports. These resources offer comprehensive technical insights. View resources.

How long does it take to implement Cymulate?

Cymulate is known for quick and seamless implementation. It operates in agentless mode, requires minimal resources, and customers can start running simulations almost immediately after deployment. Comprehensive support and educational resources are available. Learn more.

What types of threats and techniques does Cymulate simulate for endpoint security validation?

Cymulate simulates known malicious file samples, malicious behaviors, ransomware, worms, trojans, rootkits, DLL side-loading, and code injection for endpoint security validation. Learn more.

What is threat exposure prioritization in cybersecurity?

Threat exposure prioritization is the process of identifying and ranking vulnerabilities based on their actual exploitability and impact on business-critical assets. Cymulate uses automated threat validation and exposure scoring to help teams focus on exposures not protected by security controls. Learn more.

What are malware-based network attacks and how can they be prevented?

Malware-based attacks include worms, trojans, and ransomware. Prevention strategies involve deploying advanced endpoint detection and response (EDR), regularly patching systems, monitoring for anomalous activity, and validating lateral movement controls. Learn more.

What constitutes an insider threat?

An insider threat is a security risk originating from within an organization, including malicious insiders, negligent insiders, and compromised insiders whose credentials have been stolen. Learn more.

What types of cyber threats does the financial services sector face?

The financial services sector faces sophisticated threats such as ransomware, phishing, and advanced persistent threats (APTs), requiring robust security controls for both internal systems and customer-facing applications. Learn more.

What is an example of Kerberos CNAME relay using ARP poisoning to ADCS web enrollment (ESC8)?

An attacker sets up a rogue DNS server and fake HTTP/SMB servers, poisons CNAME records, and uses ARP poisoning to redirect victims. The attacker relays Kerberos authentication to ADCS web enrollment, requesting certificates in the victim's name. Read the full walkthrough.

What is the Threat Exposure Validation Summer Series and why is it important for 2025?

The Threat Exposure Validation Summer Series highlights the necessity of threat exposure validation in 2025. Watch the video: Threat Exposure Validation Summer Series: Threat Exposure Validation is a must have in 2025 video.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Targeted Attack Campaign Against ManageEngine ADSelfService Plus Delivers Webshells, Trojan and Stealer

November 9, 2021

Exploitation and Initial Payload Deployment

Upon obtaining scan results, the threat actor transitioned to exploitation, focusing on CVE-2021-40539. This vulnerability allows for a REST API authentication bypass, leading to remote code execution in vulnerable devices. To exploit this, the attackers delivered uniquely crafted POST statements to the REST API LicenseMgr.

Following the initial exploitation, the attackers uploaded a payload to the victim network, which installed a Godzilla webshell. This activity was consistent across all victims, although a smaller subset of compromised organizations received a modified version of a new backdoor called NGLite.

Command Execution and Lateral Movement

Using either the Godzilla webshell or the NGLite payload, the threat actors executed commands and moved laterally across systems within the network. Their activities included exfiltrating files of interest by downloading them directly from the web server.

Once they pivoted to a domain controller, they installed a novel credential-stealing tool known as KdcSponge. This tool enabled them to gather credentials while maintaining access to the network.

Tools Deployed During the Attack

Godzilla Webshell

The Godzilla webshell played a central role in the attack. It is a functionality-rich tool designed to parse inbound HTTP POST requests, decrypt the data using a secret key, execute the decrypted content, and return the results via HTTP response.

This webshell, developed by a user named BeichenDream, was specifically created to avoid detection during red team engagements. It employs AES encryption to evade network detection and has a very low static detection rate across security vendor products.

The lightweight design of Godzilla ensures minimal impact on compromised systems while providing attackers with advanced capabilities. These include dynamically executing malicious code only when necessary, reducing the risk of early detection.

NGLite Backdoor

NGLite is characterized by its author as an "anonymous cross-platform remote control program based on blockchain technology." It uses the New Kind of Network (NKN) infrastructure for command-and-control (C2) communications, offering attackers theoretical anonymity. While NKN is a legitimate networking service, its use as a C2 channel is rare, making this attack unique.

KdcSponge Credential Stealer

After gaining access to domain controllers, the attackers deployed KdcSponge, a credential-stealing tool. It injects into the Local Security Authority Subsystem Service (LSASS) process and hooks specific Kerberos API functions to intercept usernames and passwords.

KdcSponge identifies the Kerberos module version using the TimeDateStamp in the PE file's IMAGE_FILE_HEADER section. With this information, it hooks relevant API functions and logs stolen credentials, which are encrypted using a simple XOR algorithm with the key 0x55 and stored in the system.dat file.

Attack Progression and Goals

After compromising the initial server, the attackers focused on gathering and exfiltrating sensitive information from domain controllers, including the Active Directory database file (ntds.dit) and the SYSTEM hive from the registry. These files provide a wealth of information for further attacks and maintaining long-term access.

Once these files were secured, the attackers shifted their attention to credential theft, using KdcSponge to harvest and store stolen authentication details. The ultimate objectives of the threat actors were to:

  1. Steal credentials for privileged accounts.
  2. Maintain persistent access to high-value systems.
  3. Exfiltrate sensitive data from victim networks.

Redundancy and Sophistication in Tool Use

Both Godzilla and NGLite were publicly available tools, developed with Chinese instructions and distributed via GitHub. Analysts believe the attackers deployed these tools in combination to ensure redundancy, maintaining access even if one tool was detected or disrupted.

Godzilla stood out for its advanced evasion capabilities, making it a preferred choice for regional threat groups. Its use of AES encryption for network traffic and low detection rates allowed attackers to bypass many security measures, while its functionality surpassed similar tools like ChinaChopper.

A Unique Threat Landscape

This attack demonstrated the sophistication and resourcefulness of the threat actors. By exploiting a known vulnerability, they quickly transitioned from initial access to credential theft and data exfiltration, leveraging a combination of advanced and publicly available tools.

The use of tools like Godzilla, NGLite, and KdcSponge highlights the evolving tactics employed by cybercriminals to achieve their goals while evading detection. Organizations must remain vigilant, applying timely patches and adopting robust security validation processes to mitigate such threats.