ZIPLINE is a passive backdoor that was used during Cutting Edge on compromised Secure Connect VPNs for reverse shell and proxy functionality.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
ZIPLINE can use |
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
ZIPLINE can use AES-128-CBC to encrypt data for both upload and download.[2] |
Enterprise | T1083 | File and Directory Discovery |
ZIPLINE can find and append specific files on Ivanti Connect Secure VPNs based upon received commands.[1] |
|
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
ZIPLINE can add itself to the exclusion list for the Ivanti Connect Secure Integrity Checker Tool if the |
Enterprise | T1105 | Ingress Tool Transfer |
ZIPLINE can download files to be saved on the compromised system.[1][2] |
|
Enterprise | T1095 | Non-Application Layer Protocol |
ZIPLINE can communicate with C2 using a custom binary protocol.[2] |
|
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1090 | Proxy |
ZIPLINE can create a proxy server on compromised hosts.[1][2] |
|
Enterprise | T1205 | Traffic Signaling |
ZIPLINE can identify a specific string in intercepted network traffic, |
ID | Name | Description |
---|---|---|
C0029 | Cutting Edge |