BOLDMOVE is a type of backdoor malware written in C linked to People’s Republic of China operations from 2022 through 2023. BOLDMOVE includes both Windows and Linux variants, with some Linux variants specifically designed for FortiGate Firewall devices. BOLDMOVE is linked to zero-day exploitation of CVE-2022-42475 in FortiOSS SSL-VPNs.[1] The record for BOLDMOVE only covers known Linux variants.
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
BOLDMOVE uses web services for command and control communication.[1] |
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell | |
Enterprise | T1554 | Compromise Host Software Binary |
BOLDMOVE contains a watchdog-like feature that monitors a particular file for modification. If modification is detected, the legitimate file is backed up and replaced with a trojanized file to allow for persistence through likely system upgrades.[1] |
|
Enterprise | T1543 | Create or Modify System Process |
BOLDMOVE can free all resources and terminate itself on victim machines.[1] |
|
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
BOLDMOVE uses the WolfSSL library to implement SSL encryption for command and control communication.[1] |
Enterprise | T1480 | Execution Guardrails |
BOLDMOVE verifies it is executing from a specific path during execution.[1] |
|
Enterprise | T1190 | Exploit Public-Facing Application |
BOLDMOVE is associated with exploitation of CVE-2022-49475 in FortiOS.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
BOLDMOVE can list information of all files in the system recursively from the root directory or from a specified directory.[1] |
|
Enterprise | T1564 | .011 | Hide Artifacts: Ignore Process Interrupts |
BOLDMOVE calls the signal function to ignore the signals SIGCHLD, SIGHIP, and SIGPIPE prior to starting primary logic.[1] |
Enterprise | T1562 | Impair Defenses |
BOLDMOVE can modify proprietary Fortinet logs on victim machines.[1] |
|
.006 | Indicator Blocking |
BOLDMOVE can disable the Fortinet daemons |
||
Enterprise | T1070 | .004 | Indicator Removal: File Deletion | |
Enterprise | T1090 | .003 | Proxy: Multi-hop Proxy |
BOLDMOVE is capable of relaying traffic from command and control servers to follow-on systems.[1] |
Enterprise | T1082 | System Information Discovery |
BOLDMOVE performs system survey actions following initial execution.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
BOLDMOVE enumerates network interfaces on the infected host.[1] |