Data leak

Red Cross International ICRC Data Breach β€” 515,000 Vulnerable People Records

πŸ“… 2022-01-18 🏒 International Committee of the Red Cross (ICRC) / Zoho ManageEngine ADSelfService Plus 🦠 BEACON, GLASSTOKEN (custom malware) πŸ”Ž CVE-2021-40539
Primary Source β†—

Incident Details

On 18 January 2022, the International Committee of the Red Cross (ICRC) discovered a cyberattack on servers hosted by a contractor in Switzerland that stored data for its Restoring Family Links program β€” a service that helps reconnect families separated by conflict, disasters, or migration. The breach exposed data for approximately 515,000 highly vulnerable people including: missing persons and their families, detainees and their families, unaccompanied minors, and people separated from their families due to conflict, migration, and disasters. The ICRC publicly disclosed the breach on 19 January 2022. The ICRC took the affected systems offline and appealed publicly to the attackers not to share, sell, leak, or otherwise use the data, as doing so could cause significant harm to the most vulnerable. A subsequent ICRC investigation concluded the attack was deliberate, targeted, and sophisticated β€” assessing with high confidence that a state-sponsored actor was responsible. The attackers used CVE-2021-40539 in Zoho ManageEngine (a critical authentication bypass) exploited by APT40 and other state-sponsored groups. Obfuscation techniques and anti-forensics tools used suggested a nation-state actor. The ICRC’s data was particularly sensitive because it facilitates communication between people in conflict zones with their families β€” potentially including conflict combatants and detainees whose location information could be life-threatening if disclosed.

Technical Details

Initial Attack Vector
Sophisticated nation-state-level attacker (ICRC later assessed the attack as deliberate, targeted, and state-sponsored) exploited an unpatched critical authentication bypass vulnerability (CVE-2021-40539) in Zoho ManageEngine ADSelfService Plus deployed by a third-party contractor; attacker deployed webshells and custom malware BEACON and GLASSTOKEN
Vendor / Product
International Committee of the Red Cross (ICRC) / Zoho ManageEngine ADSelfService Plus
Malware Family
BEACON, GLASSTOKEN (custom malware)
CVE / GHSA References
CVE-2021-40539

Timeline

  1. 2022-01-18 Breach occurred
  2. 2022-01-19 Publicly disclosed
  3. 2022-01-19 Customers notified