Supply chain

Barracuda Email Security Gateway Zero-Day CVE-2023-2868 β€” UNC4841 China APT

πŸ“… 2022-10-01 🏒 Barracuda Email Security Gateway (ESG) hardware appliance 🦠 SALTWATER, SEASPY, SEASIDE, SUBMARINE, WHIRLPOOL πŸ”Ž CVE-2023-2868
Primary Source β†—

Incident Details

Beginning in October 2022 (nearly eight months before disclosure), UNC4841 β€” a China-nexus espionage group assessed by Mandiant as acting in support of Chinese state interests β€” exploited CVE-2023-2868 in Barracuda’s Email Security Gateway hardware appliances. The vulnerability resided in the TAR file scanning module and was triggered by sending a specially crafted email to any recipient at an organisation using a Barracuda ESG β€” no authentication required. Barracuda discovered the zero-day on 19 May 2023 and released patches, but the attack had been ongoing for seven months. The attackers deployed multiple custom malware families β€” SALTWATER, SEASPY, SEASIDE β€” as persistent backdoors on ESG appliances. Even after Barracuda patched the vulnerability, UNC4841 deployed new malware variants (SUBMARINE, WHIRLPOOL) specifically to maintain persistence on patched devices. Barracuda took the unprecedented step in June 2023 of recommending all ESG appliance customers replace their physical hardware entirely β€” a highly unusual ‘replace, don’t patch’ recommendation indicating the depth of the firmware-level compromise. CISA and FBI issued a joint advisory (AA23-209A). Targeting was predominantly government-focused: approximately 55% of victims were government organisations including the US Department of Defense, EU member state foreign affairs ministries, and multiple Asian government entities. The attack affected organisations in approximately 16 countries. The operation demonstrated the strategic value of targeting internet-facing email security appliances β€” which process all inbound email with elevated privileges and are difficult to monitor β€” as persistent espionage footholds.

Technical Details

Initial Attack Vector
UNC4841 (China-nexus APT) exploited CVE-2023-2868, a remote command injection zero-day in Barracuda ESG's email attachment scanning module triggered by specially crafted TAR file names sent via email; no authentication or user interaction required β€” attacker simply emailed malicious attachments to any recipient at a victim organisation using a Barracuda ESG appliance
Vendor / Product
Barracuda Email Security Gateway (ESG) hardware appliance
Malware Family
SALTWATER, SEASPY, SEASIDE, SUBMARINE, WHIRLPOOL
CVE / GHSA References
CVE-2023-2868

Timeline

  1. 2022-10-01 Breach occurred
  2. 2023-05-19 Publicly disclosed
  3. 2023-05-19 Customers notified