{"id":43791,"date":"2021-11-09T00:24:55","date_gmt":"2021-11-09T00:24:55","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=101178"},"modified":"2021-11-09T00:24:55","modified_gmt":"2021-11-09T00:24:55","slug":"threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/","title":{"rendered":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus"},"content":{"rendered":"<p>Microsoft has detected exploits being used to compromise systems running the ZOHO ManageEngine ADSelfService Plus software versions vulnerable to <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-40539\">CVE-2021-40539<\/a> in a targeted campaign. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed infrastructure, victimology, tactics, and procedures.<\/p>\n<p>MSTIC previously highlighted DEV-0322 activity related to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/07\/13\/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit\/\">attacks targeting the SolarWinds Serv-U software with 0-day exploit<\/a>. As with any observed nation-state actor activity, Microsoft notifies customers that have been targeted or compromised, providing them with the information they need to help secure their accounts.<\/p>\n<p>Our colleagues at Palo Alto Unit 42 have also highlighted this activity in <a href=\"https:\/\/unit42.paloaltonetworks.com\/manageengine-godzilla-nglite-kdcsponge\/\">their recent blog<\/a>. We thank Unit 42 for their collaboration as industry partners and ongoing efforts to protect customers. We would also like to thank our partners in <a href=\"https:\/\/www.lumen.com\/en-us\/security\/black-lotus-labs.html\">Black Lotus Labs<\/a> at Lumen Technologies for their contributions to our efforts to track and mitigate this threat.<\/p>\n<p>This blog shares what Microsoft has observed in the latest DEV-0322 campaign and inform our customers of protections in place through our security products. We have not observed any exploit of Microsoft products in this activity.<\/p>\n<p>MSTIC uses DEV-#### designations as a temporary name given to an unknown, emerging, or developing cluster of threat activity, allowing MSTIC to track it as a unique set of information until we can reach high confidence about the origin or identity of the actor behind the activity. Once it meets defined criteria, a DEV group is converted to a named actor.<\/p>\n<h2>Activity description<\/h2>\n<p>MSTIC first observed the latest DEV-0322 campaign on September 22, 2021, with activity against targets that appear to be in the Defense Industrial Base, higher education, consulting services, and information technology sectors. Following initial exploitation of CVE-2021-40539 on a targeted system, DEV-0322 performed several activities including credential dumping, installing custom binaries, and dropping malware to maintain persistence and move laterally within the network.<\/p>\n<h3>Credential dumping<\/h3>\n<p>In this campaign, DEV-0322 was observed performing credential dumping using the following commands:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-101247 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-a-6189b78d67750.png\" alt=\"Screenshot of commands use for credential dumping\" width=\"778\" height=\"168\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-a-6189b78d67750.png 778w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-a-6189b78d67750-300x65.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-a-6189b78d67750-768x166.png 768w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\"><\/p>\n<p>DEV-0322 also occasionally deployed a tool to specifically read security event logs and look for Event ID 4624 events. Next, their tool would collect domains, usernames, and IP addresses and write them to the file <em>elrs.txt<\/em>. They typically called this tool <em>elrs.exe<\/em>, and below is an example of how they would call it:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-101250 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-b-6189b796bd58d.png\" alt=\"Screenshot of command for calling elrs.exe\" width=\"778\" height=\"50\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-b-6189b796bd58d.png 778w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-b-6189b796bd58d-300x19.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-b-6189b796bd58d-768x49.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-b-6189b796bd58d-767x50.png 767w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\"><\/p>\n<p>After gaining credentials, DEV-0322 was observed moving laterally to other systems on the network and dropping a custom IIS module with the following command:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-101253 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-c-6189b7a102d37.png\" alt=\"Screenshot of command for moving laterally and dropping a custom IIS module\" width=\"778\" height=\"84\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-c-6189b7a102d37.png 778w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-c-6189b7a102d37-300x32.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-c-6189b7a102d37-768x83.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Commands-c-6189b7a102d37-767x84.png 767w\" sizes=\"auto, (max-width: 778px) 100vw, 778px\"><\/p>\n<h3>Installing custom IIS module<\/h3>\n<p>The <em>gac.exe<\/em> binary installs <em>ScriptModule.dll<\/em> into the Global Assembly Cache before using <em>AppCmd<\/em><em>.exe<\/em> to install it as an IIS module. <em>AppCmd.exe<\/em> is a command line tool included in IIS 7+ installations used for server management. This module hooks into the BeginRequest IIS http event and looks for custom commands and arguments being passed via the Cookies field of the HTTP header.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-101196 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig1-Encoded-request.png\" alt=\"Screenshot of request headers using encoded request from the controller to the victim machine\" width=\"762\" height=\"231\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig1-Encoded-request.png 762w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig1-Encoded-request-300x91.png 300w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\"><\/p>\n<p><em>Figure 1: Encoded request from the controller to the victim machine<\/em><\/p>\n<p>The custom IIS module supports execution for <em>cmd.exe<\/em> and PowerShell commands. It also provides DEV-0322 with the ability to direct download and upload of files to and from a compromised IIS web server. The module also observes incoming authentication credentials and captures them; it then encodes these and writes them to the following path:<\/p>\n<p><em>C:\\ProgramData\\Microsoft\\Crypto\\RSA\\key.dat<\/em><\/p>\n<p>If this module receives the command \u201cccc,\u201d it drops a file <em>c:\\windows\\temp\\ccc.exe<\/em>. The file <em>ccc.exe<\/em> is a .NET program that launches <em>cmd.exe<\/em> with an argument and sends any output back to the controller.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-101193 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig2-Base-64-encoded-command.png\" alt=\"Screenshot of Base64-encoded ccc.exe\" width=\"1223\" height=\"532\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig2-Base-64-encoded-command.png 1223w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig2-Base-64-encoded-command-300x130.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig2-Base-64-encoded-command-1024x445.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/11\/Fig2-Base-64-encoded-command-768x334.png 768w\" sizes=\"auto, (max-width: 1223px) 100vw, 1223px\"><\/p>\n<p><em>Figure 2: The Base64-encoded ccc.exe contained inside the IIS module backdoor<\/em><\/p>\n<p>Below is an example command from <em>w3wp.exe<\/em> process after <em>ccc.exe is<\/em> dropped:<\/p>\n<p><code>\"c:\\windows\\temp\\ccc.exe\" dir<\/code><\/p>\n<h3>Deploying Zebracon malware<\/h3>\n<p>In addition to a custom IIS module, DEV-0322 also deployed a Trojan that we are calling Trojan:Win64\/Zebracon. This Trojan uses hardcoded credentials to make connections to suspected DEV-0322-compromised Zimbra email servers.<\/p>\n<p>Subsequent commands are made to <em>&lt;ZimbraServer&gt;\/service\/soap<\/em> using an obtained authorization token (ZM_AUTH_TOKEN) to perform email operations on the threat actor-controlled mailbox, such as the following:<\/p>\n<ul>\n<li>Search email (e.g., <em>&lt;query&gt;(in:\\\u201dinbox\\\u201d or in:\\\u201djunk\\\u201d) is:unread&lt;\/query&gt;<\/em>)<\/li>\n<li>Read email<\/li>\n<li>Send email (e.g., <em>Subject: <\/em><em>[AutoReply] I\u2019ve received your mail, I will check it soon!<\/em>)<\/li>\n<\/ul>\n<p>These operations are used by the Zebracon malware to receive commands from the DEV-0322-controlled mailbox.<\/p>\n<p>Files related to the Zebracon Trojan have the following metadata:<\/p>\n<ul>\n<li>Company name:\n<ul>\n<li>Synacor. Inc.<\/li>\n<\/ul>\n<\/li>\n<li>File description:\n<ul>\n<li>Zimbra Soap Suites<\/li>\n<li>Zimbra Soap Tools<\/li>\n<\/ul>\n<\/li>\n<li>Internal name:\n<ul>\n<li>newZimbr.dll<\/li>\n<li>zimbra-controller-dll.dll<\/li>\n<\/ul>\n<\/li>\n<li>Original filename:\n<ul>\n<li>newZimbr.dll<\/li>\n<li>ZIMBRA-SOAP.DLL<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Microsoft will continue to monitor DEV-0322 activity and implement protections for our customers. The current detections, advanced detections, and IOCs in place across our security products are detailed below.<\/p>\n<h2>Detections<\/h2>\n<h3>Microsoft 365 Defender detections<\/h3>\n<p><strong>Antivirus<\/strong><strong>&nbsp;<\/strong><\/p>\n<p>Microsoft&nbsp;Defender Antivirus detects threat components as the following malware:<\/p>\n<ul>\n<li>Trojan:MSIL\/Gacker.A!dha<\/li>\n<li>Backdoor:MSIL\/Kokishell.A!dha<\/li>\n<li>Trojan:Win64\/Zebracon.A!dha<\/li>\n<\/ul>\n<p><strong>Endpoint detection and response (EDR)<\/strong><strong>&nbsp;<\/strong><\/p>\n<p>Alerts with the following titles in the&nbsp;security center&nbsp;can indicate threat activity on your network:<\/p>\n<ul>\n<li>DEV-0322 Actor activity detected\u200b<\/li>\n<li>Malware from possible exploitation of CVE-2021-40539<\/li>\n<\/ul>\n<p>The following alerts may also indicate activity associated with this threat. These alerts can be triggered by unrelated threat activity, but they are listed here for reference:<\/p>\n<ul>\n<li>\u2018Zebracon\u2019 high-severity malware was detected<\/li>\n<li>Anomaly detected in ASEP registry<\/li>\n<\/ul>\n<p>Microsoft 365 Defender correlates any related alerts into <a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/security\/defender\/investigate-incidents?view=o365-worldwide\">incidents<\/a> to help customers determine with confidence if observed alerts are related to this activity. Customers using the Microsoft 365 Defender portal can view, investigate, and respond to incidents that include any detections related to this DEV-0322 activity.<\/p>\n<p>The threat and vulnerability management module in Microsoft Defender for Endpoint (included in Microsoft 365 Defender) provides insights related to CVE-2021-40539. Customers can find affected devices in their environment in the Microsoft 365 Defender portal and initiate the appropriate version update of the ManageEngine software. Customers can also use the hunting query included below to identify devices that might be vulnerable to CVE-2021-40539.<\/p>\n<h3>Microsoft Sentinel detections<\/h3>\n<p>The indicators of compromise (IoCs) included in this blog post are also available to Microsoft Sentinel customers through the <em>Microsoft Emerging Threat Feed<\/em> located in the <a href=\"https:\/\/docs.microsoft.com\/azure\/sentinel\/understand-threat-intelligence\">Microsoft Sentinel Threat Intelligence blade<\/a>. These can be used by customers for detection purposes alongside the hunting queries detailed below.<\/p>\n<h2>Advanced hunting queries<\/h2>\n<h3>Microsoft Sentinel hunting queries<\/h3>\n<p><strong>Name<\/strong>: &nbsp;DEV-0322 Command Line Activity November 2021<br \/><strong>Description<\/strong>: This hunting query looks for process command line activity related to observed DEV-0322 activity as detailed in this blog post. It locates command lines that are used as part of the threat actor\u2019s post-exploitation activity. The query uses additional data from Microsoft Defender for Endpoint to generate a risk score associated with each result. Hosts with higher risk events should be investigated first.<\/p>\n<p><a href=\"https:\/\/github.com\/azure\/azure-sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/Dev-0322CommandLineActivityNovember2021.yaml\">https:\/\/github.com\/azure\/azure-sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/Dev-0322CommandLineActivityNovember2021.yaml<\/a><\/p>\n<p><strong>Name<\/strong>:&nbsp; DEV-0322 File Drop Activity November 2021<br \/><strong>Description<\/strong>: This hunting query looks for file creation events related to observed DEV-0322 activity as detailed in this blog. The files this query hunts for are dropped as part of the threat actor\u2019s post-exploitation activity. The query uses other additional data from Microsoft Defender for Endpoint to generate a risk score associated with each result. Hosts with higher risk events should be investigated first.<\/p>\n<p><a href=\"https:\/\/github.com\/azure\/azure-sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/Dev-0322FileDropActivityNovember2021.yaml\">https:\/\/github.com\/azure\/azure-sentinel\/blob\/master\/Hunting%20Queries\/MultipleDataSources\/Dev-0322FileDropActivityNovember2021.yaml<\/a><\/p>\n<p>In addition to these queries, there are equivalent queries that use the Microsoft Sentinel Information Model (MSIM) to look for the same activity. If you are using MSIM you can find these queries here:<\/p>\n<h3>Microsoft 365 Defender hunting queries<\/h3>\n<p><strong>Name: <\/strong>Surface devices with the CVE-2021-40539 vulnerability<br \/><strong>Description: <\/strong>Use this query to look for devices in your organization that are possibly vulnerable to CVE-2021-40539. <a href=\"https:\/\/security.microsoft.com\/v2\/advanced-hunting?query=H4sIAAAAAAAAA2WQuw6CQBBFT23iP2yoNb4LCyqwsFETjT3iEjQgBlAaP967FkqwmJ27N7NnZjbE8uRCrHyQytlTkFDTEFHKPfIg4yZVyjmpNlPUCkuFoU-PFyPTkH5qrHQgkmXNWdrH1-kRiLRiyJSxYiI1l1owY4n35RjuYhRc9T5WF0PYmtARBx1vo6lyZef_-rrbVrvsNG0kTiJmqTrndzdsE_63dztV6lXoD949nbyNLgEAAA&amp;timeRangeId=week\">Run query<\/a>.<\/p>\n<p><code>DeviceTvmSoftwareVulnerabilities<br \/>|\u202fwhere\u202fCveId\u202f==\u202f\"CVE-2021-40539\"<br \/>|&nbsp;project&nbsp;DeviceId,&nbsp;DeviceName,&nbsp;CveId,&nbsp;OSPlatform,&nbsp;SoftwareName,&nbsp;SoftwareVersion<\/code><\/p>\n<p><strong>Name: <\/strong>Hunt for suspicious dropped files post-exploitation<br \/><strong>Description: <\/strong>Look for suspicious files dropped the the threat actor\u2019s post-exploitation activity. <a href=\"https:\/\/security.microsoft.com\/v2\/advanced-hunting?query=H4sIAAAAAAAAA41T20rDQBCdZ8F_WPrUQmzelT6U1EKhSlHfVKSm6T1JyUZrwI_3zMmGJlGhLNmZneuZS3zxxchUUpwduCVoBprLWiJQKwfQUDbQbEAN6R4yC34B2xQWarPA-10K55tBMgdncIegGvVSLvAuj0bIW9EGjFhIAp-Y2bryLB0J5FpecGbMtsKt-hHjz6m5o7VqLb4l5CoNICmATbPr-0EeZUhuh4yF9JGtxNgRj3foMh0RL4E2BWcpyeERI5byIU8fki98HXmVntw0qhtB_klMkYxdhbeQRIiaI2Ld9hvfkd3O2PHK_p5VqiQiFktU2ltFGsEmg-yEwrjJjUH3sNd4M9anHmtwVt5wJ5xRt9b5XgOPz42YwC50U7REUW1EBj_LXbGwSB1q7brhO8aZE3E5-5A5LDu6qk1ctXvOyzCDVtnuyxZa9TPIV05kQN8lZ_rBqWSspt7xck-qvOf2vekVNCqZMnvkKky4dyqxbmtiVuvz__g9mR77k7T2YgKfNp4DMWz5x-VyRWTa4YWr8wm-MRHm3I4D97Yetdoa749N8v7ZDu_M6j23F7qFG_qWM236DjlznY72qcr9A2VPOedoBAAA&amp;timeRangeId=week\">Run query<\/a>.<\/p>\n<p><code>\/\/&nbsp;Look&nbsp;for&nbsp;the&nbsp;specific&nbsp;files&nbsp;dropped&nbsp;by&nbsp;threat&nbsp;actor<br \/>let&nbsp;files&nbsp;=&nbsp;dynamic([\"C:\\\\ProgramData\\\\Microsoft\\\\Crypto\\\\RSA\\\\key.dat&nbsp;\",&nbsp;\"c:\\\\windows\\\\temp\\\\ccc.exe\"]);<br \/>DeviceFileEvents<br \/>|&nbsp;where&nbsp;FileName&nbsp;endswith&nbsp;\"elrs.exe\"&nbsp;or&nbsp;FolderPath&nbsp;has_any&nbsp;(files)<br \/>\/\/&nbsp;Increase&nbsp;the&nbsp;risk&nbsp;score&nbsp;of&nbsp;command&nbsp;accessing&nbsp;file&nbsp;also&nbsp;seen<br \/>|&nbsp;join&nbsp;kind=leftouter&nbsp;(DeviceProcessEvents<br \/>|&nbsp;where&nbsp;ProcessCommandLine&nbsp;contains&nbsp;\"cmd&nbsp;\/c&nbsp;elrs.exe\")&nbsp;on&nbsp;DeviceId<br \/>|&nbsp;project-reorder&nbsp;Timestamp,&nbsp;DeviceName,&nbsp;FileName,&nbsp;FolderPath,&nbsp;ProcessCommandLine,&nbsp;InitiatingProcessAccountName<\/code><\/p>\n<p><strong>Name: <\/strong>Hunt for command&nbsp;lines&nbsp;observed&nbsp;used&nbsp;by&nbsp;the DEV-0322 actor<br \/><strong>Description: <\/strong>Look for suspicious command lines that are used as part of the threat actor\u2019s post-exploitation activity. <a href=\"https:\/\/security.microsoft.com\/v2\/advanced-hunting?query=H4sIAAAAAAAAA71W72_SUBS9n038H8i-wAyDRM0-zGCic8uIsJixmJg5CbQd1NGCtMBm_OM997xXaaHFitE09N333v31zj33laY0pSIdmeK5h3SHcY7RwRjgGUgoLuYT8SF5EkGeyhCjB70l3rq74FyloTziHcsYczPOIQ0gVfB2MKr_p_IEc_NMsB8zYgAP_UykFn4uPIawDbDuSE1upGp1G9B6YJwmVipyICurpSshIrnYPWEGro1uspxhbYq5RokYe4C4E0pJvh49hpBc6Cww-tSImM0M4xg-NPPPeA6sfx-YJNZ6jgiyYuhwJfFmLDajfUMUnx7X0mtqndBiRY8uoq6sD7ULkIvK6rvBc8bw_Qoo1WFbZYQR9JeQXshzYhOV9rqwlT6Wl_SuKCWei1HcxtFULKlUudgjYrqu8hG0i23Tlj3G9zGLpUseLMiz5ASKa7kcYkprXKtyK4dAN83gd9BfkneefMhgcsYO0cpEGYtmQdcZtsSWwwlm6Y5I-jHbFdqTITHSeqn2CLKpvKKXjv0DvxX7c06LbManmb7v2MgV6A-w2-e6dngtp18Pmce8tM-AZ3WYS5TJVxkTYXdJvQt5D6uurewn_K6BbBc7N_IF71t5hjx6yCuytWvApi0f2WMmozZi-kTW4KsI_YuT7x_n_-CxyQS92Uw22i_f6V_v_gVZW8PJtNfPsTentx40lNEtMi-ExjXGgBnH5OPM2nSI29rC3OYa6aHAKvl6pPupDYzqG2uXtPC4XgZb1XsDnfW50h7Oea9nve5bxXK2-0UsPsGf2vag4-bcR29ZMY_M8yHdkx8Ome3ZO0a_YcqYIe8PXbv7zb-F6Ff9k1vO470-Zm9NyYBNVirnY1qptyubTS-VSyvD0_6WB_Nt-gpd_Sof0UptXZt3HqfzWFvPjb-LkXns_TuW7kYn3uokg07--bIRTvm9iJnPGVeUR4_WQzHjLmzddtvnIfQTp42GkHAKAAA&amp;timeRangeId=week\">Run query<\/a>.<\/p>\n<p><code>\/\/&nbsp;Look&nbsp;for&nbsp;command&nbsp;lines&nbsp;observed&nbsp;used&nbsp;by&nbsp;the&nbsp;threat&nbsp;actor<br \/>let&nbsp;cmd_lines&nbsp;=&nbsp;dynamic(['cmd.exe&nbsp;\/c&nbsp;\"wmic&nbsp;\/node:redacted&nbsp;process&nbsp;call&nbsp;create&nbsp;\"ntdsutil&nbsp;snapshot&nbsp;\\\\\"activate&nbsp;instance&nbsp;ntds\\\\\"&nbsp;create&nbsp;quit&nbsp;quit&nbsp;&gt;&nbsp;c:\\\\windows\\\\temp\\\\nt.dat\";',&nbsp;'regsvr32&nbsp;\/s&nbsp;c:\\\\windows\\\\temp\\\\user64.dll',&nbsp;'process&nbsp;call&nbsp;&nbsp;create&nbsp;\"cmd&nbsp;\/c&nbsp;c:\\\\windows\\\\temp\\\\gac.exe&nbsp;-i&nbsp;c:\\\\windows\\temp\\\\ScriptModule.dll&nbsp;&gt;c:\\\\windows\\\\temp\\\\tmp.dat\"']);<br \/>DeviceProcessEvents<br \/>\/\/&nbsp;Look&nbsp;for&nbsp;static&nbsp;cmd&nbsp;lines&nbsp;and&nbsp;dynamic&nbsp;one&nbsp;using&nbsp;regex<br \/>|&nbsp;where&nbsp;ProcessCommandLine&nbsp;has_any&nbsp;(cmd_lines)&nbsp;or&nbsp;ProcessCommandLine&nbsp;matches&nbsp;regex&nbsp;\"save&nbsp;HKLM\\\\SYSTEM&nbsp;[^&nbsp;]*_System.HIV\"&nbsp;or&nbsp;InitiatingProcessCommandLine&nbsp;has_any&nbsp;(cmd_lines)&nbsp;or&nbsp;InitiatingProcessCommandLine&nbsp;&nbsp;matches&nbsp;regex&nbsp;\"save&nbsp;HKLM\\\\SYSTEM&nbsp;[^&nbsp;]*_System.HIV\"<br \/>|&nbsp;summarize&nbsp;count(),&nbsp;FirstSeen=min(Timestamp),&nbsp;LastSeen&nbsp;=&nbsp;max(Timestamp)&nbsp;by&nbsp;DeviceId,&nbsp;DeviceName,&nbsp;ProcessCommandLine,&nbsp;AccountName,&nbsp;FileName,&nbsp;InitiatingProcessCommandLine,&nbsp;InitiatingProcessFileName,&nbsp;InitiatingProcessAccountName,&nbsp;InitiatingProcessAccountSid<br \/>\/\/&nbsp;Base&nbsp;risk&nbsp;score&nbsp;on&nbsp;number&nbsp;of&nbsp;command&nbsp;lines&nbsp;seen&nbsp;for&nbsp;each&nbsp;host<br \/>|&nbsp;extend&nbsp;RiskScore&nbsp;=&nbsp;count_<br \/>|&nbsp;project-reorder&nbsp;&nbsp;FirstSeen,&nbsp;LastSeen,&nbsp;RiskScore,&nbsp;DeviceName,&nbsp;DeviceId,&nbsp;ProcessCommandLine,&nbsp;AccountName<br \/>|&nbsp;extend&nbsp;timestamp&nbsp;=&nbsp;FirstSeen,&nbsp;AccountCustomEntity&nbsp;=&nbsp;AccountName,&nbsp;HostCustomEntity&nbsp;=&nbsp;DeviceName<\/code><\/p>\n<h2>Indicators of compromise (IOCs)<\/h2>\n<table width=\"624\">\n<tbody>\n<tr>\n<td width=\"120\">Type<\/td>\n<td width=\"504\">Indicator<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">bb4765855d2c18c4858dac6af207a4b33e70c090857ba21527dc2b22e19d90b5<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">e5edd4f773f969d81a09b101c79efe0af57d72f19d5fe71357de10aacdc5473e<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">79e3f4ef28ab6f118c839d01a404cccae56f4067f3f2d2add3603be5c717932b<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">a2da9eeb47a0eef4a93873bcc595f8a133a927080a2cd0d3cb4b4f5101a5c5c2<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">d1d43afd8cab512c740425967efc9ed815a65a8dad647a49f9008732ffe2bb16<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">3c90df0e02cc9b1cf1a86f9d7e6f777366c5748bd3cf4070b49460b48b4d4090<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">ae93e2f0b3d0864e4dd8490ff94abeb7279880850b22e8685cd90d21bfe6b1d6<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">b4162f039172dcb85ca4b85c99dd77beb70743ffd2e6f9e0ba78531945577665<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">b0a3ee3e457e4b00edee5746e4b59ef7fdf9b4f9ae2e61fc38b068292915d710<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">bec067a0601a978229d291c82c35a41cd48c6fca1a3c650056521b01d15a72da<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">1e031d0491cff504e97a5de5308f96dc540d55a34beb5b3106e5e878baf79d59<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">f757d5698fe6a16ec25a68671460bd10c6d72f972ca3a2c2bf2c1804c4d1e20e<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">322368e7a591af9d495406c4d9b2461cd845d0323fd2be297ec06ed082ee7428<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">5fcc9f3b514b853e8e9077ed4940538aba7b3044edbba28ca92ed37199292058<\/td>\n<\/tr>\n<tr>\n<td width=\"120\">SHA-256<\/td>\n<td width=\"504\">b2a29d99a1657140f4e254221d8666a736160ce960d06557778318e0d1b7423b<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/08\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has detected exploits being used to compromise systems running the ZOHO ManageEngine ADSelfService Plus software versions vulnerable to CVE-2021-40539 in a targeted campaign. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322.<br \/>\nThe post Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43792,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,9449,7221,9237],"class_list":["post-43791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-dev-0322","tag-microsoft-security-intelligence","tag-microsoft-threat-intelligence-center-mstic"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-09T00:24:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png\" \/>\n\t<meta property=\"og:image:width\" content=\"778\" \/>\n\t<meta property=\"og:image:height\" content=\"168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus\",\"datePublished\":\"2021-11-09T00:24:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/\"},\"wordCount\":1627,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png\",\"keywords\":[\"Cybersecurity\",\"DEV-0322\",\"Microsoft security intelligence\",\"Microsoft Threat Intelligence Center (MSTIC)\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/\",\"name\":\"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png\",\"datePublished\":\"2021-11-09T00:24:55+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png\",\"width\":778,\"height\":168},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/","og_locale":"en_US","og_type":"article","og_title":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-09T00:24:55+00:00","og_image":[{"width":778,"height":168,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus","datePublished":"2021-11-09T00:24:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/"},"wordCount":1627,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png","keywords":["Cybersecurity","DEV-0322","Microsoft security intelligence","Microsoft Threat Intelligence Center (MSTIC)"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/","url":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/","name":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png","datePublished":"2021-11-09T00:24:55+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus.png","width":778,"height":168},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/threat-actor-dev-0322-exploiting-zoho-manageengine-adselfservice-plus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Threat actor DEV-0322 exploiting ZOHO ManageEngine ADSelfService Plus"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43791"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43792"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}