ArcaneDoor Cyber-Espionage Campaign
ArcaneDoor Cyber-Espionage Campaign
4/26/20241 min read


Cisco Talos researchers have identified a sophisticated cyber-espionage campaign, dubbed "ArcaneDoor," targeting government networks globally. Initiated by an elusive threat actor known as UAT4356, this campaign exploits two zero-day vulnerabilities in Cisco's Adaptive Security Appliance (ASA) firewall devices. These vulnerabilities, identified as CVE-2024-20353 and CVE-2024-20359, enabled the attackers to deploy two custom backdoors — "Line Dancer" and "Line Runner" — facilitating a range of malicious activities including data exfiltration and network surveillance.
The investigation into these incidents began early in 2024, following a tip-off from an affected customer, leading to the discovery of threat actor-controlled infrastructure dating back to November 2023. The timing and sophistication of the attacks suggest that they are the work of a state-sponsored entity, with Cisco Talos and Microsoft, tracking similar threat activities, highlighting the critical need for robust security measures at the network's edge.
Organizations are urged to apply patches promptly, ensure comprehensive logging, and enforce strong multifactor authentication to mitigate the risk of such targeted attacks. The ongoing nature of this threat underscores the importance of vigilant security practices in safeguarding sensitive governmental and organizational networks against advanced persistent threats.