独家

微软交换受到攻击LockFile ransomware目标服务器

安全研究人员声称,他们已经发现了一种新的ransomware家庭称为LockFile似乎相同的攻击早些时候使用Microsoft Exchange服务器在美国和亚洲。

微软交换受到攻击LockFile ransomware目标服务器
安全研究人员声称,他们已经发现了一种新的ransomware家庭LockFile这似乎相同的早些时候被攻击微软交换服务器在美国和亚洲。根据赛门铁克以前看不见的ransomware了至少10家公司正在进行的活动。这些目标是各个行业。

的LockFile ransomware首次观察到网络上的美国金融机构7月20日,2021年,其最新的活动视为在8月20日。

新的攻击是如何工作的
根据赛门铁克,有迹象表明攻击者获得通过受害者的网络微软交换服务器,然后使用不完全修补PetitPotam容易访问域控制器,然后蔓延至整个网络。这是到目前为止不清楚攻击者获得初始访问Microsoft Exchange服务器。根据美国网络安全、基础设施安全机构(CISA),“恶意网络演员正在积极利用以下ProxyShell 漏洞:cve cve - 2021 - 34473 - 2021 - 34523,和cve - 2021 - 31207。攻击者利用这些漏洞可能脆弱的机器上执行任意代码。中钢协强烈敦促立即组织识别脆弱系统网络和应用从2021年5月——微软的安全更新纠正所有三个ProxyShell漏洞防范这些攻击。”

这背后的袭击者ransomware据说用赎金注意类似的设计使用的LockBit ransomware帮派和参考孔蒂帮派在他们所使用的电子邮件地址,contact@contipauper.com。

根据这份报告,通常大约20到30分钟之前部署ransomware,袭击者安装一套工具到妥协交换服务器。这些包括:

cve - 2021 - 36942的利用漏洞(又名PetitPotam)。从https://github.com/zcgonvh/EfsPotato似乎被复制的代码。这是在一个文件名为“efspotato.exe”。

两个文件:active_desktop_render。dll和active_desktop_launcher.exe

然而,加密shellcode很有可能激活efspotato。exe文件,利用PetitPotam脆弱性。在8月微软的补丁修补周二发布,但随后出现,据报道发布的修复不完全修补漏洞。

攻击的公司包括那些在制造、金融服务、工程、法律、业务服务、旅行和旅游业。

遵循和联系我们,脸谱网,Linkedin,Youtube
\"Microsoft
Security researchers claim to have discovered a new ransomware family called LockFile<\/a> that seems to the same that was used earlier to attack Microsoft Exchange<\/a> servers in the US and Asia. According to Symantec<\/a>, previously unseen ransomware has hit at least 10 companies in the ongoing campaign. These targets are across industries.

The LockFile ransomware was first observed on the network of a US financial organisation on July 20, 2021, with its latest activity seen as recently as August 20.

How the new attack works<\/strong>
As per Symantec, there are signs that the attackers gain access to victims' networks via
Microsoft<\/a> Exchange Servers, and then use the incompletely patched PetitPotam<\/a> vulnerability to gain access to the domain controller, and then spread across the network. It is so far not clear how the attackers gain initial access to the Microsoft Exchange Servers. As per US Cybersecurity and Infrastructure Security Agency (CISA), \"Malicious cyber actors are actively exploiting the following ProxyShell<\/a> vulnerabilities<\/a>: CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207. An attacker exploiting these vulnerabilities could execute arbitrary code on a vulnerable machine. CISA strongly urges organisations to identify vulnerable systems on their networks and immediately apply Microsoft's Security Update from May 2021\u2014which remediates all three ProxyShell vulnerabilities\u2014to protect against these attacks.\"