LockBit ransomware is spreading from compromised Microsoft Exchange servers
Date:
Wed, 12 Oct 2022 10:36:40 +0000
Description:
LockBit 3.0 was spotted on multiple servers, with the threat actors stealing 1.3 TB of data in the process.
FULL STORY ======================================================================
LockBit ransomware affiliates have been caught distributing the malware via compromised Microsoft Exchange servers , multiple sources have confirmed.
The issue was first identified by South Korean cybersecurity company AhnLab. This past summer, two servers belonging to one of its customers were infected with LockBit 3.0. As per the report, the attackers first deployed web shell, then escalated privileges to Active Directory admin a week later, stole some 1.3 TB of data, and encrypted systems hosted on the network.
While the attack seems straightforward in theory, there are some
disagreements over how the threat actors managed to gain access to the
servers in the first place. New zero-day?
AhnLab seems to believe a zero-day flaw was exploited: Looking at the Microsoft Exchange Server vulnerability history, the remote code execution vulnerability was disclosed on December 16, 2021 (CVE-2022-21969), the privilege escalation vulnerability was disclosed in February 2022, and the most recent vulnerability was on June 27." Read more
What is ransomware and how does it work?
This new Royal ransomware is already asking for millions
Check out our list of the best firewalls around
"That is, among the vulnerabilities disclosed after May, there were no
reports of vulnerabilities related to remote commands or file creation," AhnLab claimed in its report.
Therefore, considering that WebShell was created on July 21, it is expected that the attacker used an undisclosed zero-day vulnerability."
Security Affairs spotted cybersecurity expert Kevin Beaumont weighing in on the discussion, saying a zero-day is an unlikely possibility:
There's a lot going on in this report about LockBit ransomware , and I'm not convinced it's a zero day (there's no evidence in report), but one to keep an eye on, he tweeted.
Another security researcher, Will Dormann, also stressed that the report doesnt point to a new zero-day: So far I've only skimmed a translated version of the page, but what evidence is provided that it's a different vulnerability? he added. These are the best antivirus solutions right now
Via Security Affairs
======================================================================
Link to news story:
https://www.techradar.com/news/lockbit-ransomware-is-spreading-from-compromise d-microsoft-exchange-servers/
--- Mystic BBS v1.12 A47 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)