Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Critical Veeam vulnerability used to distribute Akira and Fog ransomware
Global Security

Critical Veeam vulnerability used to distribute Akira and Fog ransomware

AdminBy AdminOctober 14, 2024No Comments3 Mins Read
Veeam Vulnerability Ransowmare
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 14, 2024Ravi LakshmananRansomware / Vulnerability

Veeam Ransowmare Vulnerability

Threat actors are actively trying to exploit a patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware.

Cybersecurity vendor Sophos said it has tracked a series of attacks over the past month using compromised VPN credentials and CVE-2024-40711 to create a local account and deploy ransomware.

CVE-2024-40711 with a CVSS rating of 9.8 out of 10.0 is related to critical vulnerability which allows remote code execution without authentication. This was resolved by Veeam in Backup & Replication version 12.2 in early September 2024.

Security researcher Florian Hauser from the German company CODE WHITE was is counted with detection and reporting of security flaws.

Cyber ​​security

“In each case, the attackers initially gained access to the targets using compromised VPN gateways without multi-factor authentication enabled,” Sophos said. said. “Some of these VPNs used unsupported software versions.”

“Each time the attackers used VEEAM on the URI /trigger on port 8000, running Veeam.Backup.MountService.exe to create net.exe. The exploit creates a local account, a ‘point’, by adding it to the local Administrators and Remote Desktop Users groups.”

In the attack that led to the deployment of the Fog ransomware, the threat actors are said to have dropped the ransomware onto an unprotected Hyper-V server using the rclone utility to steal data. Other ransomware deployments have been unsuccessful.

Active exploitation of CVE-2024-40711 has begun prompted guidance from NHS England, which notes that “enterprise backup and disaster recovery programs are valuable targets for cyber threat groups”.

The disclosure comes after Palo Alto Networks Unit 42 detailed a successor to the INC ransomware called Lynx, which has been active since July 2024 and targets retail, real estate, architecture, finance and environmental services organizations in the US and UK.

Veeam Ransowmare Vulnerability

The emergence of Lynx is said to have been triggered by the sale of INC ransomware source code on the criminal underground market back in March 2024, prompting malware authors to repackage the box and create new variants.

“Lynx Ransomware Shares Much of Its Source Code with INC Ransomware” Chapter 42 said. “The INC ransomware originally appeared in August 2023 and had variants compatible with Windows and Linux.”

It also follows a recommendation from the Health Sector Cybersecurity Coordinating Center (HC3) of the Department of Health and Human Services (HHS) that at least one healthcare organization in the country has been victimized Trinity extortionistsanother relatively new ransomware player that first came to light in May 2024 and is believed to be a rebrand of 2023Lock and Venus ransomware.

Cyber ​​security

“This is a type of malware that infiltrates systems through multiple attack vectors, including phishing emails, malicious websites, and exploiting software vulnerabilities,” HC3 said. said. “Once inside a system, the Trinity ransomware uses a dual extortion strategy to target its victims.”

Cyberattackers were also seen delivering a MedusaLocker ransomware variant called BabyLockerKZ to a financially motivated threat actor known to be active since October 2022, with targets primarily located in the EU and South America.

“This attacker uses several well-known attack tools and LoLBins (LoLBins), a set of tools created by the same developer (possibly the attacker) to aid in credential theft and lateral movement in compromised organizations” , — said Talos. researchers said.

“These tools are basically wrappers around public tools that include additional features to streamline the attack process and provide a GUI or command-line interface.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.