Microsoft Exchange Under Attack as a Ransomware Lockfile Target Server – News2IN
Gadgets

Microsoft Exchange Under Attack as a Ransomware Lockfile Target Server

Microsoft Exchange Under Attack as a Ransomware Lockfile Target Server
Written by news2in

Security researchers claimed to have found a new Ransomware family called Lockfile which seemed to be the same as those used before to attack Microsoft exchange servers in the US and Asia.
According to Symantec, Ransomware, who previously invisible had reached at least 10 companies in the ongoing campaign.
These targets are cross-industrial.
Ransomware Lockfile was first observed on the US financial organization network on July 20, 2021, with its latest activities seen recently as August 20.
How new attacks work per Symantec, there are signs that attackers get access to network victims through the Microsoft Exchange server, and then use petitpotam vulnerabilities that are not patched to get access to domain controllers, and then spread throughout the network.
So far it is not clear how the attackers gained initial access to the Microsoft exchange server.
In accordance with the Cybersecurity and US Infrastructure Security Agency (CISA), “actor Cyber ​​Malerious actively exploited the following proxyshell vulnerabilities: CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207.
A attacker who exploits this vulnerability Executed.
Arbitrary code on a vulnerable machine.
Cisa is very urgent organizations to identify the system vulnerable to their network and immediately apply Microsoft security updates from May 2021 – which transfers the three proxyshell vulnerabilities – to protect from this attack.
“The attackers behind Ransomware It is said to use a ransom with similar designs with those used by Lockbit Ransomware gangs and reference to the conti gang at the email address they use, contact@contipauper.com.
According to the report, it is usually around 20 to 30 minutes before mobilizing ransomware, the attackers attach a set of tools to the comrocated Exchange server.
This includes: * Exploitation for CVE-2021-36942 vulnerability (aka petitpotam).
This code seems copied from https://github.com/zcgonvh/efspotato.
This is in a file called “Efspotato.exe”.
* Two File: Active_Desktop_Render.dll and Active_Desktop_Launcher.exe Shellcode encrypted, however, it is very possible to activate the EFSPotato.exe file that exploits petitpotam vulnerabilities.
It was patched in the release of Microsoft August Patch Tuesday, but later it appeared that the repairs released were reported not fully patching vulnerabilities.
Companies are attacked including those in manufacturing, financial services, engineering, law, business services, and travel sectors and tourism.

About the author

news2in