Article Details

Scrape Timestamp (UTC): 2024-12-20 06:26:41.034

Source: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html

Original Article Text

Click to Toggle View

Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools. A now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited by malicious actors as part of a cyber campaign that installed remote desktop software such as AnyDesk and ScreenConnect. The vulnerability in question is CVE-2023-48788 (CVSS score: 9.3), an SQL injection bug that allows attackers to execute unauthorized code or commands by sending specially crafted data packets. Russian cybersecurity firm Kaspersky said the October 2024 attack targeted an unnamed company's Windows server that was exposed to the internet and had two open ports associated with FortiClient EMS. "The targeted company employs this technology to allow employees to download specific policies to their corporate devices, granting them secure access to the Fortinet VPN," it said in a Thursday analysis. Further analysis of the incident found that the threat actors took advantage of CVE-2023-48788 as an initial access vector, subsequently dropping a ScreenConnect executable to obtain remote access to the compromised host. "After the initial installation, the attackers began to upload additional payloads to the compromised system, to begin discovery and lateral movement activities, such as enumerating network resources, trying to obtain credentials, perform defense evasion techniques, and generating a further type of persistence via the AnyDesk remote control tool," Kaspersky said. Some of the other notable tools dropped over the course of the attack are listed below - The threat actors behind the campaign are believed to have targeted various companies located across Brazil, Croatia, France, India, Indonesia, Mongolia, Namibia, Peru, Spain, Switzerland, Turkey, and the U.A.E. by making use of different ScreenConnect subdomains (e.g., infinity.screenconnect[.]com). Kaspersky said it detected further attempts to weaponize CVE-2023-48788 on October 23, 2024, this time to execute a PowerShell script hosted on a webhook[.]site domain in order to "collect responses from vulnerable targets" during a scan of a system susceptible to the flaw. The disclosure comes more than eight months after cybersecurity company Forescout uncovered a similar campaign that involved exploiting CVE-2023-48788 to deliver ScreenConnect and Metasploit Powerfun payloads. "The analysis of this incident helped us to establish that the techniques currently used by the attackers to deploy remote access tools are constantly being updated and growing in complexity," the researchers said.

Daily Brief Summary

CYBERCRIME // Hackers Use Fortinet Flaw to Deploy Remote Access Tools

Hackers exploited a critical vulnerability, CVE-2023-48788, in Fortinet FortiClient EMS to install unauthorized remote desktop software.

The specific attack discussed took place in October 2024 and targeted a Windows server of an unspecified company which was accessible online.

The attackers utilized the SQL injection flaw as an entry point and installed ScreenConnect for remote access.

Post-access stage included deploying additional malware to aid in network discovery, credential theft, and maintaining persistence via tools like AnyDesk.

Attack indicators suggest a broader target range including companies in multiple countries such as Brazil, Croatia, France, and others.

The identified cyber campaign reflects growing sophistication in the techniques used to exploit similar vulnerabilities.

Further attempts to exploit the same vulnerability with a PowerShell script for system scanning were noted in late October 2024.

This incident underscores the critical need for prompt patching of known vulnerabilities and ongoing vigilance in systems monitoring.