Article Details
Scrape Timestamp (UTC): 2024-11-08 20:23:36.802
Original Article Text
Click to Toggle View
Critical Veeam RCE bug now used in Frag ransomware attacks. After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also recently exploited to deploy Frag ransomware. Code White security researcher Florian Hauser found that the vulnerability (tracked as CVE-2024-40711) is caused by a deserialization of untrusted data weakness that unauthenticated threat actors can exploit to gain remote code execution (RCE) on Veeam VBR servers. watchTowr Labs, which published a technical analysis on CVE-2024-40711 on September 9, delayed releasing a proof-of-concept exploit until September 15 to give admins enough time to apply security updates issued by Veeam on September 4. Code White also delayed sharing more details when it disclosed the flaw because it "might instantly be abused by ransomware gangs." These delays were prompted by Veeam's VBR software being a popular target for threat actors seeking quick access to a company's backup data since many businesses use it as a disaster recovery and data protection solution to back up, restore, and replicate virtual, physical, and cloud machines. However, Sophos X-Ops incident responders found that this did very little to delay Akira and Fog ransomware attacks. The threat actors exploited the RCE flaw together with stolen VPN gateway credentials to add rogue accounts to the local Administrators and Remote Desktop Users groups on unpatched and Internet-exposed servers. More recently, Sophos also discovered that the same threat activity cluster (tracked as "STAC 5881") used CVE-2024-40711 exploits in attacks that led to Frag ransomware being deployed on compromised networks. "In a recent case MDR analysts once again observed the tactics associated with STAC 5881 – but this time observed the deployment of a previously-undocumented ransomware called 'Frag,'" said Sean Gallagher, a principal threat researcher at Sophos X-Ops. "Similar to the previous events, the threat actor used a compromised VPN appliance for access, leveraged the VEEAM vulnerability, and created a new account named 'point'. However in this incident a 'point2' account was also created." In a recent report, British cybersecurity company Agger Labs said that the recently surfaced Frag ransomware gang extensively uses Living Off The Land binaries (LOLBins) in their attacks—legitimate software already available on compromised systems—making it challenging for defenders to detect their activity. They also have a similar playbook to Akira and Fog operators, as they'll likely target unpatched vulnerabilities and misconfigurations in backup and storage solutions during their attacks. In March 2023, Veeam patched another high-severity VBR vulnerability (CVE-2023-27532) that can let malicious actors breach backup infrastructure. Months later, a CVE-2023-27532 exploit (used in attacks linked to the financially motivated FIN7 threat group) was deployed in Cuba ransomware attacks targeting U.S. critical infrastructure organizations. Veeam says over 550,000 customers worldwide use its products, including roughly 74% of all companies in the Global 2,000 list.
Daily Brief Summary
A critical Remote Code Execution (RCE) vulnerability in Veeam Backup & Replication (CVE-2024-40711) has been exploited in recent Frag ransomware attacks.
Previously, the same security flaw facilitated ransomware attacks by Akira and Fog, exploiting unpatched systems and poor network configurations.
Despite delayed release of a proof-of-concept by watchTowr Labs and early patches by Veeam, attacks continue to impact vulnerable systems.
Attackers used the vulnerability along with stolen VPN credentials to create unauthorized admin accounts, increasing system access and control.
Sophos' threat analysis identified that the same methods and tactics are used across different ransomware gangs, indicating a shared strategy focusing on backup and storage systems’ vulnerabilities.
Agger Labs reported that the Frag ransomware gang employs legitimate onsite binaries to avoid detection, complicating defensive measures for organizations.
Veeam, a widely used backup solution, had previously addressed another significant vulnerability in March, showing ongoing attention from cybercriminals.
Veeam’s large customer base, including 74% of Global 2,000 companies, underscores the high impact of these vulnerabilities being exploited.