Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
  • County:
  • Country:
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit

March 4, 2021

Enterprise cloud safety agency Qualys has turn into the most recent sufferer to hitch an extended listing of entities to have suffered a knowledge breach after zero-day vulnerabilities in its Accellion File Switch Equipment (FTA) server have been exploited to steal delicate enterprise paperwork.

As proof of entry to the information, the cybercriminals behind the latest hacks concentrating on Accellion FTA servers have shared screenshots of information belonging to the corporate’s prospects on a publicly accessible information leak web site operated by the CLOP ransomware gang.

Confirming the incident, Qualys Chief Info Safety Officer Ben Carr said an in depth probe “recognized unauthorized entry to information hosted on the Accellion FTA server” positioned in a DMZ (aka demilitarized zone) setting that is segregated from the remainder of the interior community.

“Based mostly on this investigation, we instantly notified the restricted variety of prospects impacted by this unauthorized entry,” Carr added. “The investigation confirmed that the unauthorized entry was restricted to the FTA server and didn’t influence any companies supplied or entry to buyer information hosted by the Qualys Cloud Platform.”

Final month, FireEye’s Mandiant risk intelligence crew disclosed particulars of 4 zero-day flaws within the FTA software that have been exploited by risk actors to mount a wide-ranging information theft and extortion marketing campaign, which concerned deploying an online shell referred to as DEWMODE on course networks to exfiltrate delicate information, adopted by sending extortion emails to threaten victims into paying bitcoin ransoms, failing which the stolen information was posted on the information leak website.

Whereas two of the failings (CVE-2021-27101 and CVE-2021-27104) have been addressed by Accellion on December 20, 2020, the opposite two vulnerabilities (CVE-2021-27102 and CVE-2021-27103) have been recognized and stuck earlier this 12 months on January 25.

Qualys did not say if it obtained extortion messages within the wake of the breach, however mentioned an investigation into the incident is ongoing.

“The exploited vulnerabilities have been of important severity as a result of they have been topic to exploitation through unauthenticated distant code execution,” Mandiant said in a safety evaluation of the FTA software program printed earlier this week.

Moreover, Mandiant’s supply code evaluation uncovered two extra beforehand unknown safety flaws within the FTA software program, each of which have been rectified in an FTA patch (model 9.12.444) launched on March 1 —

  • CVE-2021-27730: An argument injection vulnerability (CVSS rating 6.6) accessible solely to authenticated customers with administrative privileges, and
  • CVE-2021-27731: A saved cross-site scripting flaw (CVSS rating 8.1) accessible solely to common authenticated customers

The FireEye-owned subsidiary is monitoring the exploitation exercise and the follow-on extortion scheme underneath two separate risk clusters it calls UNC2546 and UNC2582, respectively, with overlaps recognized between the 2 teams and former assaults carried out by a financially motivated risk actor dubbed FIN11. However it’s nonetheless unclear what connection, if any, the 2 clusters might have with the operators of Clop ransomware.

Posted in SecurityTags:
Write a comment