{"id":165753,"date":"2024-07-15T21:42:55","date_gmt":"2024-07-15T21:42:55","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165753"},"modified":"2024-07-15T21:42:58","modified_gmt":"2024-07-15T21:42:58","slug":"ransomware-groups-target-veeam-backup-replication-bug","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165753\/malware\/ransomware-groups-target-veeam-backup-replication-bug.html","title":{"rendered":"Ransomware groups target Veeam Backup & Replication bug"},"content":{"rendered":"
<\/div>\n

Multiple ransomware groups were spotted exploiting a vulnerability, tracked as CVE-2023-27532, in Veeam Backup & Replication.<\/h2>\n\n\n\n

The vulnerability CVE-2023-275327 (CVSS score of 7.5) impacts the Veeam Backup & Replication component. An attacker can exploit the issue to obtain encrypted credentials stored in the configuration database, potentially leading to gaining access to the backup infrastructure hosts.<\/p>\n\n\n\n

The vulnerability was addressed<\/a> in March 2023, and shortly after a PoC exploit code\u00a0for this issue was released publicly.<\/gwmw><\/p>\n\n\n\n

Experts observed that the Russian cybercrime group FIN7<\/a> has been exploiting the vulnerability since April 2023, while <\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

Researchers from\u00a0BlackBerry reported that in June 2024, a threat actor targeted a Latin American airline with the Akira ransomware<\/a>. The initial access to the target network was via Secure Shell (SSH) protocol and attackers exfiltrated critical data before deploying Akira ransomware the following day. They abused legitimate tools and Living off-the-Land Binaries and Scripts (LOLBAS) for reconnaissance and persistence. Once data exfiltration was completed, the attackers deployed ransomware to encrypt the infected systems. Akira, a Ransomware-as-a-Service (RaaS), has been used by Storm-1567<\/a> (aka Punk Spider and GOLD SAHARA), which is a group that has been active since 2023. Indicators such as DNS queries to a Remmina-related domain suggest the attacker is likely a Linux-based user.<\/p>\n\n\n\n

Below are the Day 1 and Day 2 of the Akira attack chain:<\/p>\n\n\n\n

\"Veeam<\/a><\/figure>\n\n\n\n
\"Veeam<\/a><\/figure>\n\n\n\n

During the attack on a Latin American airline, the attacker\u2019s first visible access to an unpatched Veeam backup server was via SSH from a router\u2019s IP address. The experts believe that attackers used the publicly available exploit for the vulnerability\u00a0CVE-2023-27532<\/a>.<\/gwmw><\/p>\n\n\n\n

Once inside the network, the attacker created a user named “backup” and added it to the Administrator group to secure elevated privileges. The attackers deployed the legitimate network management tool Advanced IP Scanner to scan local subnets identified via “route print”. <\/p>\n\n\n\n

The attacker took control of Veeam backup data by accessing the Veeam backup folder and compressed and uploaded various file types, including documents, images, and spreadsheets, to harvest confidential and valuable information. The attackers used the free Windows file manager WinSCP to exfiltrate the data to a server they controlled.<\/p>\n\n\n\n

The entire operation, from initial login to data exfiltration, took just 133 minutes, concluding with the final command at 4:55 PM UTC.<\/p>\n\n\n\n

“While NetScan ran on the primary Veeam backup server, antivirus (AV) protection was disabled on the virtual machine host, both through antivirus user interfaces (UI) and through the command line.” reads the report<\/a> published by BlackBerry. “Now that persistence was fully in place, the threat actors attempted to deploy ransomware network-wide using the Veeam backup server as the control point. We saw the file \u201cw.exe\u201d\u2014Akira ransomware\u2014being deployed across various hosts from the compromised Veeam server.<\/gwmw>“<\/em><\/gwmw><\/p>\n\n\n\n

Group-IB researchers also spotted a ransomware group exploiting the flaw in the Veeam Backup & Replication instances. The experts reported<\/a> that in April 2024, the EstateRansomware gang used a PoC exploit code to target the vulnerability\u00a0CVE-2023-27532<\/a>.<\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Veeam Backup & Replication)<\/strong><\/p>\n\n\n\n

<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Multiple ransomware groups were spotted exploiting a vulnerability, tracked as CVE-2023-27532, in Veeam Backup & Replication. The vulnerability CVE-2023-275327 (CVSS score of 7.5) impacts the Veeam Backup & Replication component. An attacker can exploit the issue to obtain encrypted credentials stored in the configuration database, potentially leading to gaining access to the backup infrastructure hosts. […]<\/p>\n","protected":false},"author":1,"featured_media":165772,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,5,7,55],"tags":[88,4112,9508,9506,10918,30,687,544,841,1533,15220],"class_list":["post-165753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-hacking","category-malware","category-security","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-pierluigi-paganini","tag-ransomware","tag-security-affairs","tag-security-news","tag-veeam-backup-replication"],"yoast_head":"\n杭州江阴科强工业胶带有限公司