Lucene search

K
hiveproHive ProHIVEPRO:3E02C2FF0A137A10F6A8876C69C320B3
HistoryJul 08, 2021 - 12:32 p.m.

REvil Ransomware gang behind the Kaseya VSA Supply-Chain attack

2021-07-0812:32:57
Hive Pro
www.hivepro.com
46

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

THREAT LEVEL: Red.

For a detailed advisory, download the pdf file here.

The REvil ransomware group was successful in carrying out a supply chain attack by exploiting the zero-day vulnerability (CVE-2021-30116) in the Kaseya VSA server and delivering a malicious script to all the computer devices managed by servers. The script delivered the REvil ransomware and encrypted the files of the clients managed by the server affecting almost 1 million computer devices.

Hive Pro researchers have identified that there are three more zero-day vulnerabilities that were possibly used to target the clients:

  • Authentication Bypass Vulnerability
  • Arbitrary File Upload Vulnerability
  • Code Injection Vulnerability

The Techniques used by the REvil ransomware includes:

  • TA0001: Initial Access
  • T1189: Drive-by Compromise
  • T1566: Phishing
  • T1566.001: Spear phishing Attachment
  • TA0002: Execution
  • T1059: Command and Scripting Interpreter
  • T1106: Native API
  • T1059.001: PowerShell
  • T1059.005: Visual Basic
  • T1059.003: Windows Command Shell
  • TA0003: Persistence
  • T1204: User Execution
  • T1047: Windows Management Instrumentation
  • T1204.002: Malicious File
  • TA0004: Privilege Escalation
  • T1134: Access Token Manipulation
  • T1134.002: Create Process with Token
  • T1134.001: Token Impersonation/Theft
  • T1574:Hijack Execution Flow
  • T1574.002:Hijack Execution Flow: DLL Side-Loading
  • TA0005: Defense Evasion
  • T1134: Access Token Manipulation
  • T1134.002: Create Process with Token
  • T1134.001: Token Impersonation/Theft
  • T1140: DE obfuscate/Decode Files or Information
  • T1055: Process Injection
  • TA0006: Credential Access
  • T1562: Impair Defenses
  • T1562.001: Disable or Modify Tools
  • T1070: Indicator Removal on Host
  • T1070.004: File Deletion
  • T1036: Masquerading
  • T1036.005: Match Legitimate Name or Location
  • T1112: Modify Registry
  • T1027: Obfuscated Files or Information
  • T1055: Process Injection
  • TA0007: Discovery
  • T1083: File and Directory Discovery
  • TA0008: Lateral Movement
  • T1069: Permission Groups Discovery
  • T1069.002: Domain Groups
  • T1012: Query Registry
  • T1082: System Information Discovery
  • TA0011: Command and Control
  • T1071: Application Layer Protocol
  • T1071.001: Web Protocols
  • T1573: Encrypted Channel
  • T1573.002: Asymmetric Cryptography
  • T1105: Ingress Tool Transfer
  • TA0010: Exfiltration
  • T1041: Exfiltration Over C2 Channel
  • TA0040: Impact
  • T1485: Data Destruction
  • T1486: Data Encrypted for Impact
  • T1490: Inhibit System Recovery
  • T1489: Service Stop

Threat Actor

Vulnerability Details

Indicators of Compromise

Type Value
IPv4 161[.]35.239.148
Hash(SHA1) d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd
e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2
45AEBD60E3C4ED8D3285907F5BF6C71B3B60A9BCB7C34E246C20410CF678FC0C

References

<https://www.bleepingcomputer.com/news/security/kaseya-was-fixing-zero-day-just-as-revil-ransomware-sprung-their-attack/&gt;

<https://otx.alienvault.com/pulse/60e40b4535299fb6755143cf&gt;

<https://us-cert.cisa.gov/ncas/current-activity/2021/07/02/kaseya-vsa-supply-chain-ransomware-attack&gt;

<https://www.tenable.com/blog/cve-2021-30116-multiple-zero-day-vulnerabilities-in-kaseya-vsa-exploited-to-distribute-ransomware&gt;

<https://www.reddit.com/r/msp/comments/ocggbv/crticial_ransomware_incident_in_progress/&gt;

<https://blog.truesec.com/2021/07/04/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware/&gt;

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P