Lucene search

K
hivepro
Hive ProHIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74
HistoryAug 24, 2021 - 10:35 a.m.

ProxyShell and PetitPotam exploits weaponized by LockFile Ransomware Group

2021-08-2410:35:48
Hive Pro
www.hivepro.com
689

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

THREAT LEVEL: Red.

For a detailed advisory, download the pdf file here.

LockFile, a new ransomware gang, has been active since last week. LockFile began by using a publicly disclosed PetitPotam exploit (CVE-2021-36942) to compromise Windows Domain Controllers earlier this week. Using ProxyShell vulnerabilities (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207), they've now infiltrated many Microsoft Exchange Servers . The origins of this gang are most likely China. This gang used a similar ransomware note as of LokiBot and is been linked to Conti ransomware due to the email id provided (contact@contipauper[.]com). HivePro Threat Research team advises everyone to patch the vulnerabilities to prevent an attack.

Vulnerability Details

Actor Details

Name |Target Locations|Target Sectors |
—|—|—|—
LockFile Ransomware | United States of America and Asia | Manufacturing, financial services, engineering, legal, business services, and travel and tourism sectors |

Indicators of Compromise (IoCs)

Type Value
IP Address 209.14.0.234
SHA-2 Hash ed834722111782b2931e36cfa51b38852c813e3d7a4d16717f59c1d037b62291
cafe54e85c539671c94abdeb4b8adbef3bde8655006003088760d04a86b5f915
36e8bb8719a619b78862907fd49445750371f40945fefd55a9862465dc2930f9
5a08ecb2fad5d5c701b4ec42bd0fab7b7b4616673b2d8fbd76557203c5340a0f
1091643890918175dc751538043ea0743618ec7a5a9801878554970036524b75
2a23fac4cfa697cc738d633ec00f3fbe93ba22d2498f14dea08983026fdf128a
7bcb25854ea2e5f0b8cfca7066a13bc8af8e7bac6693dea1cdad5ef193b052fd
c020d16902bd5405d57ee4973eb25797087086e4f8079fac0fd8420c716ad153
a926fe9fc32e645bdde9656470c7cd005b21590cda222f72daf854de9ffc4fe0
368756bbcaba9563e1eef2ed2ce59046fb8e69fb305d50a6232b62690d33f690
d030d11482380ebf95aea030f308ac0e1cd091c673c7846c61c625bdf11e5c3a
a0066b855dc93cf88f29158c9ffbbdca886a5d6642cbcb9e71e5c759ffe147f8

Patch Links

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36942&gt;

<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207&gt;

References

<https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lockfile-ransomware-new-petitpotam-windows&gt;

<https://www.bleepingcomputer.com/news/security/lockfile-ransomware-uses-petitpotam-attack-to-hijack-windows-domains/&gt;

Be first who know about 0-days in popular software

Do not waste time on finding information in tons of articles. Subscribe yourself and your colleagues on news and articles about products you need and you use!

Subscribe on news

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Related for HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74