Monday, November 4, 2024
HomeCVE/vulnerabilityHackers Actively Hijacking ConnectWise ScreenConnect server

Hackers Actively Hijacking ConnectWise ScreenConnect server

Published on

Malware protection

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024, revealing two significant vulnerabilities in its self-hosted ScreenConnect servers.

These vulnerabilities were initially reported on February 13 through a vulnerability disclosure program and were not actively exploited until February 20.

The first vulnerability, identified as CVE-2024-1708, is a path traversal issue with a high severity score of 8.4.

- Advertisement - SIEM as a Service

The second, CVE-2024-1709, is a remote code execution flaw with a maximum severity score of 10.0, indicating a critical risk.

You can analyze a malware file, network, module, and registry activity with the ANY.RUN malware sandbox, and the Threat Intelligence Lookup that will let you interact with the OS directly from the browser.

Analysis by the Shadowserver Foundation, & Shodan search engine found over 8,200 publicly accessible, unpatched ScreenConnect servers, predominantly in the United States, Canada, and the United Kingdom.

Exploits and Malware Distribution

By February 21, a proof-of-concept exploit was uploaded to GitHub, and a Metasploit module for CVE-2024-1709 was released, making the vulnerabilities easily exploitable by hackers of varying skill levels.

Secureworks researchers discovered that several of their customers’ servers had been scanned for these vulnerabilities, with some showing evidence of intrusion.

One incident involved the execution of a Cobalt Strike Beacon payload through a compromised ScreenConnect server.

Another attack involved downloading a legitimate SentinelUI.exe file, a DLL, and an encrypted file containing an encoded payload.

This malware impersonated Microsoft Windows Update network traffic for communication.

Huntress and Sophos reported similar incidents where Cobalt Strike Beacon and other malware like LockBit ransomware and AsyncRAT were distributed after exploiting these vulnerabilities.

Organizations are recommended to immediately upgrade vulnerable ScreenConnect servers and conduct forensic examinations for signs of exploitation.

They also recommend using available controls to review and restrict access based on the indicators provided in their security bulletin.

Secureworks Counter Threat shared a list of IP addresses and domain names associated with the attacker infrastructure, MD5, SHA1, and SHA256 hashes of the distributed Cobalt Strike Beacon DLLs and other malware samples; the list can be found here.

Organizations should consider the risks before opening these indicators in a browser, as they may contain malicious content.

ConnectWise’s security bulletin serves as a critical alert for organizations using ScreenConnect servers to take immediate action to protect their networks from these serious threats.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...