Categories: Ransomware

LockFile Ransomware Exploit ProxyShell Vulnerabilities in Microsoft Exchange Servers

The Microsoft exchange servers were hacked by a very new ransomware gang that is known as LockFile. According to the cyber security expert, this ransomware gang has appeared in July 2021.

However, the main motive of this ransomware is to encrypt Windows domains soon after hacking into Microsoft Exchange servers, and this they do with the help of ProxyShell vulnerabilities that has been revealed recently.

As we said above that the threat actors conduct this operation while using the ProxyShell vulnerabilities, well the hackers generally breach the targets with unpatched, on-premises Microsoft Exchange servers, and which are being followed by a PetitPotam NTLM relay attack as it seizes the whole control of the domain.

Vulnerabilities Discovered Earlier

After investigating the attack, the experts Devcore Principal Security Researcher Orange Tsai have found three vulnerabilities, and later he attached them all together so that he can take over a Microsoft Exchange server in April’s Pwn2Own 2021 hacking competition.

  • CVE-2021-34473 – Pre-auth Path Confusion leads to ACL Bypass (Patched in April by KB5001779)
  • CVE-2021-34523 – Elevation of Privilege on Exchange PowerShell Backend (Patched in April by KB5001779)
  • CVE-2021-31207 – Post-auth Arbitrary-File-Write leads to RCE (Patched in May by KB5003435)

What Did We Know About the LockFile Ransomware?

The security analysts are trying their best to know all the key details reading this particular attack. However, there are many findings that are yet to disclose, but in July the experts first noted that the ransom note was named ‘LOCKFILE-README.hta’ but the interesting fact is that it does not have any special branding.

The attackers are using branded ransom notes that are designating that they were called ‘LockFile. Moreover, all these ransom notes apply a naming format of ‘[victim_name]-LOCKFILE-README.hta’ and later it advised the victim to communicate with them through Tox or email if they want to negotiate the ransom.

The RansomNote is An HTML Application

The researchers stated that the function at 0x7f00 initially generates the HTA ransom note, such as, ‘LOCKFILE-README-[hostname]-[id].hta’ in the root of the drive. 

After the investigation, the experts noted that instead of dropping a note in TXT format, the LockFile formats its ransom note as an HTML Application (HTA) file. The most important point is that the HTA ransom note that was being used by LockFile matches the one that is used by LockBit 2.0 ransomware.

Patch now!

After knowing all the details its been clear that this ransomware gang uses both the Microsoft Exchange ProxyShell vulnerabilities and the Windows PetitPotam NTLM Relay vulnerability.

According to the researchers, it’s quite important that Windows administrators must install the latest updates. Well in the case of ProxyShell vulnerabilities, the users can install the most advanced Microsoft Exchange cumulative updates as it will help to patch the vulnerability.

This type of ransomware attack is quite difficult to patch, but the experts stated that they are trying their best to circumvent this attack, as soon as possible.

Also Read: Ransomware Attack Response and Mitigation Checklist

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging SocGholish…

5 hours ago

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat (APT)…

5 hours ago

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6 billion…

5 hours ago

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted at…

6 hours ago

Python-Based Discord RAT Enables Remote Control and Disruption Through a Simple Interface

A newly analyzed Python-based Remote Access Trojan (RAT) has emerged as a significant cybersecurity threat,…

6 hours ago

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an outdated…

7 hours ago