24.6 C
Canberra
Thursday, November 14, 2024

VEEAM exploit seen used once more with a brand new ransomware: “Frag” – Sophos Information


Final month, Sophos X-Ops reported a number of MDR instances the place risk actors exploited a vulnerability in Veeam backup servers. We proceed to trace the actions of this risk cluster, which just lately included deployment of a brand new ransomware. The vulnerability, CVE-2024-40711, was used as a part of a risk exercise cluster we named STAC 5881. Assaults leveraged compromised VPN home equipment for entry and used the VEEAM vulnerability to create a brand new native administrator account named “level”.

Some instances on this cluster led to the deployment of Akira or Fog ransomware. Akira was first seen in 2023; its leak web site was offline briefly in October, however is again on-line and we proceed to see Akira assaults. Fog emerged earlier this 12 months, first seen in Might. In a latest case MDR analysts as soon as once more noticed the ways related to STAC 5881 – however this time noticed the deployment of a previously-undocumented ransomware referred to as “Frag”.

Determine 1: The Frag ransom word.

Much like the earlier occasions, the risk actor used a compromised VPN equipment for entry, leveraged the VEEAM vulnerability, and created a brand new account named ‘level’.
Nonetheless on this incident a ‘point2’ account was additionally created.

Frag is executed on the command line with a lot of parameters, with one required: proportion of file encryption. The attacker can specify directories or particular person recordsdata to encrypt.

Determine 2. The Frag ransomware comes with a assist parameter to information attackers.

When encrypted, recordsdata are given a .frag extension. On this case, the ransomware was blocked by Sophos endpoint safety’s CryptoGuard function.  A detection for the ransomware binary has since been added.

Determine 2: The “.frag” extension added to encrypted recordsdata.

The similarity within the ways, methods and practices of the actor behind Frag to these utilized by Akira and Fog risk actors has additionally been noticed by Agger Labs. Sophos X-Ops is intently monitoring this doable emergence of a brand new ransomware participant with behaviors beforehand seen in Akira ransomware. We are going to proceed to trace this risk conduct. We are going to replace this put up with extra technical particulars as they grow to be out there.

 

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

[td_block_social_counter facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" style="style8 td-social-boxed td-social-font-icons" tdc_css="eyJhbGwiOnsibWFyZ2luLWJvdHRvbSI6IjM4IiwiZGlzcGxheSI6IiJ9LCJwb3J0cmFpdCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3Njh9" custom_title="Stay Connected" block_template_id="td_block_template_8" f_header_font_family="712" f_header_font_transform="uppercase" f_header_font_weight="500" f_header_font_size="17" border_color="#dd3333"]
- Advertisement -spot_img

Latest Articles