Article Details
Scrape Timestamp (UTC): 2023-11-09 14:32:34.314
Original Article Text
Click to Toggle View
Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacks. Threat actors are exploiting a zero-day vulnerability in the service management software SysAid to gain access to corporate servers for data theft and to deploy Clop ransomware. SysAid is a comprehensive IT Service Management (ITSM) solution that provides a suite of tools for managing various IT services within an organization. The Clop ransomware is notorious for exploiting zero-day vulnerabilities in widely used software. Recent examples include MOVEit Transfer, GoAnywhere MFT, and Accellion FTA. Currently identified as CVE-2023-47246, the vulnerability was discovered on November 2 after hackers exploited it to breach on-premise SysAid servers. The Microsoft Threat Intelligence team discovered the security issue being leveraged in the wild and alerted SysAid. Microsoft determined that the vulnerability was used to deploy Clop ransomware by a threat actor it tracks as Lace Tempest (a.k.a. Fin11 and TA505). Attack details SysAid published a report on Wednesday disclosing that CVE-2023-47246 is a path traversal vulnerability that leads to unauthorized code execution. The company also shares technical details of the attack uncovered following an investigation from rapid incident response company Profero. The threat actor leveraged the zero-day flaw to upload into the webroot of the SysAid Tomcat web service a WAR (Web Application Resource) archive containing a webshell. This enabled the threat actors to execute additional PowerShell scripts and load the GraceWire malware, which was injected into a legitimate process (e.g.spoolsv.exe, msiexec.exe, svchost.exe). The report notes that the malware loader ('user.exe') checks running processes to ensure that Sophos security products are not present on the compromised system. After exfiltrating data, the threat actor tried to erase their tracks by using another PowerShell script that deleted activity logs. Microsoft also noticed that Lace Tempest deployed additional scripts that fetched a Cobalt Strike listener on compromised hosts. Security update available After learning of the vulnerability, SysAid worked quickly to develop a patch for CVE-2023-47246, which is available in a software update. All SysAid users are strongly recommended to switch to version 23.3.36 or later. System administrators should also check servers for signs of compromise by following the steps below: SysAid's report provides indicators of compromise that could help detect or prevent the intrusion, which consist in filenames and hashes, IP addresses, file paths used in the attack, and commands the threat actor used to download malware or to delete evidence of initial access.
Daily Brief Summary
A zero-day vulnerability in SysAid software has been exploited to launch Clop ransomware attacks.
Microsoft’s Threat Intelligence Center identified the exploitation of the vulnerability, CVE-2023-47246, initially observed on November 2.
The vulnerability allows attackers to perform unauthorized code execution on affected SysAid servers.
Hackers gained access through a WAR file uploaded to the webroot, enabling them to deploy a webshell, execute scripts, and eventually download GraceWire malware.
SysAid has issued a software update that patches the vulnerability, urging users to upgrade to version 23.3.36 or later.
Attackers specifically checked for the absence of Sophos security products before proceeding with their malicious activities.
Post-attack, threat actors attempted to delete evidence by removing activity logs and set up a Cobalt Strike listener for continued access.
Indicators of compromise have been shared by SysAid, including file names, hashes, and IP addresses linked to the attack.