FBI-CISA Ghost Ransomware Warning Shows Staying Power of Old Vulnerabilities
FBI和CISA警告称,Ghost/Cring勒索软件团伙仍在利用旧漏洞攻击全球组织,涉及Fortinet、Adobe ColdFusion、Microsoft SharePoint和Exchange等多个高危漏洞。该团伙通过上传网络shell并使用恶意软件实施加密勒索。修复旧漏洞和加强网络安全仍是关键。 2025-2-24 08:30:43 Author: cyble.com(查看原文) 阅读量:13 收藏

A joint advisory from the FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued this week shows that old, unpatched vulnerabilities will remain targets as long as threat actors have a use for them. 

The Ghost (Cring) ransomware group the agencies warned about is still using many of the same vulnerabilities and tools as they were when Cyble warned about the group in an advisory to clients in April 2021.  

The agencies listed IOCs and TTPs identified in FBI investigations as recently as last month, providing a cautionary tale for organizations with old, unpatched vulnerabilities – and showing that it’s never too late to patch a vulnerability if it can still be exploited. 

Old Vulnerabilities Continue to Reward Hackers 

The CISA-FBI advisory noted that in early 2021, Ghost/Cring actors “began attacking victims whose internet-facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China.” 

The group, operating out of China, is primarily after financial gain. Other names associated with the group include Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files from the group include Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe. 

CISA and the FBI said the group obtains initial access to networks primarily via the following web-facing vulnerabilities: 

  • CVE-2018-13379 in Fortinet FortiOS appliances 
  • CVE-2010-2861 and CVE-2009-3960 in servers running Adobe ColdFusion 
  • CVE-2019-0604 in Microsoft SharePoint 
  • And the “ProxyShell” attack chain in Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207). 

Cyble’s 2021 advisory to clients noted, “The use of obsolete and vulnerable firmware versions on FortiGate VPN servers enabled attackers to launch attacks on industrial enterprises in European countries. Attackers exploited the high severity vulnerability, CVE-2018-13379, to gain access to enterprise networks and delivered Cring ransomware payload. Ransomware encrypted the servers, resulting in a temporary shutdown of the industrial process. The attackers’ success in exploiting the enterprise networks indicates that they had meticulously worked on the attack campaign to use their infrastructure and toolset in the campaign. 

“Once the attackers gained access to the enterprise network, they downloaded the Mimikatz utility to steal the account credentials of the previously logged-in user,” the 2021 Cyble advisory said. “The attackers used Cobalt Strike Framework to distribute malware to other systems on the organization’s network. They uploaded the Cobalt Strike payload using a malicious PowerShell script that decrypted the payload after getting launched. The PowerShell payload enables remote control of the infected system.” 

Those same TTPs appear to still be working for the group because the new CISA-FBI advisory included all of them. 

Ghost Ransomware TTPs 

The CISA-FBI advisory said the Ghost/Cring threat actors (TAs) “have been observed uploading a web shell to a compromised server and leveraging Windows Command Prompt and/or PowerShell to download and execute Cobalt Strike Beacon malware that is then implanted on victim systems.” 

The TAs typically only spend a few days on victim networks, but they have been observed creating new local and domain accounts and changing passwords on existing accounts. 

They often use Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user and elevate privileges. 

They have used several open-source tools, including SharpZeroLogon, SharpGPPPass, BadPotato, and GodPotato, to attempt privilege escalation. They also use the Cobalt Strike function “hash dump” or Mimikatz to steal passwords and password hashes. 

The Ghost/Cring actors frequently run a command to disable Windows Defender on network-connected devices. They have used Cobalt Strike commands for domain account discovery, open-source tools such as SharpShares for network share discovery, and Ladon 911 and SharpNBTScan for remote systems discovery. Cobalt Strike Beacon malware and Cobalt Strike Team Servers are used for command and control (C2) operations. 

Patching, Cybersecurity Hygiene Remain Critical Practices

One interesting line in the CISA-FBI advisory underscores the fundamental importance of good cybersecurity hygiene: “Ghost actors tend to move to other targets when confronted with hardened systems, such as those where proper network segmentation prevents lateral moment to other devices,” the agencies said. 

The advisory shows that fundamental security best practices like patching, network segmentation, endpoint hardening, protecting secrets and sensitive data, and network and endpoint monitoring remain the surest ways to keep your organization safe. 

Ghost Ransomware Indicators of Compromise (IoCs)

Here are the file hashes included in the Indicators of Compromise (IoCs) in the FBI-CISA advisory: 

File name MD5 File Hash 
Cring.exe c5d712f82d5d37bb284acd4468ab3533 
Ghost.exe 34b3009590ec2d361f07cac320671410 
 
d9c019182d88290e5489cdf3b607f982 
ElysiumO.exe 29e44e8994197bdb0c2be6fc5dfc15c2 
 
c9e35b5c1dc8856da25965b385a26ec4 
 
d1c5e7b8e937625891707f8b4b594314 
Locker.exe ef6a213f59f3fbee2894bd6734bbaed2 
iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3 
x86.log (IOX) c3b8f6d102393b4542e9f951c9435255 
 
0a5c4ad3ec240fbfd00bdc1d36bd54eb 
sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5 
main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9 
isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d 
sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090 

Related

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.


文章来源: https://cyble.com/blog/fbi-cisa-shows-staying-power-of-old-vulnerabilities/
如有侵权请联系:admin#unsafe.sh