Conti ransomware raiders exploit 'ProxyShell' Exchange bugs

By
Follow google news

Gaining access to networks in less than a minute.

Affiliates of the Conti ransomware criminals are exploiting the ProxyShell vulnerabilities in Microsoft's Exchange Server to attack and remotely take over organisations' networks, security researchers warn.

Conti ransomware raiders exploit 'ProxyShell' Exchange bugs

ProxyShell is an attack chain that can be used to remotely run arbitrary commands on unpatched on-premises Exchange Servers, without authentication.

Security vendor Sophos observed that Conti affiliates appear to have sped up their attacks considerably, deploying ransomware in just a few hours instead of waiting for weeks.

The ransomware criminals install multiple webshells on Exchange Servers, and quickly obtain domain administrator credentials for full network mapping and takeover, Sophos said.

In one attack, the Conti affiliates installed two webshells, the Cobalt Strike penetration testing tool, and the AnyDesk, Atera, Splashtop and Remote Utilities commercial remote access software.

Sophos added that within 48 hours of inital access to the victim's networks, the Conti criminals had exfiltrated large amounts of data.

Five days after the initial intrusion, the Conti affiliates would deploy the ransomware, targeting network shares in particular, to encrypt the victim's computers.

Sophos advised Exchange Server operators to patch their software as soon as possible, as the threat of further attacks is extremely high.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW gov contractor uploaded Excel spreadsheet of flood victims' data to ChatGPT

NSW gov contractor uploaded Excel spreadsheet of flood victims' data to ChatGPT

Asahi Group production impacted by cyberattack

Asahi Group production impacted by cyberattack

QBE shifts cyber leadership to the US

QBE shifts cyber leadership to the US

First malicious MCP server for AI found

First malicious MCP server for AI found

Log In

  |  Forgot your password?