{"id":15707,"date":"2019-07-03T18:30:05","date_gmt":"2019-07-04T02:30:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/07\/03\/news-9454\/"},"modified":"2019-07-03T18:30:05","modified_gmt":"2019-07-04T02:30:05","slug":"news-9454","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/03\/news-9454\/","title":{"rendered":"Sodin ransomware enters through MSPs"},"content":{"rendered":"<p><strong>Credit to Author: Pavel Shoshin| Date: Thu, 04 Jul 2019 02:13:30 +0000<\/strong><\/p>\n<p>At the end of March, when <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/msp-as-a-threat-vector\/\" rel=\"noopener noreferrer\">we wrote<\/a> about a GandCrab ransomware attack on an MSP&#8217;s clients, we figured it was unlikely to be an isolated case. \u00a0Managed service providers are just too tempting a target for cybercriminals to ignore.<\/p>\n<p>It appears we were right. In April, ransomware dubbed Sodin captured our experts&#8217; attention. It differed from the others in that in addition to using gaps in MSPs&#8217; security systems, it also exploited a vulnerability in the Oracle WebLogic platform. And whereas it&#8217;s typical for ransomware to require a user&#8217;s involvement (for example, the victim would need to launch a file from a phishing letter), in this case, no user participation is needed.<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/07\/03220159\/sodin-msp-ransomware-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/07\/03220159\/sodin-msp-ransomware-featured.jpg\" alt=\"Managed service providers are just too tempting a target for cybercriminals to ignore.\" width=\"1280\" height=\"840\" class=\"aligncenter size-full wp-image-27531\" \/><\/a> <\/p>\n<p>You can read about the technical details of this ransomware in <a target=\"_blank\" href=\"https:\/\/securelist.com\/sodin-ransomware\/91473\/\" rel=\"noopener noreferrer\">this Securelist post<\/a>. From our point of view, the most interesting thing about this malware is its means of distribution.<\/p>\n<h2>Sodin distribution methods<\/h2>\n<p>For purposes of spreading the malware through <a target=\"_blank\" href=\"https:\/\/threatpost.com\/new-sodinokibi-ransomware-exploits-critical-oracle-weblogic-flaw\/144233\/\" rel=\"noopener noreferrer\">WebLogic<\/a>, attackers used the CVE-2019-2725 vulnerability to execute a PowerShell command on a vulnerable Oracle WebLogic server. Doing so allowed them to upload a dropper to the server, which then installed the payload \u2014 the Sodin ransomware. Patches for the bug were released back in April, but at the end of June a similar vulnerability was discovered \u2014 CVE-2019-2729.<\/p>\n<p>In attacks using MSPs, Sodin gets onto users&#8217; machines in different ways. Users of at least three providers have already suffered from this Trojan. According to <a target=\"_blank\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/attackers-exploit-msps-tools-to-distribute-ransomware\/d\/d-id\/1335025\" rel=\"noopener noreferrer\">this story on DarkReading<\/a>, in some cases the attackers used the Webroot and Kaseya remote access consoles to deliver the Trojan. In other cases, <a target=\"_blank\" href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/c2wls0\/kaseya_weaponized_to_deliver_sodinokibi_ransomware\/\" rel=\"noopener noreferrer\">as described on Reddit<\/a>, the attackers penetrated MSP infrastructure using an RDP connection, elevated privileges, deactivated security solutions and backups, and then downloaded ransomware to client computers.<\/p>\n<h2>What service providers should do<\/h2>\n<p>For a start, take seriously the storing of passwords for remote access to anything, and use two-factor authentication wherever possible. Remote consoles for both Kaseya and Webroot support two-factor authentication. Furthermore, after the incident, developers began to mandate its use. As we can see, the attackers who distribute Sodin do not wait to stumble on opportunity; they purposefully look for \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0various methods of distributing malware through MSP providers. That&#8217;s why it is necessary to look carefully at all other tools used in this sphere. RDP access, as we&#8217;ve said time and again, should be used only as a last resort.<\/p>\n<p>MSPs, and especially those that provide cybersecurity services, should take protection of their infrastructure even more seriously than their client infrastructure. Here is what <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/advert\/partners\/managed-service-provider?redef=1&amp;THRU&amp;reseller=gl_kdmsp_acq_ona_smm__onl_b2b__wpplaceholder_______\" rel=\"noopener noreferrer\">Kaspersky can offer MSPs to protect themselves<\/a> and their clients.<\/p>\n<h2>What other companies should do<\/h2>\n<p>Of course, updating software remains a critical job. Malware getting into your infrastructure through vulnerabilities discovered and closed months ago is an embarrassing example of an obviously unforced error.<\/p>\n<p>Companies using Oracle WebLogic should first familiarize themselves with Oracle Security Alert Advisories for both vulnerabilities \u2014 <a target=\"_blank\" href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/alert-cve-2019-2725-5466295.html\" rel=\"noopener noreferrer\">CVE-2019-2725<\/a> and <a target=\"_blank\" href=\"https:\/\/www.oracle.com\/technetwork\/security-advisory\/alert-cve-2019-2729-5570780.html\" rel=\"noopener noreferrer\">CVE-2019-2729<\/a>.<\/p>\n<p>And it is also wise to use <a href=\"https:\/\/go.kaspersky.com\/Global_Trial_Advanced_SOC.html?utm_source=kdaily&#038;utm_medium=blog&#038;utm_campaign=gl_kesbkb_ey0081_organic&#038;utm_content=link&#038;utm_term=gl_kdaily_organic_ey0081_link_blog_kesbkb\" target=\"_blank\">reliable security solutions<\/a> with subsystems that are able to detect ransomware and protect workstations from it.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\" \/> <br \/><a href=\"https:\/\/www.kaspersky.com\/blog\/sodin-msp-ransomware\/27530\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pavel Shoshin| Date: Thu, 04 Jul 2019 02:13:30 +0000<\/strong><\/p>\n<p>This ransomware uses managed service providers\u2019 infrastructure or the Oracle Weblogic vulnerability to infect and encrypt victims\u2019 systems.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[1001,12756,3765,12321],"class_list":["post-15707","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-business","tag-msp","tag-ransomware","tag-smb"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15707"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15707\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15707"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}