{"id":21194,"date":"2023-02-08T16:11:30","date_gmt":"2023-02-09T00:11:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/08\/news-14926\/"},"modified":"2023-02-08T16:11:30","modified_gmt":"2023-02-09T00:11:30","slug":"news-14926","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/08\/news-14926\/","title":{"rendered":"Update now! GoAnywhere MFT zero-day patched"},"content":{"rendered":"<p>An emergency patch (7.1.2) has been&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/actively-exploited-goanywhere-mft-zero-day-gets-emergency-patch\/\" target=\"_blank\">released<\/a>&nbsp;for an actively exploited zero-day vulnerability found in the GoAnywhere MFT administrator console.<\/p>\n<p>GoAnywhere MFT, which stands for managed file transfer, is a software solution that allows businesses to manage and exchange files in a secure and compliant way. According to its website, it caters to&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.goanywhere.com\/about\" target=\"_blank\">more than 3,000<\/a>&nbsp;organizations,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/enlyft.com\/tech\/products\/goanywhere-mft\" target=\"_blank\">mostly<\/a>&nbsp;those with more than 10,000 employees and 1B USD in revenue.<\/p>\n<p>Some of these organizations are part of vital infrastructures; such as local governments, financial companies, healthcare organizations, energy firms; and technology manufacturers. A breach resulting from a GoAnywhere exploitation would lead to a serious supply chain attack.<\/p>\n<p>Fortra (formerly HelpSystems), the company behind GoAnwhere MFT and&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/06\/cobalt-strike-a-penetration-testing-tool-popular-among-criminals\">Cobalt Strike<\/a>, released the patch to finally secure the vulnerability, which allows an attacker to perform unauthenticated remote code execution during instances when the administrator console is made accessible in the public internet. Florian Hauser (<a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/frycos\" target=\"_blank\">@frycos<\/a>), IT security consultant at Code White, released a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/exploit-released-for-actively-exploited-goanywhere-mft-zero-day\/\" target=\"_blank\">proof-of-concept (PoC) exploit<\/a>&nbsp;for the vulnerability on Monday.<\/p>\n<p>Brian Krebs of KrebsOnSecurity graciously&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/cyberplace.social\/@briankrebs@infosec.exchange\/109795711251567498\" target=\"_blank\">shared<\/a>&nbsp;what Fortra said in its advisory, which can only be accessed by creating a free account:<\/p>\n<blockquote>\n<p>&#8220;The attack vector of this exploit requires access to the administrative console of the application, which in most cases is accessible only from within a private company network, through VPN, or by allow-listed IP addresses (when running in cloud environments, such as Azure or AWS).&#8221; However, a scan using Shodan, the search engine for internet-connected devices, revealed&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/beta.shodan.io\/search?query=http.favicon.hash%3A1484947000\" target=\"_blank\">more or less a thousand instances<\/a>&nbsp;of exposed GoAnywhere admin panels, the majority of which were found in Europe and the US.<\/p>\n<\/blockquote>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/easset_upload_file52763_258910_e.png\" alt=\"\" width=\"918\" height=\"481\" \/><br \/>Shodan results came up after security professional Kevin Beaumont did some digging. He said the GoAnywhere admin consoles use ports 8000 and 8001. (Source:&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/cyberplace.social\/@GossiTheDog\/109795920737215405\" target=\"_blank\">Kevin Beaumont on Mastadon<\/a>)<\/p>\n<p>Fortra urges clients to apply emergency patch 7.1.2 as quickly as possible. If for some reason you can&#8217;t, Fortra says you should follow the mitigation steps it put out days before, which involves implementing some access control wherein the administrator console interface should only be accessed from trusted sources, or disabling the licensing service altogether. There is also a technical mitigation configuration shared in the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/exploit-released-for-actively-exploited-goanywhere-mft-zero-day\/\" target=\"_blank\">advisory<\/a>.<\/p>\n<p>Furthermore, clients must take the following additional steps after applying the mitigation steps if they suspect that attackers have already compromised their systems:<\/p>\n<ul>\n<li>Rotate the master encryption key.<\/li>\n<li>Reset credentials.<\/li>\n<li>Review audit logs and delete suspicious admin or user accounts.<\/li>\n<li>Contact Fortra support by going to its&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/my.goanywhere.com\/\" target=\"_blank\">portal<\/a>, emailing technicians at&nbsp;<a href=\"mailto:goanywhere.support@helpsystems.com\">goanywhere.support@helpsystems.com<\/a>, or phoning them up at 402-944-4242.<\/li>\n<\/ul>\n<hr \/>\n<p><strong>We don&#8217;t just report on threats&mdash;we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by <a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading&nbsp;Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/update-now-goanywhere-mft-zero-day-patched\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: GoAnywhere MFT<\/p>\n<p>Tags:  managed file transfer<\/p>\n<p>Tags:  Kevin Beaumont<\/p>\n<p>Tags:  Brian Krebs<\/p>\n<p>Tags:  emergency patch 7.1.2<\/p>\n<p>Tags:  Fortra<\/p>\n<p>Tags:  Cobalt Strike<\/p>\n<p>Tags:  Florian Hauser<\/p>\n<p>Tags:  Code White<\/p>\n<p>A bug in GoAnywhere, a B2B management file transfer software, could lead to a serious supply chain attack if left unpatched. Update now!<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/update-now-goanywhere-mft-zero-day-patched\" title=\"Update now! GoAnywhere MFT zero-day patched\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/update-now-goanywhere-mft-zero-day-patched\">Update now! GoAnywhere MFT zero-day patched<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18006,24291,28569,28566,28568,28567,28564,26548,28565,32],"class_list":["post-21194","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-brian-krebs","tag-cobalt-strike","tag-code-white","tag-emergency-patch-7-1-2","tag-florian-hauser","tag-fortra","tag-goanywhere-mft","tag-kevin-beaumont","tag-managed-file-transfer","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21194"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21194\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21194"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}