{"id":23343,"date":"2023-11-09T06:10:04","date_gmt":"2023-11-09T14:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/09\/news-17073\/"},"modified":"2023-11-09T06:10:04","modified_gmt":"2023-11-09T14:10:04","slug":"news-17073","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/11\/09\/news-17073\/","title":{"rendered":"Update now! SysAid vulnerability is actively being exploited by ransomware affiliate"},"content":{"rendered":"\n<p>Users of SysAid on-premises should take action to deal with a vulnerability. SysAid is a widely used IT service management solution that allows IT teams to manage tasks.<\/p>\n<p>Microsoft discovered an ongoing exploitation of a <a href=\"https:\/\/www.malwarebytes.com\/glossary\/zero-day\">zero-day<\/a> vulnerability in the SysAid IT support software in limited attacks by Lace Tempest. Lace Tempest is an <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/11\/initial-access-brokers-iabs-3-ways-they-break-into-corporate-networks-and-how-to-detect-them\">initial access broker (IAB)<\/a> usually associated with the Cl0p ransomware.<\/p>\n<p>Once SysAid were notified by Microsoft on November 2, 2023, they started an investigation which confirmed that it was indeed a zero-day vulnerability. By definition, a zero-day vulnerability is any software vulnerability exploitable by hackers that doesn\u2019t have a patch yet.<\/p>\n<p>The investigation identified a previously unknown path traversal vulnerability leading to code execution within the SysAid on-prem software. Path traversal vulnerabilities allow attackers to read, and possibly write to, restricted files by inputting path traversal sequences like ..\/ into file or directory paths.<\/p>\n<p>The attackers used the vulnerability to upload a web shell and other payloads into the web root of the SysAid Tomcat web service. Tomcat is an open-source web server and servlet developed by the Apache Software Foundation. A web shell is a malicious script used by an attacker with the intent to escalate and maintain persistent access on an already compromised web application.<\/p>\n<p>The web shell provided the attacker with unauthorized access and control over the affected system. The attackers then used two PowerShell scripts to expand their hold. One to launch the Gracewire malware loader and the other to erase other evidence of the intrusion.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVE assigned to this vulnerability is:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-47246\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2023-47246<\/a>: a path traversal vulnerability that affects all SysAid On-Premises installations running versions before 23.3.36. SysAid Cloud customers are not affected by this vulnerability.<\/p>\n<p>If you are a SysAid customer using a SysAid On-Prem server, you are under <a href=\"https:\/\/www.sysaid.com\/blog\/service-desk\/on-premise-software-security-vulnerability-notification\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">advise<\/a> you to ensure that your SysAid systems are updated to <a href=\"https:\/\/documentation.sysaid.com\/docs\/latest-version-installation-files\">version 23.3.36 or later<\/a>, which includes the patches for the identified vulnerability.<\/p>\n<p>Organizations using SysAid should apply the patch as soon as possible and look for any signs of exploitation prior to patching (see Indicators of Compromise below). The Lace Tempest group exploited the vulnerability in the SysAid software to deliver a malware loader for the Gracewire malware. Once this foothold is established, it&#8217;s usually followed by human-operated activity, including lateral movement, data theft, and ransomware deployment.<\/p>\n<p>You should also review any credentials or other information that would have been available to someone with full access to your SysAid server and check any relevant activity logs for suspicious behavior.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-iocs\">IOCs<\/h2>\n<p><strong>File:<\/strong><\/p>\n<p>b5acf14cdac40be590318dee95425d0746e85b1b7b1cbd14da66f21f2522bf4d&nbsp;&nbsp;&nbsp;&nbsp; Malicious loader<\/p>\n<p><strong>IPs:<\/strong><\/p>\n<p>81.19.138.52&nbsp;&nbsp;&nbsp;&nbsp; GraceWire Loader <a href=\"https:\/\/www.malwarebytes.com\/glossary\/cc\">C2<\/a><\/p>\n<p>45.182.189.100 GraceWire Loader C2<\/p>\n<p>179.60.150.34&nbsp; Cobalt Strike C2<\/p>\n<p>45.155.37.105&nbsp; Meshagent remote admin tool C2<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"479\" height=\"329\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/11\/1796015034block.png\" alt=\"Malwarebytes blocks 179.60.150.34\" class=\"wp-image-97308\" \/><\/figure>\n<p class=\"has-text-align-center\"><em>Malwarebytes blocks the Cobalt Strike C2 179.60.150.34<\/em><\/p>\n<p><strong>File Paths:<\/strong><\/p>\n<p>C:Program FilesSysAidServertomcatwebappsusersfilesuser.exe<\/p>\n<p>C:Program FilesSysAidServertomcatwebappsusersfiles.war&nbsp;&nbsp;<\/p>\n<p>C:Program FilesSysAidServertomcatwebappsleave&nbsp;&nbsp;<\/p>\n<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-how-to-avoid-ransomware\">How to avoid ransomware<\/h3>\n<ul>\n<li><strong>Block common forms of entry.<\/strong>&nbsp;Create a plan for&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a>&nbsp;in internet-facing systems quickly; and disable or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a>&nbsp;like RDP and VPNs.<\/li>\n<li><strong>Prevent intrusions.<\/strong>&nbsp;Stop threats early before they can even infiltrate or infect your endpoints. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a>&nbsp;that can prevent exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions.<\/strong>&nbsp;Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a>&nbsp;to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption.<\/strong>&nbsp;Deploy Endpoint Detection and Response software like&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a>&nbsp;that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.<\/li>\n<li><strong>Create offsite, offline backups.<\/strong>&nbsp;Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Don\u2019t get attacked twice.<\/strong>&nbsp;Once you\u2019ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/11\/update-now-sysaid-vulnerability-is-actively-being-exploited-by-ransomware-affiliate\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A SysAid vulnerability is actively being exploited by a ransomware affiliate. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24873,30476,22783,30477,30478,32,30479,27167,3765,30480,16361],"class_list":["post-23343","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cl0p","tag-cve-2023-47246","tag-exploits-and-vulnerabilities","tag-gracewire","tag-lace-tempest","tag-news","tag-on-premises","tag-path-traversal","tag-ransomware","tag-sysaid","tag-web-shell"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23343"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23343\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23343"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}