{"id":18554,"date":"2022-03-21T13:10:10","date_gmt":"2022-03-21T21:10:10","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/21\/news-12287\/"},"modified":"2022-03-21T13:10:10","modified_gmt":"2022-03-21T21:10:10","slug":"news-12287","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/21\/news-12287\/","title":{"rendered":"AvosLocker ransomware uses Microsoft Exchange Server vulnerabilities, says FBI"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 21 Mar 2022 21:09:12 +0000<\/strong><\/p>\n<p>The FBI has issued an<a href=\"https:\/\/www.ic3.gov\/Media\/News\/2022\/220318.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> advisory<\/a> about the AvosLocker ransomware. Notably the FBI has noticed that several victims have reported Microsoft Exchange\u00a0Server vulnerabilities as the intrusion vector. <\/p>\n<p>AvosLocker is a Ransomware as a Service (RaaS) affiliate-based group that has targeted victims across multiple critical infrastructure sectors in the United States including financial services, critical manufacturing, and government facilities.<\/p>\n<h2>Threat profile<\/h2>\n<p>AvosLocker ransomware is a multi-threaded Windows executable written in C++ that runs as a console application and shows a log of actions performed on victim systems. AvosLocker ransomware encrypts files on a victim\u2019s server and renames them with the \u201c.avos\u201d extension.<\/p>\n<p>The AvosLocker executable leaves a ransom note called GET_YOUR_FILES_BACK.txt in all directories where encryption occurs. The ransom note includes a .onion site that contains instructions for paying the ransom and receiving a decryption key.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" data-attachment-id=\"55213\" data-permalink=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/avoslocker-ransomware-uses-microsoft-exchange-server-vulnerabilities-says-fbi\/attachment\/ransom_note-1-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1.png\" data-orig-size=\"653,341\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ransom_note-1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-300x157.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-600x313.png\" loading=\"lazy\" width=\"600\" height=\"313\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-600x313.png\" alt=\"\" class=\"wp-image-55213\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-600x313.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-300x157.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1-630x330.png 630w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/ransom_note-1.png 653w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<blockquote class=\"wp-block-quote\">\n<p><em>Attention!<\/em><\/p>\n<p><em>Your systems have been encrypted, and your confidential documents were downloaded.<\/em><\/p>\n<p><em>In order to restore your data, you must pay for the decryption key &amp; application.<\/em><\/p>\n<p><em>You may do so by visiting us at &lt;onion address&gt;.<\/em><\/p>\n<p><em>This is an onion address that you may access using Tor Browser which you may download at <a href=\"https:\/\/www.torproject.org\/download\/\">https:\/\/www.torproject.org\/download\/<\/a><\/em><\/p>\n<p><em>Details such as pricing, how long before the price increases and such will be available to you once you enter your ID presented to you below in this note in our website.<\/em><\/p>\n<p><em>Contact us soon, because those who don\u2019t have their data leaked in our press release blog and the price they\u2019ll have to pay will go up significantly.<\/em><\/p>\n<p><em>The corporations whom don\u2019t pay or fail to respond in a swift manner have their data leaked in our blog, accessible at &lt;onion address&gt;<\/em><\/p>\n<\/blockquote>\n<p>So, besides encrypting your files, AvosLocker also exfiltrates data and threatens to publish the stolen data to its leaks site. The public leak site not only lists victims of AvosLocker, along with a sample of data allegedly stolen from the victim\u2019s network, but also gives visitors an opportunity to view a sample of victim data and to purchase that data.<\/p>\n<p>The FBI also notes that in some cases, AvosLocker victims receive phone calls from an AvosLocker representative. The caller encourages the victim to go to the .onion site to negotiate, and threatens to post stolen data online. In some cases, AvosLocker actors will threaten and execute distributed denial-of-service (DDoS) attacks during negotiations.<\/p>\n<h2>Exchange vulnerabilities<\/h2>\n<p>Since AvosLocker is a Ransomware-as-a-Service it may depend on the affiliate which of the vulnerabilities gets used.<\/p>\n<p>The Exchange Server vulnerabilities are named as: CVE-2021-31207, CVE-2021-34523, and CVE-2021-34473, and CVE-2021-26855.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-31207\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-31207<\/a>: a Microsoft Exchange Server security feature bypass vulnerability. The vulnerability allows a remote user to bypass the authentication process. This is the way in.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-34523\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-34523<\/a>: a Microsoft Exchange Server elevation of privilege (EoP) vulnerability. The vulnerability allows a user to raise their permissions. This is how they take control.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-34473\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-34473<\/a>: a Microsoft Exchange Server remote code execution (RCE) vulnerability. The vulnerability allows an authenticated user to execute arbitrary code in the context of SYSTEM and write arbitrary files. This allows the attacker to drop malware on the server and run it.<\/p>\n<p>This is exactly the same attack chain we <a href=\"https:\/\/blog.malwarebytes.com\/exploits-and-vulnerabilities\/2021\/08\/patch-now-microsoft-exchange-attacks-target-proxyshell-vulnerabilities\/\">described<\/a> in August 2021. This chain of attack was generally referred to as ProxyShell.<\/p>\n<p>Another RCE vulnerability in Exchange Server has been seen as well:<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-26855\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-26855<\/a>: the ProxyLogon vulnerability which we discussed in detail in our article on <a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2021\/03\/microsoft-exchange-attacks-cause-panic-as-criminals-go-shell-collecting\/\">Microsoft Exchange attacks causing panic as criminals go shell collecting<\/a>. The vulnerability allows an attacker to drop a webshell on a vulnerable Exchange Server. A web shell is a script used by an attacker that allows them to escalate and maintain persistent access on an already compromised web application. (Obviously, not every web shell is malicious, but the non-malicious ones are not interesting to us in this context.)<\/p>\n<h2>Mitigation<\/h2>\n<p>As we stated earlier, all these vulnerabilities have been patched. So, if you are wondering which updates to install next and you are running one or more Microsoft Exchange Server instances, starting there might be a good idea.<\/p>\n<p>Microsoft\u2019s team has published a <a href=\"https:\/\/github.com\/microsoft\/CSS-Exchange\/tree\/main\/Security\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">script on GitHub<\/a> that can check the status of protection against ProxyLogon vulnerabilities of Exchange servers.<\/p>\n<h2>Detection<\/h2>\n<p>Malwarebytes detects AvosLocker as <a href=\"https:\/\/blog.malwarebytes.com\/detections\/ransom-avoslocker\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Ransom.AvosLocker<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" data-attachment-id=\"55214\" data-permalink=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/avoslocker-ransomware-uses-microsoft-exchange-server-vulnerabilities-says-fbi\/attachment\/detection-2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2.png\" data-orig-size=\"469,307\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"detection-2\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2-300x196.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2.png\" loading=\"lazy\" width=\"469\" height=\"307\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2.png\" alt=\"\" class=\"wp-image-55214\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2.png 469w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/detection-2-300x196.png 300w\" sizes=\"auto, (max-width: 469px) 100vw, 469px\" \/><figcaption><em>Malwarebytes blocks Ransom.AvosLocker<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Stay safe, everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/avoslocker-ransomware-uses-microsoft-exchange-server-vulnerabilities-says-fbi\/\">AvosLocker ransomware uses Microsoft Exchange Server vulnerabilities, says FBI<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/avoslocker-ransomware-uses-microsoft-exchange-server-vulnerabilities-says-fbi\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Mon, 21 Mar 2022 21:09:12 +0000<\/strong><\/p>\n<p>The AvosLocker ransomware as a service affiliates have been found to target multiple critical infrastructure sectors, using Exchange Server vulnerabilities.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/03\/avoslocker-ransomware-uses-microsoft-exchange-server-vulnerabilities-says-fbi\/\">AvosLocker ransomware uses Microsoft Exchange Server vulnerabilities, says FBI<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25301,25447,25448,25449,25450,17775,6627,25002,24974,3765],"class_list":["post-18554","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-avoslocker","tag-cve-2021-26855","tag-cve-2021-31207","tag-cve-2021-34473","tag-cve-2021-34523","tag-exchange-server","tag-fbi","tag-proxylogon","tag-proxyshell","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18554"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18554\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}