Cymulate’s August 2021 Cyberattacks Wrap-up
No summertime vacation for threat actors who were once again very busy during August 2021, launching ransomware attacks against several organizations. The Conti ransomware operators were very active this month, breaching the systems of SAC Wireless, a US-based Nokia subsidiary. They were able to upload the stolen information to their cloud server and encrypt files on the compromised systems. The FBI has connected Conti to more than 400 cyberattacks against organizations with ransom demands as high as $25 million. Conti runs its ransomware operation as a Ransomware-as-a-Service (RaaS). The core team manages the Conti malware and Tor sites, while Conti affiliates breach networks and encrypt devices. The profits are split between 30% (for the core team) and 70% (for the affiliate). When Conti did not keep its end of the bargain, a disgruntled affiliate got even by publishing inside information about the Conti operation. The leaked information included Conti’s IP addresses for Cobalt Strike C2 servers and an archive of 113 MB archive, which contained hacking tools, manuals written in Russian (for using Cobalt Strike, mimikatz to dump NTLM hashes, and text files with various commands), training material, and help documents for affiliates to perform Conti ransomware attacks.
The Proxyshell Vulnerability
During August, we saw that more and more cyberattacks are targeting Active Directory. For instance, LockFile attackers gained access to Active Directory by exploiting the ProxyShell Exchange Server and PetitPotam vulnerabilities for dropping malware. The LockFile malware was first detected in July 2021 and is designed to attack enterprises in various industries such as manufacturing, financial services, engineering, legal, business services, and travel and tourism.- The threat actors first compromised Exchange servers using a ProxyShell attack vector.
- They then installed a set of tools, including an exploit for the CVE-2021-36942 vulnerability (aka PetitPotam, an NTLM relay attack bug that can be used by a low-privileged attacker to take over a domain controller).
- They also installed the active_desktop_launcher.exe to load a malicious active_desktop_render.dll file.
- Once this file was loaded and decrypted, a shellcode from the file was executed for activating the efspotato.exe file to exploit PetitPotam.
- Once the threat actors gained access to the local domain controller, they copied the LockFile ransomware as well as a batch file and supporting executables to the domain controller.