27 April 2023

Recent PaperCut server attacks linked to Cl0p, Lockbit ransomware


Recent PaperCut server attacks linked to Cl0p, Lockbit ransomware

Microsoft has linked recent PaperCut server attacks to Clop and Lockbit ransomware gangs.

Last week, PaperCut warned that threat actors are exploiting two recently fixed vulnerabilities (CVE-2023–27350 and CVE-2023–27351) in print management software PaperCut in attacks targeting unpatched servers.

The first flaw is an improper access issue within the SetupCompleted class that allows to bypass authentication process and execute arbitrary code with SYSTEM privileges. The second bug resides in the SecurityRequestFilter class and can be used by a remote hacker to bypass authentication process and gain unauthorized access to the application.

Both vulnerabilities were addressed in PaperCut MF and PaperCut NG versions 20.1.7, 21.2.11 and 22.0.9 and later.

According to Microsoft, CVE-2023-27350 and CVE-2023-27351 have been used by a threat actor it tracks as Lace Tempest (overlaps with FIN11 and TA505) in attacks delivering Clop ransomware.

“Lace Tempest (DEV-0950) is a Clop ransomware affiliate that has been observed using GoAnywhere exploits and Raspberry Robin infection hand-offs in past ransomware campaigns. The threat actor incorporated the PaperCut exploits into their attacks as early as April 13,” the company said in a series of tweets.

Once gaining initial access the threat actor deployed a TrueBot payload and a Cobalt Strike Beacon implant, conducted reconnaissance on connected systems, and exfiltrated files of interest using the file-sharing app MegaSync.

Microsoft says it has also detected intrusions leading to the Lockbit deployment. The company recommends organizations to update their systems as soon as possible to reduce the risk of attacks.

Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024