ALPHV ransomware targets old Veritas backup vulnerabilities

ALPHV ransomware targets old Veritas backup vulnerabilities

Share post

According to Mandiant, a ransomware partner of ALPHV is increasingly looking for old vulnerabilities in Veritas backup installations. The gaps have actually been known since 2021 – but many of them have not been patched. It should currently be possible to find over 8.500 backup instances on the web. 

Mandiant has observed a new ALPHV ransomware partner (a.k.a. BlackCat ransomware) tracked as UNC4466 targeting public facing Veritas Backup Exec installations for vulnerabilities CVE-2021-27876, CVE-2021-27877 and CVE -2021-27878 are vulnerable. These CVEs have been known since March 2021 and patches are also available. However, some administrators have not yet implemented the patches.

8.500 Veritas Backup Exec instances in the network

A commercial Internet scanning service has identified over 8.500 installations of Veritas Backup Exec instances currently accessible via the Internet. It is possible that many of these systems are unpatched and therefore vulnerable. Previous ALPHV attacks investigated by Mandiant mainly relied on stolen credentials. This attack could be a shift in target by exploiting known vulnerabilities.

ALPHV emerged in November 2021 as ransomware-as-a-service, which some researchers claimed is the successor to BLACKMATTER and DARKSIDE ransomware. While some ransomware operators have issued rules to avoid impacting critical infrastructure and healthcare facilities, ALPHV has continued to target these sensitive industries.

Veritas vulnerability timeline

  • In March 2021, Veritas released an advisory reporting three critical vulnerabilities in Veritas Backup Exec 16.x, 20.x, and 21.x.
  • On September 23, 2022, a METASPLOIT module was released that exploits these vulnerabilities and creates a session through which the attacker can interact with the victim system.
  • On October 22, 2022, Mandiant first observed exploitation of the Veritas vulnerabilities in the wild.

Administrators should definitely check their Veritas Backup Exec instances and close the gaps. Because it is becoming increasingly common for old, unpatched vulnerabilities to serve as a gateway for ransomware and the like. The last major attack on VMware ESXi servers was also exploited through an old vulnerability in non-modernized or patched versions.

In its blog, Mandiant shows how technically accurate the attack on the vulnerabilities in the Veritas Backup Exec installations is.

More at Mandiant.com

 


About Mandiant

Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response. With decades of experience on the cyber frontline, Mandiant helps organizations confidently and proactively defend against cyber threats and respond to attacks. Mandiant is now part of Google Cloud.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more