• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploit fortinet flaw, deploy screenconnect, metasploit in new campaign

Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign

You are here: Home / General Cyber Security News / Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
April 17, 2024

Cybersecurity scientists have learned a new marketing campaign that’s exploiting a not too long ago disclosed security flaw in Fortinet FortiClient EMS devices to produce ScreenConnect and Metasploit Powerfun payloads.

The exercise involves the exploitation of CVE-2023-48788 (CVSS score: 9.3), a critical SQL injection flaw that could permit an unauthenticated attacker to execute unauthorized code or instructions through specifically crafted requests.

Cybersecurity agency Forescout is monitoring the marketing campaign under the codename Link:entertaining owing to the use of ScreenConnect and Powerfun for write-up-exploitation.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The intrusion targeted an unnamed media company that experienced its susceptible FortiClient EMS system exposed to the internet soon soon after the launch of a evidence-of-strategy (PoC) exploit for the flaw on March 21, 2024.

About the next pair of times, the unfamiliar adversary was observed leveraging the flaw to unsuccessfully download ScreenConnect and then set up the distant desktop computer software working with the msiexec utility.

However, on March 25, the PoC exploit was used to start PowerShell code that downloaded Metasploit’s Powerfun script and initiated a reverse connection to one more IP tackle.

ScreenConnect, Metasploit

Also detected were being SQL statements developed to obtain ScreenConnect from a distant area (“ursketz[.]com”) applying certutil, which was then mounted by means of msiexec just before developing connections with a command-and-command (C2) server.

There is evidence to recommend that the risk actor at the rear of it has been active considering the fact that at least 2022, exclusively singling out Fortinet appliances and making use of Vietnamese and German languages in their infrastructure.

“The noticed action clearly has a guide ingredient evidenced by all the unsuccessful attempts to download and set up tools, as perfectly as the relatively prolonged time taken between attempts,” security researcher Sai Molige claimed.

Cybersecurity

“This is evidence that this exercise is component of a precise marketing campaign, fairly than an exploit included in automated cybercriminal botnets. From our observations, it seems that the actors powering this marketing campaign are not mass scanning but choosing target environments that have VPN appliances.”

Forescout stated the attack shares tactical and infrastructure overlaps with other incidents documented by Palo Alto Networks Device 42 and Blumira in March 2024 that include the abuse of CVE-2023-48788 to down load ScreenConnect and Atera.

Businesses are advisable to utilize patches delivered by Fortinet to address potential threats, monitor for suspicious targeted traffic, and use a web application firewall (WAF) to block probably destructive requests.

Located this posting intriguing? Comply with us on Twitter  and LinkedIn to go through extra unique written content we write-up.


Some parts of this report are sourced from:
thehackernews.com

Previous Post: «cisco warns of global surge in brute force attacks targeting vpn Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
Next Post: Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware critical atlassian flaw exploited to deploy linux variant of cerber»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.