• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Blames Clop Affiliate for PaperCut Attacks

You are here: Home / General Cyber Security News / Microsoft Blames Clop Affiliate for PaperCut Attacks
April 27, 2023

Microsoft has claimed that modern attacks exploiting two vulnerabilities in the PaperCut print administration software program are very likely the consequence of a Clop ransomware affiliate.

The two bugs in issue are CVE-2023–27350 – a critical unauthenticated remote code execution flaw – and CVE-2023–27351 – a higher severity unauthenticated info disclosure flaw. The former has a CVSS rating of 9.8.

Following currently being notified by Pattern Micro, PaperCut alerted consumers final 7 days that the vulnerabilities were being remaining exploited in the wild and urged buyers to update their servers straight away.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Microsoft Danger Intelligence yesterday attributed the latest attacks exploiting the bugs to “Lace Tempest,” a risk actor it says overlaps with FIN11 and TA505. FIN11 is linked to the infamous Clop ransomware gang and the Accellion FTA extortion campaign, when TA505 is reportedly powering the Dridex banking Trojan and Locky ransomware.

Browse additional on Clop ransomware: Raspberry Robin Worm Actors Linked to Clop, LockBit Ransomware Teams.

Also known as DEV-0950, Lace Tempest is a Clop ransomware affiliate that has formerly been detected making use of GoAnywhere exploits and Raspberry Robin malware in ransomware campaigns. Microsoft mentioned the danger group exploited the PaperCut bugs in attacks as early as April 13.

“In noticed attacks, Lace Tempest ran various PowerShell instructions to produce a TrueBot DLL, which linked to a C2 server, attempted to steal LSASS qualifications, and injected the TrueBot payload into the conhost.exe company,” Microsoft extra in a tweet.

“Next, Lace Tempest delivered a Cobalt Strike Beacon implant, done reconnaissance on related devices, and moved laterally making use of WMI. The actor then recognized and exfiltrated data files of desire applying the file-sharing app MegaSync.”

Microsoft added that other teams may perhaps also be exploiting the two PaperCut vulnerabilities in the wild, noting that some intrusions had led to deployment of the prolific LockBit ransomware.


Some sections of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Man Arrested for Selling Data on 300 Million Victims to Russians
Next Post: RTM Locker’s First Linux Ransomware Strain Targeting NAS and ESXi Hosts rtm locker's first linux ransomware strain targeting nas and esxi»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.