{"id":78567,"date":"2024-02-26T16:06:15","date_gmt":"2024-02-26T16:06:15","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/26\/researchers-say-easy-to-exploit-security-bugs-in-connectwise-remote-access-software-now-under-mass-attack-techcrunch\/"},"modified":"2024-02-26T16:06:15","modified_gmt":"2024-02-26T16:06:15","slug":"researchers-say-easy-to-exploit-security-bugs-in-connectwise-remote-access-software-now-under-mass-attack-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/26\/researchers-say-easy-to-exploit-security-bugs-in-connectwise-remote-access-software-now-under-mass-attack-techcrunch\/","title":{"rendered":"Researchers say easy-to-exploit security bugs in ConnectWise remote access software now under mass-attack | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"\">\n<div class=\"article__featured-image-wrapper breakout\">\n\t\t\t\n\t\t<\/div>\n<\/p><\/div>\n<div>\n<p id=\"speakable-summary\">Security researchers say a pair of easy-to-exploit flaws in a popular remote access tool used by more than a million companies around the world are now being mass-exploited, with hackers abusing the vulnerabilities to deploy ransomware and steal sensitive data.<\/p>\n<p>Cybersecurity giant Mandiant <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/connectwise-screenconnect-hardening-remediation\" target=\"_blank\" rel=\"noopener\">said in a post on Friday<\/a> that it has \u201cidentified mass exploitation\u201d of the two flaws in ConnectWise ScreenConnect, a popular remote access tool that allows IT and technicians to remotely provide technical support directly on customer systems over the internet.<\/p>\n<p>The two vulnerabilities comprise CVE-2024-1709, an authentication bypass vulnerability that <a href=\"https:\/\/techcrunch.com\/2024\/02\/21\/researchers-warn-high-risk-connectwise-flaw-under-attack-is-embarrassingly-easy-to-exploit\/\" target=\"_blank\" rel=\"noopener\">researchers deemed \u201cembarrassingly easy\u201d for attackers to exploit<\/a>, and CVE-2024-1708, a path traversal vulnerability that allows hackers to remotely plant malicious code, such as malware, on vulnerable ConnectWise customer instances.<\/p>\n<p>ConnectWise first disclosed the flaws on February 19 and urged on-premise customers to install security patches immediately. However, thousands of servers remain vulnerable, <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1760740607268638809\" target=\"_blank\" rel=\"noopener\">according to data from the Shadowserver Foundation<\/a>, and each of these servers can manage up to 150,000 customer devices.<\/p>\n<p>Mandiant said it had identified \u201cvarious threat actors\u201d exploiting the two flaws and warned that \u201cmany of them will deploy ransomware and conduct multifaceted extortion,\u201d but did not attribute the attacks to specific threat groups.<\/p>\n<p>Finnish cybersecurity firm WithSecure said in <a href=\"https:\/\/labs.withsecure.com\/publications\/new-krustyloader-variant-dropped-via-screenconnect-exploit\" target=\"_blank\" rel=\"noopener\">a blog post<\/a> Monday that its researchers have also observed \u201cen-mass exploitation\u201d of the ScreenConnect flaws from multiple threat actors. WithSecure said these hackers are exploiting the vulnerabilities to deploy password stealers, backdoors, and in some cases ransomware.<\/p>\n<p>WithSecure said it also observed hackers exploiting the flaws to deploy a Windows variant of the KrustyLoader backdoor on unpatched ScreenConnect systems, the same kind of backdoor planted by hackers <a href=\"https:\/\/techcrunch.com\/2024\/01\/11\/ivanti-connect-vpn-zero-days-china-backed-hackers\/\" target=\"_blank\" rel=\"noopener\">recently exploiting vulnerabilities in Ivanti\u2019s corporate VPN software<\/a>. WithSecure said it could not yet attribute the activity to a particular threat group, though others have linked the past activity to a China-backed hacking group focused on espionage.<\/p>\n<p>Security researchers at Sophos and Huntress both said last week that they had <a href=\"https:\/\/techcrunch.com\/2024\/02\/23\/hackers-are-exploiting-connectwise-flaws-to-deploy-lockbit-ransomware-security-experts-warn\/\" target=\"_blank\" rel=\"noopener\">observed the LockBit ransomware gang launching attacks<\/a> that exploit the ConnectWise vulnerabilities \u2014 just days after an international law enforcement operation claimed to <a href=\"https:\/\/techcrunch.com\/2024\/02\/20\/us-uk-authorities-claim-seizure-of-lockbit-ransomware-gangs-dark-web-leak-site\/\" target=\"_blank\" rel=\"noopener\">disrupt the notorious Russia-linked cybercrime gang\u2019s operations<\/a>.<\/p>\n<p>Huntress <a href=\"https:\/\/www.huntress.com\/blog\/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708\" target=\"_blank\" rel=\"noopener\">said in its analysis<\/a> that it has since observed a \u201cnumber of adversaries\u201d leverage exploits to deploy ransomware, and a \u201csignificant number\u201d of adversaries using exploits deploy <a href=\"https:\/\/techcrunch.com\/tag\/crypto-mining\/\" target=\"_blank\" rel=\"noopener\">cryptocurrency mining<\/a> software, install additional \u201clegitimate\u201d remote access tools to maintain persistent access to a victim\u2019s network, and create new users on compromised machines.<\/p>\n<p>It\u2019s not yet known how many ConnectWise ScreenConnect customers or end users are affected by these vulnerabilities, and ConnectWise spokespeople did not respond to TechCrunch\u2019s questions. The company\u2019s website claims that the organization provides its remote access technology to more than a million small to medium-sized businesses that manage over 13 million devices.<\/p>\n<p>On Sunday, ConnectWise called off a prearranged interview between TechCrunch and its CISO Patrick Beggs, scheduled for Monday. ConnectWise did not give a reason for the last-minute cancellation.<\/p>\n<p><em>Are you affected by the ConnectWise vulnerability? You can contact Carly Page securely on Signal at +441536 853968 or by email at carly.page@techcrunch.com. You can also contact TechCrunch via <a href=\"https:\/\/techcrunch.com\/tips\" target=\"_blank\" rel=\"noopener\">SecureDrop<\/a>.<\/em><\/p>\n<hr\/><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2024\/02\/26\/researchers-say-easy-to-exploit-security-bugs-in-connectwise-remote-access-software-now-under-mass-attack\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers say a pair of easy-to-exploit flaws in a popular remote access tool used by more than a million companies around the world are now being mass-exploited, with hackers abusing the vulnerabilities to deploy ransomware and steal sensitive data. Cybersecurity giant Mandiant said in a post on Friday that it has \u201cidentified mass exploitation\u201d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":78568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-78567","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/78567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=78567"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/78567\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/78568"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=78567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=78567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=78567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}