Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

PetitPotam Vulnerability Exploited in Ransomware Attacks

The recently disclosed Windows Server vulnerability dubbed “PetitPotam” is being actively exploited in malicious attacks, including some aimed at deploying a piece of ransomware named LockFile.

The recently disclosed Windows Server vulnerability dubbed “PetitPotam” is being actively exploited in malicious attacks, including some aimed at deploying a piece of ransomware named LockFile.

Tracked as CVE-2021-36942, PetitPotam is a vulnerability that can help an attacker take complete control of Windows domains.

Microsoft released patches for the vulnerability as part of its August 2021 set of security updates, but Slovenia-based ACROS Security says that the fixes are incomplete.

In a blog post last week, security researchers with Symantec, which is now part of Broadcom Software, revealed that PetitPotam is being exploited in attacks featuring the LockFile ransomware, but only post-exploitation, to take over domain controllers.

“Indications are that the attackers gain access to victims’ networks via Microsoft Exchange Servers, and then use the incompletely patched PetitPotam vulnerability to gain access to the domain controller, and then spread across the network. It is not clear how the attackers gain initial access to the Microsoft Exchange Servers,” Symantec’s researchers say.

Targeted organizations span across multiple sectors, including business services, financial services, engineering, legal, manufacturing, and travel and tourism.

LockFile is a rather novel ransomware family that was initially discovered within a compromised environment about a month ago. Since then, more than 10 organizations have been infected, Symantec says.

After compromising Exchange servers, likely by exploiting the ProxyShell vulnerabilities, the attackers execute PowerShell commands to download attack tools and maintain access to the victim environment. Days later, the attackers start deploying ransomware.

Advertisement. Scroll to continue reading.

Shortly after the ransomware is executed, the attackers deploy on the compromised Exchange server an exploit for PetitPotam, along with files to facilitate the exploitation, Symantec says.

After successfully taking over the domain controller, the attackers copy the LockFile ransomware and additional files to a directory used to deploy scripts to network clients. Thus, the ransomware is executed on all clients that authenticate to the controller.

“LockFile appears to be a new threat on the already crowded ransomware landscape. The investigation into this threat, and whether it may have links to any previously seen or retired ransomware threats continues,” Symantec notes.

Related: CISA Issues Guidance on Protecting Data From Ransomware

Related: CISA Warns of Threat Posed by Ransomware to Industrial Systems

Related: SonicWall Zero-Day Exploited by Ransomware Group Before It Was Patched

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...