Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

PetitPotam Vulnerability Exploited in Ransomware Attacks

The recently disclosed Windows Server vulnerability dubbed “PetitPotam” is being actively exploited in malicious attacks, including some aimed at deploying a piece of ransomware named LockFile.

The recently disclosed Windows Server vulnerability dubbed “PetitPotam” is being actively exploited in malicious attacks, including some aimed at deploying a piece of ransomware named LockFile.

Tracked as CVE-2021-36942, PetitPotam is a vulnerability that can help an attacker take complete control of Windows domains.

Microsoft released patches for the vulnerability as part of its August 2021 set of security updates, but Slovenia-based ACROS Security says that the fixes are incomplete.

In a blog post last week, security researchers with Symantec, which is now part of Broadcom Software, revealed that PetitPotam is being exploited in attacks featuring the LockFile ransomware, but only post-exploitation, to take over domain controllers.

“Indications are that the attackers gain access to victims’ networks via Microsoft Exchange Servers, and then use the incompletely patched PetitPotam vulnerability to gain access to the domain controller, and then spread across the network. It is not clear how the attackers gain initial access to the Microsoft Exchange Servers,” Symantec’s researchers say.

Targeted organizations span across multiple sectors, including business services, financial services, engineering, legal, manufacturing, and travel and tourism.

Advertisement. Scroll to continue reading.

LockFile is a rather novel ransomware family that was initially discovered within a compromised environment about a month ago. Since then, more than 10 organizations have been infected, Symantec says.

After compromising Exchange servers, likely by exploiting the ProxyShell vulnerabilities, the attackers execute PowerShell commands to download attack tools and maintain access to the victim environment. Days later, the attackers start deploying ransomware.

Shortly after the ransomware is executed, the attackers deploy on the compromised Exchange server an exploit for PetitPotam, along with files to facilitate the exploitation, Symantec says.

After successfully taking over the domain controller, the attackers copy the LockFile ransomware and additional files to a directory used to deploy scripts to network clients. Thus, the ransomware is executed on all clients that authenticate to the controller.

“LockFile appears to be a new threat on the already crowded ransomware landscape. The investigation into this threat, and whether it may have links to any previously seen or retired ransomware threats continues,” Symantec notes.

Related: CISA Issues Guidance on Protecting Data From Ransomware

Related: CISA Warns of Threat Posed by Ransomware to Industrial Systems

Related: SonicWall Zero-Day Exploited by Ransomware Group Before It Was Patched

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.