TRENDING

Cyble-Blogs-MOVEit-Transfer

MOVEit Transfer Vulnerability Actively Exploited

Cyble analyzes MOVEit Transfer vulnerability and observes active exploitation in the Cyble Global Intelligence Sensors (CGSI).

Cyble Global Sensor Intelligence (CGSI) observes Exploitation Attempts

On May 31st, 2023, the official vendor Progress Software released a security advisory regarding SQL injection vulnerability in MOVEit Transfer.

MOVEit Transfer is a secure Managed File Transfer (MFT) used by multiple organizations dealing with sensitive data. Lately, it was observed that the Clop Ransomware group exploited the file transfer service GoAnywhere to extort data from multiple organizations, which indicates that Threat Actors(TAs) have a keen interest in the vulnerable internet-exposed assets that might be utilized for espionage, data theft, and ransomware purposes.

Shodan indicates that there are more than 2500 publicly accessible instances of MOVEit exposed on the internet, as shown in Figure 1. Most exposures are from the United States, United Kingdom, and Germany region.

Figure 1 Geographical representation of Exposed MOVEit over the Internet
Figure 1 – Geographical representation of Exposed MOVEit over the Internet

Technical Details

The official advisory states the following:

The vulnerability could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements.

As all MOVEit Transfer versions are affected by the vulnerability, the vendor emphasizes urgent patching and following the mitigation procedures.

Affected ProductFixed Version
MOVEit Transfer 2023.0.0MOVEit Transfer 2023.0.1
MOVEit Transfer 2022.1.xMOVEit Transfer 2022.1.5
MOVEit Transfer 2022.0.xMOVEit Transfer 2022.0.4
MOVEit Transfer 2021.1.xMOVEit Transfer 2021.1.4
MOVEit Transfer 2021.0.xMOVEit Transfer 2021.0.6

Cyble Global Sensor Intelligence (CGSI) Insights

On June 1st, 2023, the CGSI network observed human2.aspx file (Figure -2), which is one of the indicators as per vendor. The backdoor known as “human2.aspx” is reportedly uploaded during the attack.

Figure 2 CGSI network indicating exploitation attempts
Figure 2- CGSI network indicating exploitation attempts

Analysis of human2.aspx

First, the backdoor malicious script connects to the MOVEit database using ConnectDB() function, as shown below.

Figure 3 ConnectDB function
Figure 3- ConnectDB() function

After connecting the MOVEit database, the script calls page_load() function, which checks the value of the “X-siLock-Comment” header. If the value does not match a specific string (REDACTEDREDACTEDREDACTEDREDACTED), it sets the response status code to 404 and returns. The below figure shows the code snippet of page_load() function.

Figure 4 Page load function
Figure 4- Page_load() function

The script then proceeds to handle different scenarios based on the value of the “X-siLock-Step1” header. If the value is “-1”, it executes three SQL queries and retrieves data from MOVEit database, saves it as a CSV formatted string, and compresses it using GZip.                                                                           

The SQL queries retrieve the specific data from the MOVEit database.

Query 1: Fetches file-related information from the tables `files`, `folders`, and `users`. It retrieves the file ID, institution ID, folder ID, file size, file name, uploader’s login name, folder path, and folder name.

 Query 2: Retrieves folder-related details from the `folders` and `users` tables. It retrieves the folder ID, institution ID, folder name, folder owner’s login name, and folder path.

Query3: Retrieves institution-related information from the `institutions` table. It retrieves the institution ID, institution name, and institution’s short name.

The below figure shows the code snippet of the function, which executes three SQL queries that fetch data from multiple tables.

Figure 5 Backdoor Fetching data from Multiple Tables
Figure 5- Backdoor Fetching Data from Multiple Tables

If the value of “X-siLock-Step1” is “-2”, it executes a query to delete a specific user with the name ‘Health Check Service’ as shown below.

Figure 6 – Delete User from Database
Figure 6 – Delete User from Database

For any other value of “X-siLock-Step1”, the script assumes that file and folder IDs are provided in the headers (“X-siLock-Step2” and “X-siLock-Step3” respectively). The script then adds an administrative user named “Health Check Service” into the table and inserts an active session for the newly created user, as shown below.

Figure 7 inserting active session
Figure 7 – inserting active session

Conclusion

Managed File Transfer (MFT) services have become a favored target for ransomware groups due to their crucial role in securely transferring sensitive data within organizations. Ransomware attacks aim to exploit vulnerabilities in MFT systems to gain unauthorized access to valuable files and then encrypt them, effectively holding the data hostage until a ransom is paid.

MFT solutions are particularly attractive to these cybercriminals because they often handle large volumes of critical information, such as financial records, customer data, and intellectual property. The potential impact of such an attack is significant, as it can disrupt business operations, compromise confidential information, and lead to substantial financial and reputational damage.

As per our analysis, multiple state and private agencies have their MOVEit Transfer exposed over the internet. In the near future, ransomware groups might utilize the vulnerability to target their victims, as we observe active exploitation of the vulnerability.

Recommendation

  • Disabling all HTTP and HTTPs traffic to your MOVEit Transfer environment.
  • Modifying firewall rules to deny HTTP and HTTPS traffic towards affetcted product on port 80 and 443.
  • Delete Unauthorized Files and User Accounts
  • Delete any instances of the human2.aspx and .cmdline script files.
  • On the MOVEit Transfer server, look for any new files created in the C:\MOVEitTransfer\wwwroot\ directory.
  • On the MOVEit Transfer server, look for new files created in the C:\Windows\TEMP\[random]\ directory with a file extension of [.]cmdline
  • Remove any unauthorized user accounts.
  • Review logs for unexpected downloads of files from unknown IPs or large numbers of files downloaded.
  • Reset service account credentials for affected systems and MOVEit Service Account.
  • Implement proper network segmentation to prevent attackers to perform lateral movement and to minimize exposure of critical assets over the internet.
  • Keep critical assets behind properly configured and updated firewall.
  • Keeping software’s, firmware, applications updated with the recent patches and mitigations released by official vendor is necessary to prevent attackers in exploiting vulnerabilities.
  • Continuous monitoring and logging can help in detecting network anomalies early.
  • Implement Multi Factor Authentication wherever possible.
  • Keep a track of advisories and alerts issued by vendors and state authorities.
  • Cyber security awareness training programs for employees within organization.

Indicators of Compromise

IndicatorsIndicator’s typeDescription
0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9SHA256 HashHuman2.aspx Webshell used during exploitation.
110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286SHA256 HashHuman2.aspx Webshell used during exploitation.
1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2SHA256 HashHuman2.aspx Webshell used during exploitation.
2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59SHA256 HashHuman2.aspx Webshell used during exploitation.
58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166SHA256 HashHuman2.aspx Webshell used during exploitation.
98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8SHA256 HashHuman2.aspx Webshell used during exploitation.
a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986SHA256 HashHuman2.aspx Webshell used during exploitation.
b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03SHA256 HashHuman2.aspx Webshell used during exploitation.
cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621SHA256 HashHuman2.aspx Webshell used during exploitation.
ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90cSHA256 HashHuman2.aspx Webshell used during exploitation.
0b3220b11698b1436d1d866ac07cc90018e59884e91a8cb71ef8924309f1e0e9SHA256 HashHuman2.aspx Webshell used during exploitation.
110e301d3b5019177728010202c8096824829c0b11bb0dc0bff55547ead18286SHA256 HashHuman2.aspx Webshell used during exploitation.
1826268249e1ea58275328102a5a8d158d36b4fd312009e4a2526f0bfbc30de2SHA256 HashHuman2.aspx Webshell used during exploitation.
2ccf7e42afd3f6bf845865c74b2e01e2046e541bb633d037b05bd1cdb296fa59SHA256 HashHuman2.aspx Webshell used during exploitation.
58ccfb603cdc4d305fddd52b84ad3f58ff554f1af4d7ef164007cb8438976166SHA256 HashHuman2.aspx Webshell used during exploitation.
98a30c7251cf622bd4abce92ab527c3f233b817a57519c2dd2bf8e3d3ccb7db8SHA256 HashHuman2.aspx Webshell used during exploitation.
a8f6c1ccba662a908ef7b0cb3cc59c2d1c9e2cbbe1866937da81c4c616e68986SHA256 HashHuman2.aspx Webshell used during exploitation.
b5ef11d04604c9145e4fe1bedaeb52f2c2345703d52115a5bf11ea56d7fb6b03SHA256 HashHuman2.aspx Webshell used during exploitation.
cec425b3383890b63f5022054c396f6d510fae436041add935cd6ce42033f621SHA256 HashHuman2.aspx Webshell used during exploitation.
ed0c3e75b7ac2587a5892ca951707b4e0dd9c8b18aaf8590c24720d73aa6b90cSHA256 HashHuman2.aspx Webshell used during exploitation.
5[.]252[.]189[.]0/24CIDRAttacker command and control
5[.]252[.]190[.]0/24CIDRAttacker command and control
5[.]252[.]191[.]0/24CIDRAttacker command and control
198[.]27[.]75[.]110IP AddressAttacker command and control
209[.]222[.]103[.]170IP AddressAttacker command and control
84[.]234[.]96[.]104IP AddressAttacker command and control
167[.]71[.]229[.]198IP AddressScanning attempt observed
138[.]197[.]24[.]249IP AddressScanning attempt observed
139[.]59[.]37[.]187IP AddressScanning attempt observed
167[.]172[.]89[.]248IP AddressScanning attempt observed
170[.]64[.]134[.]89IP AddressScanning attempt observed
human2[.]aspxFilenameWebshell used during exploitation
human2[.]aspx[.]lnkFilenameWebshell used during exploitation
POST /moveitisapi/moveitisapi[.]dllHTTP POST NA
POST /guestaccess[.]aspxHTTP POST NA
POST /api/v1/folders/[random]/filesHTTP POSTNA
human2[.]aspxFilenameWebshell used during exploitation

Reference

https://digital.nhs.uk/cyber-alerts/2023/cc-4326https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023?

utm_medium=email&utm_source=eloqua&elqTrackId=8fb5ca12495f444f8edd44fd2dccb5a8&elq=32a68db8e7f64ee4b43c39dd90b972e6&elqaid=31439&elqat=1&elqCampaignId=38129

Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations

Share the Post:

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading

Scroll to Top