{"id":16416,"date":"2020-10-23T17:49:17","date_gmt":"2020-10-23T15:49:17","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16416"},"modified":"2020-10-23T17:49:17","modified_gmt":"2020-10-23T15:49:17","slug":"franzsische-it-firma-sopra-steria-von-ryuk-ransomware-befallen-zerologon-ausgenutzt","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/10\/23\/franzsische-it-firma-sopra-steria-von-ryuk-ransomware-befallen-zerologon-ausgenutzt\/","title":{"rendered":"French IT company Sopra Steria attacked by Ryuk ransomware, Zerologon exploited?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/10\/23\/franzsische-it-firma-sopra-steria-von-ryuk-ransomware-befallen-zerologon-ausgenutzt\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]The French IT company Sopra Steria, to which, for example, large parts of the IT of the National Health System (NHS) in Great Britain have been transferred, has fallen victim to a Ryuk ransomware attack. If the information I have is correct, an Active Directory domain controller was taken over via the Zerologon vulnerability, allowing the ransomware to spread on the service provider's IT network. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/e23209d6a776456d990814d44adebe4e\" width=\"1\" height=\"1\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Sopra_Steria\" target=\"_blank\" rel=\"noopener noreferrer\">Sopra Steria<\/a> SA&nbsp; is a European management and technology consultancy headquartered in Annecy, France, which was formed in September 2014 from the merger of the two companies Sopra Group SA and Groupe Steria SCA. The German subsidiary is based in Hamburg. The Sopra Steria Group is represented in 25 countries and has a total of 46,245 employees (as of the end of 2019). So this is a bigger player. <\/p>\n<h2>Ryuk ransomware infection<\/h2>\n<p>As <a href=\"https:\/\/www.lemagit.fr\/actualites\/252490877\/Sopra-Steria-frappe-par-un-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> by the French medium LeMagIT on October 21, 2020, the attack (presumably by the Ryuk ransomware) must have taken place in the night from October 20 to 21, 2020. The Register picked it up in <a href=\"https:\/\/www.theregister.com\/2020\/10\/22\/sopra_steria_ryuk_ransomware_reports\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a> on October 22, 2020 and writes that the company refused to say what exactly happened. A <a href=\"https:\/\/www.soprasteria.com\/newsroom\/press-releases\/details\/information-on-a-cyberattack\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> only confirms the infestation.<\/p>\n<blockquote>\n<p>A cyberattack has been detected on Sopra Steria's (Paris:SOP) IT network on the evening of 20th October. Security measures have been implemented in order to contain risks. The Group's teams are working hard for a return to normal as quickly as possible and every effort has been made to ensure business continuity.<\/p>\n<\/blockquote>\n<blockquote>\n<p>Sopra Steria is in close contact with its customers and partners, as well as the competent authorities.<\/p>\n<\/blockquote>\n<p>Sopra Steria customers may be anything but enthusiastic about the incident, as it is likely that customer data was taken before encryption, and that data will eventually become public. <\/p>\n<h2>Active Directory infrastructure compromised <\/h2>\n<p>According to information from The Register, there are indications that Sopra Steria's Active Directory infrastructure has been compromised. It is believed that attackers have succeeded in infiltrating the Ryuk malware and encrypting files. This is also reported by Bleeping Computer in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/french-it-giant-sopra-steria-hit-by-ryuk-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a>. In a follow-up article in today's issue, the French medium LeMagIT <a href=\"https:\/\/www.lemagit.fr\/actualites\/252491007\/Ransomware-Ryuk-la-piste-dune-attaque-eclair-contre-Sopra-Steria\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the attackers used <a href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cobalt Strike<\/a> to find a vulnerability and distribute the ransomware.&nbsp; <\/p>\n<blockquote>\n<p><a href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cobalt Strike<\/a> is a software with flexible functions to simulate industrial espionage on your own network, to test defensive measures and to increase your own computer security. This includes attack reconnaissance, intrusion, establishing stable access with a solid operational base in the victim's network and subsequent data theft.  <\/p>\n<p>Cobalt Strike can detect security vulnerabilities by using a Red Team, an independent group of programmers, as an adversary with little or no information about the system and its structure. A collection of attack tools is available, post-processing tools include a report generator.<\/p>\n<\/blockquote>\n<p>According to the French article, the distribution of the ransomware including encryption must be lightning fast. The extent of the attack is currently unclear, since Sopra Steria's IT security team, with the help of external cyber security experts, has only just begun work on determining the course and scope of the attack.&nbsp; <\/p>\n<h2>Did an attack succeed via Zerologon vulnerability?<\/h2>\n<p>In the meantime, the numerous customers of the IT company have probably been informed about the attack. There is probably a reference to the Ryuk ransomware and there are hints how the attack went down. LeMagIT quotes from the letter that \"the first malicious attacks occurred a few days ago,\" probably before the attack on October 20, 2020. The techniques used for penetration are also described: <\/p>\n<blockquote>\n<p>Using PSexec for lateral movement in the network, using Cobalt Strike for lateral movement; using transfer bits to install the Ryuk ransomware (which only targets Windows hosts); using Windows Share (Share$) on domain controllers to store the list of IP addresses the ransomware targets.<\/p>\n<\/blockquote>\n<p>LeMagIT assumes that transfer bits refers to the Windows service BITS, the Background Intelligent Transfer Service. LeMagIT therefore questions whether the attackers used the Zerologon vulnerability to penetrate and place the malware.<\/p>\n<blockquote>\n<p>I've warned several times about the Zerologon vulnerability (see links at the end of this article). The Zerologon vulnerability (CVE-2020-1472) is a Privilege Escalation vulnerability due to the insecure use of AES-CFB8 encryption for Netlogon sessions. The vulnerability allows the takeover of Active Directory Domain Controllers (DC) \u2013 even remotely, if reachable via network\/Internet \u2013 by unauthorized attackers. <\/p>\n<\/blockquote>\n<p>LeMagIT writes that the information provided by the security team of Sopra Steria does not address this issue. But the magazine quotes Alain Bouill\u00e9, general delegate of the club Experts in Information and Digital Security (Cesin). In an email to members, Bouill\u00e9 wrote that the infection with the Ryuk ransomware was caused by an AD controller compromised by the CVE-2020-1472 (Zerologon) vulnerability. The members of the club were urged to close this vulnerability as soon as possible. <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/09\/16\/windows-server-zerologon-sicherheitslcke-cve-2020-1472-erlaubt-domain-bernahme\/\">Windows Server: Zerologon vulnerability (CVE-2020-1472) allows domain hijacking<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/21\/cisa-warnung-patcht-eure-windows-server-gegen-cve-2020-1472-zerologon\/\">CISA Warning: Patch your Windows Servers against CVE-2020-1472 (Zerologon)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/08\/17\/windows-domain-controller-erzeugen-pltzlich-eventid-5829-warnungen-11-8-2020\/\">Windows Domain Controller suddenly generate EventID 5829 warnings (August 11, 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/12\/windows-10-v1607-update-kb4571694-creates-id-5827-events-bricks-mmc\/\">Windows 10 V1607: Update KB4571694 creates ID 5827 events, bricks MMC<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/24\/zerologon-exploits-werden-ausgenutzt-patchen-windows-server-samba-ist-angesagt\/\">Zerologon Exploits are used in the wild, patching (Windows Server, Samba) recommended<\/a>  <\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/10\/11\/kreuzfahrtanbieter-carnival-besttigt-ransomware-angriff-mit-datenabfluss\/\">Cruise provider Carnival confirms ransomware attack with data exfiltration<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/28\/ransomware-legt-franzsische-reederei-cma-cgm-s-a-lahm\/\">Ransomware grounds French shipping company CMA CGM S.A.<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/10\/10\/software-ag-opfer-der-clop-ransomware-daten-wurden-verffentlicht\/\">German Software AG victim of Cl0p ransomware, data leaked<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/28\/cyber-angriff-mit-ransomware-auf-us-klinikbetreiber-uhs\/\">Cyber attack with ransomware on US hospital operator UHS<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/uniklinikum-dsseldort-es-war-ransomware-staatsanwaltschaft-ermittelt-wegen-todesfolge\/\">Ransomware attack in German hospital ends deadly for a women \u2013 blame Shitrix vulnerability<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/31\/ransomware-befall-bei-deutscher-dussmann-gruppe\/\">Ransomware infection at German Dussmann Group<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/25\/garmin-shutdown-durch-wastedlocker-ransomware-angriff\/\">Garmin shutdown by WastedLocker ransomware attack<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/29\/agelocker-ransomware-zielt-auf-qnap-nas-laufwerke\/\">AgeLocker Ransomware attacks QNAP NAS drives<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The French IT company Sopra Steria, to which, for example, large parts of the IT of the National Health System (NHS) in Great Britain have been transferred, has fallen victim to a Ryuk ransomware attack. If the information I have &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/10\/23\/franzsische-it-firma-sopra-steria-von-ryuk-ransomware-befallen-zerologon-ausgenutzt\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[243,69],"class_list":["post-16416","post","type-post","status-publish","format-standard","hentry","category-security","tag-ransomware","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16416"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16416\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}