An affiliate of the BlackCat ransomware, dubbed UNC4466, is exploiting vulnerabilities in the Veritas Backup Exec software to gain initial access to the targeted network.
Researchers observed that the UNC4466 group has been exploiting the Veritas vulnerabilities in the wild since October 2022 based on the release of the Metasploit module that exploits the vulnerabilities
More than 8,500 IP addresses are still running Symantec/Veritas Backup Exec ndmp service on ports 9000, 10001, and the default port 10000, many of which could be exposed to the attack.
Modus of operandi
UNC4466 targets exposed Windows servers running an unpatched version of Veritas Backup Exec using the publicly available Metasploit module for gaining the initial access
After obtaining access to the target network, the attackers use Advanced IP Scanner and ADRecon to collect further details on the environment and uses additional tools such as Mimikatz, RCLONE, LAZAGNE, WINSW, Nanodump, and LIGOLO are downloaded on the compromised system.
New scheduled tasks are added to the default domain policy, security software is turned off, and then the ALPHV ransomware crypter is loaded through the Background Intelligent Transfer Service (BITS).
To evade detection, the event logs are cleared, and Microsoft Defender’s real-time monitoring is disabled.
- CVE-2021-27876: arbitrary file access flaw
- CVE-2021-27877: remote unauthorized access
- CVE-2021-27878: arbitrary command execution flaw
These above vulnerabilities were abused by the attackers and were disclosed by Veritas in March 2021, and a fix was released with version 21.2.
To stay protected, organizations are suggested to establish a stronger security framework with multi-layered defense architecture and a robust patch management system.
This research was documented by researchers from Mandiant
Indicators of Compromise