Press ESC to close

Hackers Exploiting Critical Fortinet EMS Vulnerability to Deploy Remote Access Tools

Category Details
Threat Actors – Unknown malicious actors targeting multiple organizations globally.
Campaign Overview – Exploitation of CVE-2023-48788 (SQL injection vulnerability) in Fortinet FortiClient EMS.
– Deployed remote desktop tools (e.g., AnyDesk, ScreenConnect) to achieve persistence and facilitate lateral movement.
Target Regions – Organizations across Brazil, Croatia, France, India, Indonesia, Mongolia, Namibia, Peru, Spain, Switzerland, Turkey, and the U.A.E.
Methodology – Used CVE-2023-48788 for initial access.
– Dropped ScreenConnect executables for remote access.
– Uploaded additional payloads for discovery, credential theft, defense evasion, and persistence via remote control tools.
Product Targeted – Fortinet FortiClient EMS (Enterprise Management Server)
Malware Reference – AnyDesk and ScreenConnect remote desktop tools
– Password recovery tools (webbrowserpassview.exe, netpass64.exe)
– Mimikatz for credential theft
Tools Used – ScreenConnect
– AnyDesk
– Mimikatz
webbrowserpassview.exe
netpass64.exe
netscan.exe
Vulnerabilities Exploited – CVE-2023-48788 (SQL injection with CVSS score: 9.3)
TTPs – Exploited SQL injection vulnerability for initial access.
– Used remote desktop software for persistence.
– Conducted network enumeration, credential theft, and defense evasion.
Attribution – No specific attribution; techniques are consistent with advanced threat actors updating methods for complexity and impact.
Recommendations – Patch FortiClient EMS immediately to mitigate CVE-2023-48788.
– Monitor and restrict access to ports associated with FortiClient EMS.
– Audit systems for unauthorized tools (e.g., AnyDesk, ScreenConnect).
– Employ EDR solutions.
Source The Hackers News

Read full article: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html

The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 20, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *