Critical Veeam Vulnerability Exploited in Frag Ransomware Attacks

November 8, 2024

The Frag ransomware attacks recently exploited a critical security flaw in Veeam Backup & Replication (VBR) software, following its use in Akira and Fog ransomware attacks. The vulnerability, known as CVE-2024-40711, was discovered by Code White security researcher Florian Hauser. It allows unauthenticated threat actors to execute remote code on Veeam VBR servers. The proof-of-concept exploit was initially withheld to allow system administrators time to apply security updates issued by Veeam. Despite these precautions, the vulnerability was still exploited in ransomware attacks.

Sophos X-Ops incident responders found that the delay in releasing the exploit did little to prevent Akira and Fog ransomware attacks. The attackers exploited the RCE flaw along with stolen VPN gateway credentials to create rogue accounts on unpatched servers. The same threat activity cluster, known as 'STAC 5881', was later found to have used CVE-2024-40711 exploits in attacks that resulted in Frag ransomware being deployed on compromised networks.

Sean Gallagher, a principal threat researcher at Sophos X-Ops, observed that the tactics associated with STAC 5881 were used again, but this time, they led to the deployment of the previously-undocumented 'Frag' ransomware. The threat actor used a compromised VPN appliance for access, exploited the VEEAM vulnerability, and created a new account named 'point'. In this incident, a 'point2' account was also created.

According to a report by British cybersecurity company Agger Labs, the Frag ransomware gang extensively uses Living Off The Land binaries (LOLBins) in their attacks, which are legitimate software already available on compromised systems. This makes it difficult for defenders to detect their activity. The Frag gang's playbook is similar to that of Akira and Fog operators, as they often target unpatched vulnerabilities and misconfigurations in backup and storage solutions.

In March 2023, Veeam patched another high-severity VBR vulnerability, CVE-2023-27532, which can allow malicious actors to breach backup infrastructure. This exploit was later used in attacks linked to the financially motivated FIN7 threat group and was deployed in Cuba ransomware attacks targeting U.S. critical infrastructure organizations. Veeam reports that over 550,000 customers worldwide use its products, including approximately 74% of all companies in the Global 2,000 list.

Related News

Latest News

Like what you see?

Get a digest of headlines, vulnerabilities, risk context, and more delivered to your inbox.

Subscribe Below

By submitting this form, you’re giving us permission to email you. You may unsubscribe at any time.

Accelerate Security Teams

Continuously identify and prioritize the risks that are most critical in your environment, and validate that your remediation efforts are reducing risk. An always-on single source-of-truth of your assets, services, and vulnerabilities.