The newly observed “LockFile” ransomware has skilfully infiltrated multiple sectors by exploiting the “PetitPotam” vulnerability in Microsoft Windows systems. In complex and technically sophisticated supply-chain attacks, cyber-threat actors gained access to targets’ Microsoft Exchange Servers, making use of a publicly available PetitPotam proof of concept (PoC) to access domain controllers and deploy LockFile. The multiple, domino-like layers of the attacks signify the increasingly advanced capabilities of ransomware and ransomware operators alike. They have raised a red flag for defenders, who should strive to be as agile and resourceful as attackers―as well as one step ahead, when it comes to preventing vulnerability exploitation.
Want To Try Our Digital Risk Protection Tool?
Get Started FreeOther content in this Stream
Weekly Intelligence Summary 21 October
Main story: Ransom Cartel and REvil: Partners in cybercrime?
Weekly Intelligence Summary 14 Oct
Main story: Hacktivists fan flames of Iranian anti-regime protests
Weekly Intelligence Summary 07 Oct
Main story: ProxyNotShell spells déjà vu for MS Exchange Server defenders
Weekly Intelligence Summary 30 Sept
Main story: Rogue ex-developer leaks LockBit 3.0 builder