The newly observed “LockFile” ransomware has skilfully infiltrated multiple sectors by exploiting the “PetitPotam” vulnerability in Microsoft Windows systems. In complex and technically sophisticated supply-chain attacks, cyber-threat actors gained access to targets’ Microsoft Exchange Servers, making use of a publicly available PetitPotam proof of concept (PoC) to access domain controllers and deploy LockFile. The multiple, domino-like layers of the attacks signify the increasingly advanced capabilities of ransomware and ransomware operators alike. They have raised a red flag for defenders, who should strive to be as agile and resourceful as attackers―as well as one step ahead, when it comes to preventing vulnerability exploitation.
Want To Try Our Digital Risk Protection Tool?
Get Started FreeOther content in this Stream
Weekly Intelligence Summary 17 June 2022
Main story: Attackers seize Microsoft zero-day for malware dissemination, espionage
Weekly Intelligence Summary 29th Apr
Main story: Russian cyber attacks on Ukraine: Where’s the boom?
Weekly Intelligence Summary 22nd Apr
Main story: Karakurt Hacking Team moonlights as Conti side business
Weekly Intelligence Summary 14th Apr
RaidForums takedown sends cybercriminals scrambling
Weekly Intelligence Summary 25th Mar
Maverick extortionist group Lapsus$ goes after big tech
Weekly Intelligence Summary 18th Mar
US executive order pushes for responsible cryptocurrency use
Weekly Intelligence Summary 11th Mar
The Russia-Ukraine war has triggered a resurgence of hacktivism around the world
Weekly Intelligence Summary 4th Mar
The US government has issued an alert about the Iran-linked "MuddyWater" advanced persistent threat group
Weekly Intelligence Summary 25th Feb
Conti ransomware group aims to ascend with new tools, structure
Weekly Intelligence Summary 18th Feb
US DoJ arrests shine light on ease and impact of cryptocurrency laundering