Attacks exploiting a critical improper access vulnerability in PaperCut servers, tracked as CVE-2023-27350, have been underway over the past two weeks, with Russian hackers suspected to be behind the intrusions, reports The Hacker News.
Nearly 1,800 internet-exposed servers have already been compromised to facilitate the installation of Atera and Syncro remote management and maintenance software that has been hosted in a domain that was previously used to host the TrueBot malware, which has been tied to Russian threat operation Silence, which is linked to Evil Corp and the TA505 threat cluster, a report from Huntress revealed.
"While the ultimate goal of the current activity leveraging PaperCut's software is unknown, these links (albeit somewhat circumstantial) to a known ransomware entity are concerning. Potentially, the access gained through PaperCut exploitation could be used as a foothold leading to follow-on movement within the victim network, and ultimately ransomware deployment," said Huntress.
Meanwhile, proof-of-concept code for the vulnerability that could be exploited for remote code execution has also been published by Horizon3.ai.
Related Events
Related Terms
BotnetCorruptionDarknetDeauthentication AttackDefacementDenial of ServiceDictionary AttackDisruptionDistributed ScansDomain HijackingGet daily email updates
SC Media's daily must-read of the most current and pressing daily news