Ransomware

New ShadowSyndicate ransomware attacks involve aiohttp flaw exploitation

CEO: MOVEit customers ‘happy’ with company’s response to hack

BleepingComputer reports that intrusions targeting servers impacted by the high-severity direct traversal aiohttp Python library vulnerability, tracked as CVE-2024-23334, have been increasingly deployed by suspected ransomware-as-as-service affiliate ShadowSyndicate since the end of February, or a month after fixes for the security issue was addressed.

Attempted scanning of aiohttp instances impacted by the flaw, namely versions 3.9.1 and earlier, has been conducted from five IP addresses, one of which was previously linked to ShadowSyndicate, which had been associated with the ALPHV/BlackCat, Cl0p, Royal, Play, Cactus, Nokoyawa, and Quantum ransomware operations, according to a Cyble report. While the number of vulnerable servers could not be determined, nearly 44,170 aiohttp instances were identified to be accessible via the internet, most of which are in the U.S., Germany, and Spain, researchers added. Numerous internet-exposed aiohttp servers were also discovered in the UK, Italy, France, Russia, and China. Despite the scans, the compromise of aiohttp servers remains uncertain.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds