Malware, Ransomware

Cring ransomware spread through hole in FortiGate VPN

Share
Shishkova, an analst with Kaspersky, believes there is a pervasive “stereotype that programming and tech are for men.” To debunk such myths, Kaspersky and other Russian IT companies take part in an initiative called Data Lesson to teach children the basics of online security and provide information about opportunities of working in IT.   (Alexxsun/...

In the early months of 2021, cybercriminals believed to be manually delivering Cring ransomware, struck a series of European industrial networks. Kaspersky is the first to report how those attacks were accomplished: a vulnerability in Fortinet's FortiGate VPN.

According to Kaspersky, one client's infection was severe enough to cause a "temporary shutdown of the industrial process due to servers used to control the industrial process becoming encrypted."

The ransomware operators used a FortiOS vulnerability originally patched in 2019, CVE-2018-13379, which allows an attacker to access the username and password in cleartext. The operators scanned systems for vulnerable installations a few days prior to breaching the system, though it is unclear if that was how they initially discovered targets. Kaspersky notes a hacker forum post in 2020 offering to purchase a database of vulnerable Fortinet VPN clients.

From there, the Cring attackers launched Power Shell under the name "kaspersky" and loaded Cobalt Strike.

The Cring campaign was geofenced; a command and control server involved in the attacks only responded to requests from European systems. The attackers appear to have hand-selected which servers to encrypt to cause the most damage.

In a statement released to reporters, Fortinet urged its users to "immediately" mitigate or patch vulnerable installations, noting that the company had patched and repeatedly warned consumers about the vulnerability used in this case.

“The security of our customers is our first priority. For example, CVE-2018-13379 is an old vulnerability resolved in May 2019. Fortinet immediately issued a PSIRT advisory and communicated directly with customers and via corporate blog posts on multiple occasions in August 2019, July 2020, and again in April 2021 strongly recommending an upgrade. Upon resolution we have consistently communicated with customers as recently as April 2021," read the statement.

Kaspersky lists indicators of compromise in their post.

Last week, the FBI and DHS alerted businesses that advanced persistent threat groups were targeting CVE-2018-13379 and two other FortiOS vulnerabilities in active attacks. There is no current data connecting the Cring installations to an APT group.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Joe Uchill

Joe is a senior reporter at SC Weekly, focused on policy issues. He previously covered cybersecurity for Axios, The Hill and the Christian Science Monitor’s short-lived Passcode website.

Related Terms

Adware

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.