Termite ransomware group operators (and maybe other groups) have a zero day exploit for Cleo LexiCom, VLTransfer, and Harmony. #ransomware #threatintel
Cleo Software Actively Being Exploited in the Wild | Huntress

Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, commonly used to manage file transfers. Read more about this emerging threat on the Huntress Blog.

i would fully pull the plug on impacted Cleo products until there's vendor clarity btw

Shodan dork (not exhaustive) - the Windows ones are a particular problem in terms of ransomware.

https://beta.shodan.io/search?query=http.html_hash%3A1534766930

#cleo #threatintel

Cleo have issued a (paywalled) advisory about the zero day, saying a new CVE number is being allocated.

https://support.cleo.com/hc/en-us/articles/28389495587095-Unauthenticated-Malicious-Hosts-Vulnerability

#cleo #threatintel

Rapid7 say "As of December 10, Rapid7 MDR has confirmed successful exploitation of this issue in customer environments; similar to Huntress, our team has observed enumeration and post-exploitation activity and is investigating multiple incidents." https://www.rapid7.com/blog/post/2024/12/10/etr-widespread-exploitation-of-cleo-file-transfer-software-cve-2024-50623/

#cleo #threatintel

Widespread exploitation of Cleo file transfer software (CVE-2024-50623) | Rapid7 Blog

Rapid7

After my toot Cleo have issued a public advisory, they're saying versions up to 5.8.0.23 (not out yet) are impacted.

In terms of threat intel, the ransomware operators I know of only have an exploit for the Windows versions, not Linux.

https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Peding

#threatintel #ransomware #cleo

"In an emailed statement given to TechCrunch, Jorge Rodriguez, SVP of product Development at Cleo, said that a patch for the critical vulnerability is “under development.”

https://techcrunch.com/2024/12/10/hackers-are-exploiting-a-flaw-in-popular-file-transfer-tools-to-launch-mass-hacks-again/

#cleo #threatintel

Hackers are exploiting a flaw in popular file-transfer tools to launch mass hacks, again | TechCrunch

Threat actors are exploiting a high-risk bug in Cleo software - and Huntress warns that fully-patched systems are vulnerable

TechCrunch

Sophos says they have seen 50+ systems with Cleo enterprise file transfer product zero day exploitation. Huntress say 28+ customers so far. Rapid7 haven’t given numbers.

https://infosec.exchange/@SophosXOps/113631363563332166

#cleo #threatintel

Sophos X-Ops (@[email protected])

Sophos X-Ops teams are monitoring and responding to attacks against Cleo products VLTrader, Harmony, and LexiCom prior to version 5.8.0.23 in each as outlined in this advisory: https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending. Sophos MDR and Labs teams can confirm seeing 50+ unique hosts targeted by these attacks at this time. All observed impacted customers have a branch or operate within the North Americas, primarily the US. We note the majority of observed affected customers are retail organizations. Sophos MDR threat hunting currently shows the first attack on 2024-12-06 at 17:47 UTC. We will continue to monitor and provide updates as we have more information. #Sophosxops #threatintel

Infosec Exchange

A writeup on the Cleo vulnerabilities, which are under mass exploitation now. Write any file into any folder by using path=..\..\..\ - since it's a webapp, just drop a webshell.

https://labs.watchtowr.com/cleo-cve-2024-50623/

#cleo #threatintel

Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)

We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely. Cleo have a (paywalled) advisory, linked to

watchTowr Labs - Blog
@GossiTheDog Cleo Harmony provides "reliable and scalable data communications with the control, governance, and security you need" and a relative path traversal that allows arbitrary read and write. That's not the governance and security that I need ☹️