Termite ransomware group operators (and maybe other groups) have a zero day exploit for Cleo LexiCom, VLTransfer, and Harmony. #ransomware #threatintel
Cleo Software Actively Being Exploited in the Wild | Huntress

Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, commonly used to manage file transfers. Read more about this emerging threat on the Huntress Blog.

i would fully pull the plug on impacted Cleo products until there's vendor clarity btw

Shodan dork (not exhaustive) - the Windows ones are a particular problem in terms of ransomware.

https://beta.shodan.io/search?query=http.html_hash%3A1534766930

#cleo #threatintel

Cleo have issued a (paywalled) advisory about the zero day, saying a new CVE number is being allocated.

https://support.cleo.com/hc/en-us/articles/28389495587095-Unauthenticated-Malicious-Hosts-Vulnerability

#cleo #threatintel

Rapid7 say "As of December 10, Rapid7 MDR has confirmed successful exploitation of this issue in customer environments; similar to Huntress, our team has observed enumeration and post-exploitation activity and is investigating multiple incidents." https://www.rapid7.com/blog/post/2024/12/10/etr-widespread-exploitation-of-cleo-file-transfer-software-cve-2024-50623/

#cleo #threatintel

Widespread exploitation of Cleo file transfer software (CVE-2024-50623) | Rapid7 Blog

Rapid7

After my toot Cleo have issued a public advisory, they're saying versions up to 5.8.0.23 (not out yet) are impacted.

In terms of threat intel, the ransomware operators I know of only have an exploit for the Windows versions, not Linux.

https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Peding

#threatintel #ransomware #cleo

"In an emailed statement given to TechCrunch, Jorge Rodriguez, SVP of product Development at Cleo, said that a patch for the critical vulnerability is “under development.”

https://techcrunch.com/2024/12/10/hackers-are-exploiting-a-flaw-in-popular-file-transfer-tools-to-launch-mass-hacks-again/

#cleo #threatintel

Hackers are exploiting a flaw in popular file-transfer tools to launch mass hacks, again | TechCrunch

Threat actors are exploiting a high-risk bug in Cleo software - and Huntress warns that fully-patched systems are vulnerable

TechCrunch

Sophos says they have seen 50+ systems with Cleo enterprise file transfer product zero day exploitation. Huntress say 28+ customers so far. Rapid7 haven’t given numbers.

https://infosec.exchange/@SophosXOps/113631363563332166

#cleo #threatintel

Sophos X-Ops (@[email protected])

Sophos X-Ops teams are monitoring and responding to attacks against Cleo products VLTrader, Harmony, and LexiCom prior to version 5.8.0.23 in each as outlined in this advisory: https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Advisory-CVE-Pending. Sophos MDR and Labs teams can confirm seeing 50+ unique hosts targeted by these attacks at this time. All observed impacted customers have a branch or operate within the North Americas, primarily the US. We note the majority of observed affected customers are retail organizations. Sophos MDR threat hunting currently shows the first attack on 2024-12-06 at 17:47 UTC. We will continue to monitor and provide updates as we have more information. #Sophosxops #threatintel

Infosec Exchange

A writeup on the Cleo vulnerabilities, which are under mass exploitation now. Write any file into any folder by using path=..\..\..\ - since it's a webapp, just drop a webshell.

https://labs.watchtowr.com/cleo-cve-2024-50623/

#cleo #threatintel

Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)

We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely. Cleo have a (paywalled) advisory, linked to

watchTowr Labs - Blog
Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software - Arctic Wolf

Key Takeaways Cleo MFT products were exploited by threat actors to deploy a malicious PowerShell stager, culminating in the execution of a Java-based backdoor we are dubbing Cleopatra. The campaign began on 7 December 2024, and is ongoing as of the publication of this article. The Cleopatra backdoor supports in-memory file storage and is designed ... Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Arctic Wolf

I think the Cleo thing shows the industry and community working very well, btw.

From zero day in an MFT product to approx 2/3rd of servers now offline or patched in days. As far as I know, since mass exploitation began (important caveat) none of the victims had follow on activity, ie ransomware.

That’s a really good outcome. The reason, I think, is openness and transparency - Huntress went public early and everybody leaped on it loudly in the community. Be more open.

#cleo #threatintel

Had the threat actor gone more slowly and hit orgs prone to cover ups (ie large enterprises) that would have been a very different outcome.

The smaller Managed Detection and Response vendors have the window to do something very funny and talk about things rather than doing a CrowdStrike, MS etc and doing a cover up - it breaks the race to the bottom, and is one area where the market is getting healthier.

#cleo #threatintel

CISA have added the new CVE for the Cleo zero day to KEV.

https://mastodon.social/@cisakevtracker/113647291426972278

#cleo #threatintel

nope

Top stuff from Bleeping Computer here in terms of investigation.

So it looks like some ransomware operators are wearing multiple group hats.

https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/

Clop ransomware claims responsibility for Cleo data theft attacks

The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data.

BleepingComputer

For what it’s worth, I’ve found some novel ways of tracking ransomware operators. I don’t want to reveal how as I don’t want to blow the access.

Also, good on cl0p for narrowing the extortion criteria.

Cl0p ransomware group plan to start dropping data obtained from Cleo MFT zero day tomorrow for about 50 orgs, list here: https://infosec.exchange/@cR0w/113879140146742766
cR0w :cascadia: (@[email protected])

In case anyone else missed the list like I did, here you go: >BLUEYONDER.COM - WILL BE PUBLISHED 24.01 FRIDAY PISPL.IN - WILL BE PUBLISHED 24.01 FRIDAY LINFOX.COM - WILL BE PUBLISHED 24.01 FRIDAY ESPRIGAS.COM - WILL BE PUBLISHED 24.01 FRIDAY EKOMERCIO.COM FULL FILES PUBLISHED VIA TOR WESTERNALLIANCEBANK.COM - WILL BE PUBLISHED 24.01 FRIDAY CLEO.COM - WILL BE PUBLISHED 24.01 FRIDAY JOMARSOFTCORP.COM FULL FILES PUBLISHED VIA TOR CLAWLOGISTICS.COM - WILL BE PUBLISHED 24.01 FRIDAY CPS.EDU - WILL BE PUBLISHED 24.01 FRIDAY TERRA.COM - WILL BE PUBLISHED 24.01 FRIDAY SDITECHNOLOGIES.COM - WILL BE PUBLISHED 24.01 FRIDAY HEARSTPOWER.COM - WILL BE PUBLISHED 24.01 FRIDAY VELSOL.COM FULL FILES PUBLISHED VIA TOR STEELBLUE.COM.AU - WILL BE PUBLISHED 24.01 FRIDAY COVESTRO.COM - WILL BE PUBLISHED 24.01 FRIDAY NISSINFOODS.COM - WILL BE PUBLISHED 24.01 FRIDAY ENCOMPASSTECH.COM - WILL BE PUBLISHED 24.01 FRIDAY ICERIVERGREENBOTTLECO.COM - WILL BE PUBLISHED 24.01 FRIDAY BREAKTHROUGHFUEL.COM - WILL BE PUBLISHED 24.01 FRIDAY PREMIERSUPPLIES.COM - WILL BE PUBLISHED 24.01 FRIDAY NOWINC.CA - WILL BE PUBLISHED 24.01 FRIDAY CONSULTANTS.COM - WILL BE PUBLISHED 24.01 FRIDAY SWEETSTREET.COM - WILL BE PUBLISHED 24.01 FRIDAY WSINC.COM FULL FILES PUBLISHED VIA TOR OFSPORTAL.COM - WILL BE PUBLISHED 24.01 FRIDAY SHEERLOGISTICS.COM - WILL BE PUBLISHED 24.01 FRIDAY INNOTEKEP.COM - WILL BE PUBLISHED 24.01 FRIDAY KEEACTIONSPORTS.COM - WILL BE PUBLISHED 24.01 FRIDAY ALPINEFOODS.COM - WILL BE PUBLISHED 24.01 FRIDAY C3GROUP.NL - WILL BE PUBLISHED 24.01 FRIDAY JAKKS.COM - WILL BE PUBLISHED 24.01 FRIDAY CREELED.COM - WILL BE PUBLISHED 24.01 FRIDAY HERTZ.COM - WILL BE PUBLISHED 24.01 FRIDAY HILLBROS.COM - WILL BE PUBLISHED 24.01 FRIDAY COYOTE.COM - WILL BE PUBLISHED 24.01 FRIDAY NORTHERNONTARIOWIRES.COM - WILL BE PUBLISHED 24.01 FRIDAY BMIUSA.COM - WILL BE PUBLISHED 24.01 FRIDAY BUSINESSSYSINTEG.COM - WILL BE PUBLISHED 24.01 FRIDAY RUIA.COM - WILL BE PUBLISHED 24.01 FRIDAY MERCURYGATE.COM FULL FILES PUBLISHED VIA TOR EMKAY.COM - WILL BE PUBLISHED 24.01 FRIDAY ARROW.COM - WILL BE PUBLISHED 24.01 FRIDAY SPGUSA.COM - WILL BE PUBLISHED 24.01 FRIDAY MADENGINE.COM - WILL BE PUBLISHED 24.01 FRIDAY BRADLEYCALDWELL.COM - WILL BE PUBLISHED 24.01 FRIDAY SULLYTRANSPORT.COM - WILL BE PUBLISHED 24.01 FRIDAY SPADERFREIGHT.COM - WILL BE PUBLISHED 24.01 FRIDAY ARTIKA.COM - WILL BE PUBLISHED 24.01 FRIDAY BURRISLOGISTICS.COM - WILL BE PUBLISHED 24.01 FRIDAY WHITMOR.COM - WILL BE PUBLISHED 24.01 FRIDAY SEATTLECHOCOLATES.COM - WILL BE PUBLISHED 24.01 FRIDAY UTILISMARTCORP.COM - WILL BE PUBLISHED 24.01 FRIDAY CDRSOFTWARE.COM - WILL BE PUBLISHED 24.01 FRIDAY CALEXISCS.COM - WILL BE PUBLISHED 24.01 FRIDAY POLARISTRANSPORT.COM - WILL BE PUBLISHED 24.01 FRIDAY AMPOL.COM.AU - WILL BE PUBLISHED 24.01 FRIDAY USLUGGAGE.COM - WILL BE PUBLISHED 24.01 FRIDAY OLAMETER.COM - WILL BE PUBLISHED 24.01 FRIDAY

Infosec Exchange
Cl0p have started publishing the stolen Cleo MFT data. Have confirmed with one of the victim orgs it came from their Cleo server. #cleo #threatintel #ransomware
@GossiTheDog is this different to the last BlueYonder cyber incident thing from November last year?
@GossiTheDog if we do business with a company on the list, how could we check if any of our company data is in these leaks? Or is this better pitched to our contracted SOC…
@johnley @GossiTheDog usually these file dumps also include a file tree. You can find the url’s of the site where this ransomware group publishes the files on ransomlook or https://cti.fyi. With a Tor browser, you are good to go.
CTI.FYI - Ransomware Group Intelligence

@GossiTheDog a new CVE was cut for the exploit we saw earlier

https://www.cve.org/CVERecord?id=CVE-2024-12632

CVE Website