Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:20 PM
Connect Directly

Targeted Attack Activity Heightens Need for Orgs. to Patch New SolarWinds Flaw

A China-based threat actor -- previously observed targeting US defense industrial base organizations and software companies -- is exploiting the bug in SolarWinds' Serv-U software, Microsoft says.

Organizations that have not yet patched against a critical remote code execution vulnerability disclosed this week in SolarWinds' Serv-U file transfer technology for Windows might want to do so quickly.

Related Content:

Stopping the Next SolarWinds Requires Doing Something Different

Special Report: Building the SOC of the Future

New From The Edge: Navigating Active Directory Security: Dangers and Defenses

Microsoft, which informed SolarWinds about the flaw, reported on Tuesday that it had observed a likely China-based threat actor using a zero-day exploit in limited and targeted attacks against the vulnerability (CVE-2021-35211).

Microsoft is presently tracking the attacker as DEV-0322, a group operating out of China that it previously has observed targeting organizations in the US software industry and defense industrial base sector. The group has used commercial VPN technologies and compromised consumer routers in previous attack activity, the company said.

"We strongly urge all customers to update their instances of Serv-U to the latest available version," Microsoft wrote in a blog post yesterday.

CVE-2021-35211 is a so-called memory escape vulnerability in SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows. The technology is designed to give organizations a way to securely transfer files within and outside their networks.

The newly discovered vulnerability stems from SolarWinds' implementation of the SSH protocol in Serv-U. It gives attackers a way to remotely access and run malicious code with system-level privileges on vulnerable systems. Attackers can exploit the flaw to install and run malicious payloads, drop additional malware, and view or change data. However, the flaw is exploitable only on systems where Serv-U's SSH is exposed to the Internet.

Microsoft says it discovered the issue when investigating what appeared to be zero-day attack behavior in data it gathers from customer networks. "An anomalous malicious process was found to be spawning from the Serv-U process, suggesting that it had been compromised."

SolarWinds issued a hotfix for the vulnerability after Microsoft informed the company about it. In a subsequent alert and FAQ — that was last updated on Tuesday — the company said that Microsoft had provided it with evidence of "limited, targeted customer impact." However, SolarWinds is not aware of the identity of the customers that have been affected, the company said. Along with the hotfix, SolarWinds has provided instructions on how Serv-U customers can identify if they have been compromised. "If SSH is not enabled in the environment, the vulnerability does not exist," SolarWinds said.

The newly disclosed vulnerability in Serv-U is not related to the infamous attack disclosed last December on SolarWinds' software build environment that resulted in a backdoor called Sunburst being distributed to thousands of customers of the company's Orion network management software. But it is the third time — including the Sunburst attack campaign — that threat actors have been observed exploiting vulnerabilities in SolarWinds' technologies.

In late February and March, researchers investigating the Sunburst hack discovered that a Chinese group also might have been actively exploiting issues in the Orion platform at roughly the same time that the Russia-based group behind the Sunburst attack was exploiting it.

A Growing Trend
The attacks on SolarWinds are part of what security researchers say is a growing focus on the software supply chain among cyberattackers. In recent months, there have been several instances in which attackers have tried distributing malware or compromising many organizations at once, by targeting their trusted software vendors and service providers. A recent attack on Kaseya that resulted in ransomware being distributed to multiple managed service providers is the latest example.

Sounil Yu, CISO at JupiterOne, says the trend highlights the need to revamp third-party software vetting processes. "Currently, the standard of practice is to send vendors long questionnaires and occasionally ask for evidence associated with their answers," he says. "We trust that those answers are accurate, and that the vendor is truly performing the security activities that they attested to," Yu says. Going forward, it might be a good idea to ensure that third-party suppliers implement the same kind of zero-trust approach to security that President Biden referenced in his cybersecurity executive order for federal agencies earlier this year, Yu notes.

Supply chain security will remain a key issue for the enterprise moving forward, says Jack Mannino, CEO at nVisium. In addition to traditional software security testing techniques, such as code reviews and penetration testing, it would be a good idea for businesses to understand how software behaves through malicious code reviews, he says. "These types of tests explore the probability that software contains embedded malware," he adds, "through malicious code commits or by compromised third-party dependencies."

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
7/15/2021 | 1:21:20 PM
Interesting commentary
"Serv-U MFT key-based SSH login capabilities provide end users with easy peer-to-peer file sharing and folder synchronization. SSH authentication occurs automatically, and MFT doesn't require special clients or plugins for users to leverage key-based SSH login" - SSH Key Server Authentication - SSH File Transfer Tool | Serv-U

 Was this a supply chain issue or was this a flaw in a program that is part of the application that Solarwinds happen to select (not sure why they did not use WinSCP or OpenSSH but that is for another conversation)? In addition, the software has a peer-to-peer file sharing capability and folder synchronization (that is your problem right there), not sure why this was allowed to be part of the application stack, OpenSSH gives you that capability over an encrypted tunnel or WinSCP does the same thing.

In addition, since this uses SSH and Key-Mgmt capabilities, this should have not been compromised because the key should have been unique during its creation process or unless someone created a backdoor in the key creation process, not sure there but not sure why they did not remove the "P2P" file-sharing process.

Oh well, too late to cry over spilled milk, the damage has already been done.

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-01-15
ownCloud owncloud/client before 2.9.2 allows Resource Injection by a server into the desktop client via a URL, leading to remote code execution.
PUBLISHED: 2022-01-15
The files_antivirus component before 1.0.0 for ownCloud mishandles the protection mechanism by which malicious files (that have been uploaded to a public share) are supposed to be deleted upon detection.
PUBLISHED: 2022-01-15
The files_antivirus component before 1.0.0 for ownCloud allows OS Command Injection via the administration settings.
PUBLISHED: 2022-01-15
Pexip Infinity before 26 allows temporary remote Denial of Service (abort) because of missing call-setup input validation.
PUBLISHED: 2022-01-15
Pexip Infinity before 26.2 allows temporary remote Denial of Service (abort) because of missing call-setup input validation.