Remote exploit compromises specific configurations of XG firewalls with the intent of stealing data from the devices.

4 Min Read

Security firm Sophos acknowledged "a coordinated attack by an unknown adversary" that compromised the company's XG firewall products using a previously unknown SQL injection vulnerability, according to an advisory published on April 27.

The attack, which took place five days earlier, targeted "multiple customers" whose firewalls had been configured with the administrative or user portal exposed to the Internet, and which had a firewall service, such as an SSL VPN, exposed to the Internet on the same port. While these settings are not the default configuration, companies struggling with remote workers may have been more likely to configure their firewall to allow remote administration and could have placed services on the same interface as the administrative portal.

The attack began midday on April 22, and by early morning of the following day, Sophos had determined that multiple customers' firewalls had been compromised by the exploit, resulting in its response escalating to a "major incident process," the company stated in its advisory.

"Sophos immediately began an investigation that included retrieving and analyzing the artifacts associated with the attack," a Sophos spokesperson said in an e-mail interview with Dark Reading. "After determining the components and impact of the attack, Sophos deployed a hotfix to all supported versions."

Because of the hotfix, companies can look for alerts on their firewall's Control Center dashboard to determine if their appliance had been targeted, Sophos said in its advisory.

In a separate analysis, Sophos revealed the results of its investigation. Once a firewall had been compromised, the attackers ran a series of shell scripts to install executable files designed to run on the firewall's operating system, starting with a shell script install.sh. The script attempted to install two other programs, one of which was designed to make the attack persistence. The script also attempted to conceal its activities, but — because of poor design — actually made it more noticeable, Sophos said.

"This attack targeted Sophos products and apparently was intended to steal sensitive information from the firewall," the company said.

The malware appeared to be focused on data exfiltration. While the attack had capabilities to exfiltrate data from infected firewall appliances, Sophos had "not discovered any evidence that the data collected had been successfully exfiltrated," the company said in its analysis. The scripts focused on copying the contents of specific database tables from the firewall and then appended the collected information to a file on the firewall.

The attack appeared quite sophisticated, but a Sophos spokesperson said "it is too early to tell who is behind the attack," while the company continues to investigate.

Sophos is not the first security company to suffer a targeted attack against its products. In May 2019, a group of hackers claimed to have stolen source code from Trend Micro, McAfee and Symantec. Only Trend Micro confirmed the breach, while Symantec denied that the company had suffered a compromise.

In 2017, attackers compromised the development systems of Piriform — recently purchased by security firm Avast — and installed a malicious backdoor into the code of its system utility, CCleaner. The group behind the attack appeared to be a Chinese government-linked APT group, according to analysis.

In the latest attack on a security firm, Sophos stated that it is not aware of any subsequent attempts to use the beachhead in customers' firewalls to extend access to customers' systems. The malware installed by the attackers is designed to collect public IP addresses and the firewall's license key, as well as get SQL user account information, a hash of the administrator's password, and information on policies. The software will compress the data and send it back to the attacker over an encrypted connection.

The company urged its customers to harden their firewall configurations and not expose the administrative interface or user portal to the Internet.

"Although we have remediated this vulnerability, it is always a good idea to reduce attack surface wherever possible by disabling HTTPS Admin Services and User Portal access on the WAN interface," the company states in its advisory.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "5 Ways to Prove Security's Worth in the Age of COVID-19."

About the Author(s)

Robert Lemos, Contributing Writer

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights