Threat Advisory

Helldown Ransomware Exploits Vulnerability in Zyxel Devices

Threat: Ransomware
Threat Actor Name: Helldown
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

A critical vulnerability in Zyxel devices, identified as CVE-2024-11667, has been exploited by the "Helldown" ransomware group to infiltrate organizational networks. This flaw allowed attackers to gain administrator access to firewall consoles, enabling them to harvest sensitive credentials, including corporate domain accounts. Exploiting this vulnerability, the group managed to infiltrate deeper layers of targeted infrastructures. To mitigate the risk, security experts have urged immediate firmware updates to affected devices, highlighting the need for vigilance in securing network appliances against such sophisticated attacks.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY:

A critical vulnerability in Zyxel devices, identified as CVE-2024-11667, has been exploited by the "Helldown" ransomware group to infiltrate organizational networks. This flaw allowed attackers to gain administrator access to firewall consoles, enabling them to harvest sensitive credentials, including corporate domain accounts. Exploiting this vulnerability, the group managed to infiltrate deeper layers of targeted infrastructures. To mitigate the risk, security experts have urged immediate firmware updates to affected devices, highlighting the need for vigilance in securing network appliances against such sophisticated attacks.[emaillocker id="1283"]

The technical investigation revealed that the breach began with attackers using the default administrator account to access the firewall from an external IP address. Due to limited log retention, the exact method for obtaining these credentials remains unclear. The attackers used VPN services to obscure their locations, making their activity appear local to the victim's country. To maintain access, they created unauthorized accounts on the firewall, such as "SUPPOR87" and "vpn." The ransomware file was deployed on a domain controller, targeting, and encrypting data on ESXi servers. Post-deployment, the attackers deleted files to complicate forensic efforts, demonstrating a calculated and advanced attack strategy.

This incident underscores the need for organizations to strengthen their security practices against evolving threats. Regular updates to security appliances and effective monitoring systems are crucial to detect and prevent unauthorized access. Attackers’ use of anonymization techniques and unauthorized account creation highlights the increasing sophistication of cyberattacks. Proactive steps, such as enhanced log management, routine security audits, and swift vulnerability patching, are critical to minimize exposure to such risks and ensure resilient cybersecurity defenses.

THREAT PROFILE:

Tactic Technique Id Technique
Initial Access T1190 Exploit Public-Facing Application
T1078 Valid Accounts
Execution T1053 Scheduled Task/Job
T1059 Command and Scripting Interpreter
Persistence T1136 Create Account
Privilege Escalation T1078 Valid Accounts
T1098 Account Manipulation
Defense Evasion T1070 Indicator Removal
Credential Access T1003 OS Credential Dumping
Discovery T1018 Remote System Discovery
Lateral Movement T1021 Remote Services
T1570 Lateral Tool Transfer
Command and Control T1105 Ingress Tool Transfer
Impact T1486 Data Encrypted for Impact
T1490 Inhibit System Recovery

REFERENCES:

The following reports contain further technical details:
https://cybersecuritynews.com/helldown-ransomware-exploiting-zyxel-devices/

[/emaillocker]
crossmenu