Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit

Enterprise cloud security firm Qualys has become the latest victim to join a long list of entities to have suffered a data breach after zero-day vulnerabilities in its Accellion File Transfer Appliance (FTA) server were exploited to steal sensitive business documents.

As proof of access to the data, the cybercriminals behind the recent hacks targeting Accellion FTA servers have shared screenshots of files belonging to the company’s customers on a publicly accessible data leak website operated by the CLOP ransomware gang.

Confirming the incident, Qualys Chief Information Security Officer Ben Carr said a detailed probe “identified unauthorized access to files hosted on the Accellion FTA server” located in a DMZ (aka demilitarized zone) environment that’s segregated from the rest of the internal network.

“Based on this investigation, we immediately notified the limited number of customers impacted by this unauthorized access,” Carr added. “The investigation confirmed that the unauthorized access was limited to the FTA server and did not impact any services provided or access to customer data hosted by the Qualys Cloud Platform.”

Last month, FireEye’s Mandiant threat intelligence team disclosed details of four zero-day flaws in the FTA application that were exploited by threat actors to mount a wide-ranging data theft and extortion campaign, which involved deploying a web shell called DEWMODE on target networks to exfiltrate sensitive data, followed by sending extortion emails to threaten victims into paying bitcoin ransoms, failing which the stolen data was posted on the data leak site.

While two of the flaws (CVE-2021-27101 and CVE-2021-27104) were addressed by Accellion on December 20, 2020, the other two vulnerabilities (CVE-2021-27102 and CVE-2021-27103) were identified and fixed earlier this year on January 25.

Qualys didn’t say if it received extortion messages in the wake of the breach, but said an investigation into the incident is ongoing.

“The exploited vulnerabilities were of critical severity because they were subject to exploitation via unauthenticated remote code execution,” Mandiant said in a security assessment of the FTA software published earlier this week.

Additionally, Mandiant’s source code analysis uncovered two more previously unknown security flaws in the FTA software, both of which have been rectified in an FTA patch (version 9.12.444) released on March 1 —

  • CVE-2021-27730: An argument injection vulnerability (CVSS score 6.6) accessible only to authenticated users with administrative privileges, and
  • CVE-2021-27731: A stored cross-site scripting flaw (CVSS score 8.1) accessible only to regular authenticated users

The FireEye-owned subsidiary is tracking the exploitation activity and the follow-on extortion scheme under two separate threat clusters it calls UNC2546 and UNC2582, respectively, with overlaps identified between the two groups and previous attacks carried out by a financially motivated threat actor dubbed FIN11. But it is still unclear what connection, if any, the two clusters may have with the operators of Clop ransomware.

You May Also Like

7 thoughts on “Extortion Gang Breaches Cybersecurity Firm Qualys Using Accellion Exploit

  1. Greetings! I know this is somewhat off topic but I was wondering if you knew where I could get a captcha plugin for my comment form? I’m using the same blog platform as yours and I’m having trouble finding one? Thanks a lot!

  2. I really like your blog.. very nice colors & theme. Did you design this website yourself or did you hire someone to do it for you? Plz respond as I’m looking to design my own blog and would like to find out where u got this from. cheers

  3. In these days of austerity and also relative anxiety about running into debt, many individuals balk contrary to the idea of utilizing a credit card in order to make purchase of merchandise or maybe pay for a holiday, preferring, instead only to rely on the actual tried in addition to trusted method of making settlement – cash. However, if you possess cash on hand to make the purchase in full, then, paradoxically, this is the best time for you to use the card for several factors.

  4. Heya i am for the first time here. I came across this board and I find It truly useful & it helped me out a lot. I hope to give something back and aid others like you aided me.

  5. excellent post, very informative. I wonder why the other specialists of this sector don’t notice this. You should continue your writing. I’m confident, you have a great readers’ base already!

  6. Hello there, just turned into aware of your weblog via Google, and found that it’s truly informative. I抦 going to be careful for brussels. I will be grateful in case you proceed this in future. A lot of other folks might be benefited from your writing. Cheers!

  7. After I initially commented I clicked the -Notify me when new comments are added- checkbox and now every time a comment is added I get 4 emails with the same comment. Is there any way you may remove me from that service? Thanks!

Leave a Reply to Hairstyles Cancel reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 19,943 Today
» 29,555 Yesterday
» 166,873 This Week
» 850,647 This Month
» 3,543,934 This Year
» 19,779,029 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions