Attackers have used an old Windows ColdFusion server to spread Cring Ransomware. Sophos researchers have revealed that an unknown threat actor exploited an ancient-in-internet-years vulnerability in an 11-year-old installation of Adobe ColdFusion 9 to take control of the ColdFusion server remotely, then to execute the ransomware on the server, and against other machines on the targets network.
Summary
The server running ColdFusion was running the Windows Server 2008 operating system, which Microsoft end-of-lifed in January, 2020. Adobe declared end-of-life for ColdFusion 9 in 2016. As a result, neither the operating system nor the ColdFusion software could be patched.
Despite the age of the software and the server, the attacker used fairly sophisticated techniques to conceal their files, inject code into memory, and cover their tracks by deleting logs and other artifacts that could be used in an investigation, off. The attackers breached the internet-facing server in minutes and executed the ransomware 79 hours later.
How It Works
It was found that the attackers were using an internet address assigned to Ukrainian ISP Green Floid, they began scanning the targets website using an automated tool to try to browse to more than 9000 paths on the targets website in just 76 seconds. The scans revealed that the web server was hosting valid files and URI paths specific to ColdFusion installations, such as /admin.cfm, /login.cfm, and /CFIDE/Administrator/.
The attackers then took advantage of CVE-2010-2861, a set of directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier that could be used by remote attackers to read arbitrary files, such as those containing administrator password hashes (“password.properties”).
In the next stage, the attacker is believed to have exploited another vulnerability in ColdFusion, CVE-2009-3960, which permits a remote attacker to inject data through an abuse of ColdFusions XML handling not to mention disarm security products by capitalizing on the fact that tamper-protection functionalities were turned protocols.This allowed them to upload a malicious Cascading Stylesheet (CSS) file to the server, consequently using it to load a Cobalt Strike Beacon executable. This binary, then, acted as a channel for the remote attackers to drop additional payloads, create a user account with admin privileges, and even disable endpoint protection systems and anti-malware engines like Windows Defender, before commencing the encryption process.
Remediation
The following best practices are recommended to help defend against Cring and other types of ransomware and related cyberattacks:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: ColdFusion Bug Exploited by Cring Ransomware Gang.pdf
References
Lakshmanan, Ravie. (2021, September 21). Cring Ransomware Gang Exploits 11- Year-Old ColdFusion Bug. Retrieved from The Hackers News:
https://thehackernews.com/2021/09/cring-ransomware-gang-exploits-11- year.html
Brandt, Andrew. (2021, September 21). Cring ransomware group exploits ancient ColdFusion server. Retrieved from Sophos News:
https://news.sophos.com/en- us/2021/09/21/cring-ransomware-group-expl oits-ancient-coldfusion-server/