Coldfusion

Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed – Sophos News

Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed – Sophos News

Servers are always a point of interest for threat actors as they are one of the most efficient attack vectors to penetrate an organization. Server-related accounts often have the highest privilege levels, making lateral movement to other machines in the network easily achievable. Sophos X-Ops has observed a wide variety of threats being delivered to servers, with the most common payloads being Cobalt Strike Beacons, ransomware, fileless PowerShell backdoors, miners, and webshells.  In September and early October, we saw several efforts by a previously unknown actor to leverage vulnerabilities in obsolete, unsupported versions of Adobe’s ColdFusion Server software to gain access to the Windows servers they ran on and pivot to deploying ransomware. None of these attacks were… Source link

Read More »

Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Adobe ColdFusion Critical Vulnerabilities Exploited Despite Patches

Fortinet has observed significant threat exploitation targeting Adobe ColdFusion, a web development computing platform. This is despite a series of security updates (APSB23-40, APSB23-41, and APSB23-47) released by Adobe in July following reports of several critical vulnerabilities in its platform. Since those updates, however, Fortinet’s FortiGuard Labs IPS telemetry data has continued to detect numerous efforts to exploit one of these vulnerabilities, the deserialization of untrusted data by the Web Distributed Data eXchange (WDDX) data that forms part of some requests to ColdFusion. This vulnerability is critical because it poses a significant risk of arbitrary code execution. The observed attacks include probing, using an interactsh tool that can generate specific domain… Source link

Read More »