Quarterly Briefing: Threat Actor Using Unpatched Vulnerabilities

Image cover for blog post.

Oct 1, 2024

Profile image of ENTRYZERO

ENTRYZERO

32% of ransomware attacks start with an unpatched vulnerability, and these have the greatest business impact. In our weekly ”Top 5 Hacker-Relevant Vulnerabilities" series, we report on vulnerabilities that are particularly pertinent to threat actors. As part of this ongoing effort, we will provide quarterly recaps on selected threat actors, associated breaches, and the vulnerabilities they exploit.

Third Quarter 2024

Threat Actor: LockBit

Threat Actor Whois: LockBit operates primarily as a Ransomware-as-a-Service model. This threat actor has become one of the most notorious and successful ransomware groups in recent years. It first emerged around 2019 and has undergone multiple iterations (e.g., LockBit 2.0, LockBit 3.0), improving its techniques with each version. Its primary goal is to deploy ransomware on a victim’s network to encrypt data, extort ransom payments, and threaten to leak the victim’s sensitive information. LockBit is not known for favoring big hunt targets, nor does it have specific industries it likes to target. In February, international law enforcement seized LockBit’s infrastructure, and arrests were made in connection with the coordinated international operation. However, less than one week later, the ransomware group relaunched its operation

Threat Actor Key Characteristics:

  • Ransomware-as-a-Service: LockBit provides its ransomware tools to affiliates (other cybercriminals) who carry out the attacks. These affiliates receive a percentage of the ransom payment, with LockBit taking a cut
  • Double Extortion: Like many modern ransomware groups, LockBit employs double extortion, meaning it not only encrypts the victim’s files but also threatens to release sensitive data if the ransom isn’t paid
  • Highly Automated and Fast: LockBit ransomware is known for its high level of automation, which makes it faster to spread across the network and encrypt files

Selected Security Breaches Associated with Threat Actor: LockBit has been responsible for numerous high-profile breaches, targeting various industries and organizations around the globe. Some notable victims include Evolve Bank and Trust (2024), Boeing (2023), Thales Group (2022), Mercedes-Benz USA (2021), and Accenture (2021). These attacks demonstrate the group’s ability to infiltrate organizations across different sectors. In the third quarter of 2024, LockBit continued its assault on numerous companies. Below is a small list of selected breaches associated with LockBit sourced from Blackfog. While some incidents have been publicly disclosed, many remain undisclosed:

Victim NameVictim InformationVictim Location
Kulicke & SoffaSemiconductor manufacturerSingapore
KBC ZagrebUniversity hospital centerCroatia
Wattle Range CouncilLocal governmentAustralia
Clay County IndianaLocal governmentUSA
Federated Co-OperativesCo-operative federationCanada
Real Hospital Português de BeneficênciaPrivate hospitalBrazil
Lothar RappContractorGermany
Customs Support GroupCustoms brokerNetherlands
AkaneaSoftware companyFrance
Barking Well MediaMedia companyGreece
Luis OliverasFood product supplierSpain
Exol LubricantsLubricant manufacturerUK
GB Ricambi SpAMachinery manufacturerItaly

Selected MITRE ATT&CK Techniques Used by Threat Actor for Initial Access: LockBit is known to use the following techniques to gain initial access to its victims’ IT infrastructure:

Selected Vulnerabilities Exploited by Threat Actor: LockBit affiliates have been documented exploiting numerous CVEs, including:

Vulnerable ProductVulnerability
Citrix VPN (Bleed)CVE-2023-4966, CVE-2019-19781
PaperCut MF/NGCVE-2023-27350
Fortra GoAnyhwereCVE-2023-0669
Microsoft Exchange (ProxyLogon, ProxyShell)CVE-2021-2685, CVE-2021-34473, CVE-2021-34523, CVE-2021-31207
Apache (Log4j2)CVE-2021-44228
F5 BIG-IP and BIG-IQCVE-2021-22986
Pulse Secure VPNCVE-2019-11510
Microsoft RDPCVE-2019-0708
Fortinet VPNCVE-2018-13379

Further Reading: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a

All Rights Reserved by ENTRYZERO GmbH

Website by Sanico Software

IMPRINT: ENTRYZERO GmbH, Grabenstraße 38, 44787 Bochum, Registered Office: Bochum, Registration Court: Local Court Bochum, Registration number: HRB 21709, VAT ID: DE369315057, Managing Directors: Dr. Mohamad Sbeiti, Samet Gökbayrak, Tel.: +49 151 56561989, Email: info@entryzero.ai

PRIVACY POLICY: This website does not collect any personal data. We do not use cookies, trackers, forms or similar technologies. However, by visiting our website you agree that for every site request the following non-personal information is stored on the webserver for statistical, intrusion detection/prevention and troubleshooting purposes: requested address (URL), request date and time, client IP address, user-agent and referer. No information is given to or shared with third parties