Windows Print Spooler Vulnerabilities

Ransomware drivers such as Magniber and also Vice Society are proactively exploiting vulnerabilities in Windows Print Spooler to jeopardize sufferers and also spread side to side throughout a target’s network to release file-encrypting hauls on targeted systems.

“Multiple, distinct threat actors view this vulnerability as attractive to use during their attacks and may indicate that this vulnerability will continue to see more widespread adoption and incorporation by various adversaries moving forward,” Cisco Talos said in a record released Thursday, supporting an independent analysis from CrowdStrike, which observed circumstances of Magniber ransomware infections targeting entities in South Korea.

Stack Overflow Teams

While Magniber ransomware was initial identified in late 2017 selecting sufferers in South Korea with malvertising projects, Vice Society is a brand-new participant that arised on the ransomware landscape in mid-2021, mainly targeting public college areas and also various other universities. The strikes are claimed to have actually happened because at the very least July 13.

Since June, a collection of “PrintNightmare” problems impacting the Windows print spooler solution has actually emerged that might make it possible for remote code implementation when the element does blessed documents procedures –

  • CVE-2021-1675 – Windows Print Spooler Remote Code Execution Vulnerability (Patched on June 8)
  • CVE-2021-34527 – Windows Print Spooler Remote Code Execution Vulnerability (Patched on July 6-7)
  • CVE-2021-34481 – Windows Print Spooler Remote Code Execution Vulnerability (Patched on August 10)
  • CVE-2021-36936 – Windows Print Spooler Remote Code Execution Vulnerability (Patched on August 10)
  • CVE-2021-36947 – Windows Print Spooler Remote Code Execution Vulnerability (Patched on August 10)
  • CVE-2021-34483 – Windows Print Spooler Elevation of Privilege Vulnerability (Patched on August 10)
  • CVE-2021-36958 – Windows Print Spooler Remote Code Execution Vulnerability (Unpatched)

CrowdStrike noted it had the ability to effectively avoid efforts made by the Magniber ransomware gang at exploiting the Print Nightmare susceptability.

Prevent Ransomware Attacks

Vice Society, on the various other hand, leveraged a selection of methods to perform post-compromise exploration and also reconnaissance before bypassing indigenous Windows securities for credential burglary and also advantage acceleration.

Ransomware

Specifically, the assailant is thought to have actually utilized a harmful collection related to the Print Nightmare defect (CVE-2021-34527) to pivot to several systems throughout the setting and also remove qualifications from the sufferer.

“Adversaries are constantly refining their approach to the ransomware attack lifecycle as they strive to operate more effectively, efficiently, and evasively,” the scientists claimed. “The use of the vulnerability known as PrintNightmare shows that adversaries are paying close attention and will quickly incorporate new tools that they find useful for various purposes during their attacks.”