Lorenz Ransomware Penetrates Corporate Networks via Phone Systems

Share post:

Lorenz, a ransomware gang which attacks organizations worldwide with tailored attacks and ransom demands, is now exploiting a critical vulnerability in Mitel MiVoice VOIP devices. The goal is to compromise companies and gain initial access to their corporate networks via their phone systems.

Arctic Wolf Labs security researchers discovered this new method after noticing a significant overlap with Tactics, Techniques, and Procedures associated with ransomware attacks that used the CVE-2022-29499 bug.

The exploited vulnerability is a remote code execution bug affecting the Mitel Service Appliance component of MiVoice Connect.

It allows attackers to obtain a reverse shell and then used Chisel as a tunneling tool to pivot into the environment. Given that Mitel Voice-over-IP (VoIP) products are used by organizations in critical sectors around the world, this is an important addition to the arsenal of the gangs.

Mitel fixed the vulnerability by releasing security patches in early June 2022, after a patch script for affected versions of MiVoice Connect was released in April. Tesorion, a Dutch cybersecurity company, has released a free Lorenz ransomware decryptor that can restore some file types such as Office documents, PDF files, images and videos.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways