Cring Ransomware Continues Assault On Industrial Companies

Share post:

The Cring ransomware has continued to attack organizations with aging ColdFusion servers and VPNs.

According to Sophos researchers, the group that uses Cring ransomware consists of the same hackers in Belarus and Ukraine who use automated tools to break into servers of an unnamed company in the service sector.

The Sophos researchers went on to explain how the ransomware gang operated by exploiting a vulnerability in an 11-year-old installation of Adobe ColdFusion 9 to remotely take control of a ColdFusion server.

According to Sophos, the hackers used their automated tools to scan 9,000 access routes into the company’s systems within 75 seconds and then exploited a vulnerability in the outdated Adobe program that gave them access to files from servers that were not supposed to be publicly accessible.

During the attack, the attackers were able to access timesheets and payroll entry data before cracking the Internet-facing server within minutes, after which the ransomware was successfully executed 72 hours later.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Founders of cryptocurrency firm charged with laundering over $100 million

In a major crackdown on cryptocurrency-related crimes, the U.S. Attorney's Office for the Southern District of New York...

Cyber Security Today, April 29, 2024 – Credential stuffing attacks are hitting firms using Okta ID management solutions, and more

This episode reports on a job scam aimed at app developers, the latest data breach notification

Google Chrome update essential for Windows users

The latest Chrome update has just been rolled out, bringing the version up to 124.0.6367.78/.79. This update is...

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways