25.6 C
New York

IBM File Sharing Software Exploited by Hackers for Ransomware Attacks

IBM’s Aspera Faspex file transfer software is being exploited by ransomware groups to target businesses. The software is popular for its quick and secure transfer of large files. However, security experts warn that an unpatched flaw in the software, identified as CVE-2022-47986, is being actively exploited by hackers to bypass authentication and remotely execute code.

Vulnerability Exploited by Ransomware Groups

Despite IBM fixing the flaw on December 8, 2022, it did not immediately disclose the vulnerability. The flaw was only detailed in a security advisory released on January 26, 2023, which warned that the vulnerability could allow a remote attacker to execute arbitrary code in the system. The flaw has a high score of 9.8 on the Common Vulnerability Scoring System (CVSS) scale.

The Shadowserver malicious activity tracking group issued a warning on February 13, 2023, after observing active attempts to exploit the vulnerability in vulnerable versions of Aspera Faspex. Software developer Raphael Mendonça reported on February 16, 2023, that a group called BuhtiRansom had encrypted several vulnerable servers.

BuhtiRansom is a new ransomware group that uses ransomware written in the Go language to infect Linux systems. Victims are directed to pay the ransom through SatoshiDisk.com, a Bitcoin payment site hosted on a Cloudflare IP. The Unit 42 threat intelligence group at Palo Alto Networks identified BuhtiRansom and reported its ransomware activity.

Targeting File Transfer Software

Ransomware groups have targeted file transfer software or devices in the past to launch attacks. The Clop group has claimed responsibility for a recent large-scale attack campaign against users of GoAnywhere MFT, Fortra’s widely used file transfer software. The group exploited a zero-day vulnerability to target victims who had yet to patch the flaw, and it has claimed over 130 victims so far.

IBM urges users of Aspera Faspex to update their software to the latest version to address the vulnerability and prevent exploitation by hackers. Users should also implement multi-factor authentication and monitor their networks for any signs of unauthorized access.

Subscribe

Related articles

Asset Performance Management Market worth over USD 66.9 Billion by 2036

As per Research Nester, the global asset performance management...

Analysis of Edge Data Center Market Size

Research Nester’s recent market research analysis on “Edge Data...

Magnesium Uses: A Catalyst for Innovation and Efficiency

Ever wondered what the secret ingredient might be in...

Serhii Tokarev: Key Solutions to Develop the Ukrainian AI Market

The Ukrainian AI market holds significant potential, but its...

Author

editorialteam
editorialteam
If you wish to publish a sponsored article or like to get featured in our magazine please reach us at contact@alltechmagazine.com