{"id":18225,"date":"2023-12-08T10:11:54","date_gmt":"2023-12-08T10:11:54","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=18225"},"modified":"2023-12-08T10:11:54","modified_gmt":"2023-12-08T10:11:54","slug":"federal-agency-hacked-with-coldfusion","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/federal-agency-hacked-with-coldfusion\/","title":{"rendered":"Federal Agency Hacked With ColdFusion Vulnerability"},"content":{"rendered":"<p>A <strong>vulnerability in Adobe&#8217;s ColdFusion allowed hackers to breach two public-facing servers at a federal agency<\/strong>. The Cybersecurity and Infrastructure Security Agency (CISA) published a report explaining the way it happened.<\/p>\n<h2>ColdFusion Vulnerability Exploited to Infiltrate Federal Agency Servers<\/h2>\n<p><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-339a\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Recently, CISA has reported<\/a> that Adobe&#8217;s ColdFusion &#8211; an application development tool, continues to pose a serious threat to organizations. Even though Adobe patched the CVE-2023-26360 vulnerability in March, CISA disclosed that <strong>two public-facing web servers at an undisclosed federal government agency were breached this summer<\/strong>.<\/p>\n<p>The attackers exploited <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-26360\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">the CVE-2023-26360 vulnerability in the ColdFusion software<\/a>, which enabled them to penetrate the systems. They deploy malware, including a remote access trojan (RAT), and access data through a web shell interface. The problem is that <strong>the affected servers ran outdated and vulnerable ColdFusion versions<\/strong>. Although Adobe released patches in March, only some users installed them. As a result, the lack of updates left an opening for intruders to gain initial access.<\/p>\n<figure id=\"attachment_18241\" aria-describedby=\"caption-attachment-18241\" style=\"width: 887px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/12\/CISA-report.webp\" alt=\"The Cybersecurity and Infrastructure Security Agency Report screenshot\" width=\"887\" height=\"680\" class=\"size-full wp-image-18241\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/12\/CISA-report.webp 887w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/12\/CISA-report-300x230.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/12\/CISA-report-768x589.webp 768w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/a><figcaption id=\"caption-attachment-18241\" class=\"wp-caption-text\">CISA report on the ColdFusion exploitation<\/figcaption><\/figure>\n<h2>Fixed But Still Works<\/h2>\n<p><strong>The CVE-2023-26360 flaw in ColdFusion allows arbitrary code execution without user action<\/strong>. Adobe released <a href=\"https:\/\/gridinsoft.com\/patch\">the patch that fixes the issue<\/a> back in March 2023. However, as some users do not see the need to install this hotfix, <strong>threat actors have persistently exploited the vulnerability in unpatched systems<\/strong>. The flaw affects ColdFusion versions 2018 Update 15 and earlier, as well as 2021 Update five and earlier, including unsupported versions.<\/p>\n<p>As for current incidents, they both occurred in June. In the first breach, hackers accessed the web server <strong>through a vulnerable IP address, exploiting the ColdFusion flaw<\/strong>. They attempted lateral movement, viewed information about user accounts, and executed reconnaissance. In addition, they dropped malicious artifacts, including a RAT that utilizes a JavaScript loader. Nevertheless, <strong>the attack was thwarted before successful data exfiltration<\/strong>.<\/p>\n<p>In the second incident, the attackers checked the web server&#8217;s operating system and ColdFusion version, inserting malicious code to extract usernames, passwords, and data source URLs. Evidence suggests the activity amounted <strong>to network reconnaissance mapping rather than confirmed data theft<\/strong>. The malicious code hints at threat actors&#8217; potential activities, leveraging the compromised credentials.<\/p>\n<h2>Nice try, but please try again later<\/h2>\n<p>According to experts, although the attackers managed to penetrate the target network, <strong>they could not do much damage<\/strong>. Actions encompassed reconnaissance, user account reviews, malware distribution, data exfiltration attempts, and code planting to extract credentials. Eight artifacts were left behind alongside a modified publicly available web shell for remote access.<\/p>\n<p>While later quarantined, assets exposed included password information that could enable deeper network pivoting. However, <strong>no data thefts or system transitions were confirmed<\/strong>. It&#8217;s unclear whether one or multiple actors were responsible for the linked events. However, one thing is sure: despite vendors fixing vulnerabilities quickly, <strong>user&#8217;s negligence abuses malicious code<\/strong> without target interaction by even low-skilled actors.<\/p>\n<h2>Older Vulnerabilities Cause More and More Concerns<\/h2>\n<p>Aside from some extreme cases, software developers rarely ignore patching serious vulnerabilities. <strong>Large companies though are ones who definitely pay less attention<\/strong> than they should. And as we can see from this story, this is applicable even to government organizations. And this is what creates concerns.<\/p>\n<p>As time goes on, hackers find more and more ways to exploit <a href=\"https:\/\/gridinsoft.com\/exploits\">the same vulnerabilities<\/a>. While some of them are getting patched by all parties or rendered ineffective, <strong>others remain actual and, what is worse, exploitable<\/strong>. After the initial discovery of a certain vulnerability, it is obvious to expect a boom in its exploitation. This comes especially true for programs that are generally used by large corporations \u2013 a category most of govt orgs fall into.<\/p>\n<p>Leaving such vulnerabilities unpatched is effectively <strong>an invitation for a hacker to pay your network a visit<\/strong>. In a modern turbulent and uneven time, such decisions borderline recklessness, if not outright sabotage.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability in Adobe&#8217;s ColdFusion allowed hackers to breach two public-facing servers at a federal agency. The Cybersecurity and Infrastructure Security Agency (CISA) published a report explaining the way it happened. ColdFusion Vulnerability Exploited to Infiltrate Federal Agency Servers Recently, CISA has reported that Adobe&#8217;s ColdFusion &#8211; an application development tool, continues to pose a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":18240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[244,388,374],"class_list":{"0":"post-18225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-adobe","9":"tag-patch","10":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/12\/coldfusion-attack-govt-agencies-featured.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=18225"}],"version-history":[{"count":14,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18225\/revisions"}],"predecessor-version":[{"id":18243,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/18225\/revisions\/18243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/18240"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=18225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=18225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=18225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}