Learn about the latest emerging threat - ConnectWise's ScreenConnect's vulnerability that was detailed on February 19, 2024.
Vulnerabilities in on-premise ConnectWise ScreenConnect remote access systems are being actively exploited to deliver a variety of different malware payloads into business environments.
Threat Actor actions observed can be summarised as:
On February 19, 2024, ConnectWise released a security advisory for its remote monitoring and management (RMM) software.
Their advisory highlighted two vulnerabilities that impact ScreenConnect versions 23.9.7 and earlier.
ConnectWise states in the advisory these vulnerabilities are rated as “Critical—Vulnerabilities that could allow the ability to execute remote code or directly impact confidential data or critical systems”. The two vulnerabilities are:
The vulnerabilities involve the server software itself, not the client software that is installed on the end-user devices. Threat Actors are using these vulnerabilities to take control of the server and use the capabilities of SecureConnnect Extensions to deploy malware to servers, desktops and laptops with the client software installed.
Sophos X-Ops blog Figure 1: illustrates a 90-day summary of hits with a ScreenConnect parent process on machines. This shows spikes of activity starting around 10th January in addition to the notable surge around 18th February
Data from internet scanning service Censys showed over 8,000 vulnerable ScreenConnect servers when the vulnerability was disclosed on 19th February.
On February 21, 2024, proof of concept (PoC) code was released on GitHub that exploits these vulnerabilities and adds a new user to the compromised system. Indications are that this has been integrated into malware toolkits and is being actively used by several Threat Actors to conduct attacks. This is one of several PoCs currently known.
Threat Actors have been seen to deploy a variety of ransomware (some examples are based on LockBit code), password stealers and remote access trojans to establish persistence in organisations.
Your organisation may use ScreenConnect directly, or you may have contracted IT support to a Managed Service Provider (MSP) that uses ScreenConnect to manage your fleet of servers and user devices. If the MSP’s ScreenConnect server was exploited, all of their customers may be at risk as part of a supply-chain attack.
Cloud-hosted implementations of ScreenConnect, including screenconnect.com, received mitigations with hours of validation to address these vulnerabilities.
Self-hosted (on-premise) implementations, unless upgraded to version 23.9.8, remain at risk.
Upgrading the server will not remove any malware or web shells that Threat Actors managed to deploy prior to upgrading, so any compromised environments need to be investigated.
5. Deploy endpoint security to any server currently or formerly used to run ScreenConnect.
Maintain oversight of developments published by ConnectWise:
https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
Sophos X-Ops blog has additional details related to the vulnerability and examples of exploitation:
https://news.sophos.com/en-us/2024/02/23/connectwise-screenconnect-attacks-deliver-malware/
Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.