Security

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?


Supply chain integration vendor Cleo has urged its customers to upgrade three of its products after an October security update was circumvented, leading to widespread ransomware attacks that Russia-linked gang Cl0p has claimed are its evil work.

This story starts in October when Cleo patched its Harmony, VLTrader, and LexiCom products to address an unrestricted file upload and download flaw that could lead to remote code execution (RCE).

But last week infosec outfit Huntress warned that Cleo's products were under attack after the patches were bypassed. Huntress's researchers advised that mass exploitation was occurring, at least ten businesses had been compromised, and even fully patched systems were exploitable.

The security shop later identified a new malware strain named Malichus that exploits the problem.

Cleo urged customers to update its Harmony, VLTrader, and LexiCom products to version 5.8.0.21, which the vendor claimed patched CVE-2024-50623.

The software vendor has since issued a security alert for a new vulnerability, CVE-2024-55956, and "strongly advises" customers to upgrade instances of Harmony, VLTrader, and LexiCom to version 5.8.0.24, which it says addresses a previously reported critical bug.

According to cyber security platform vendor Rapid7, CVE-2024-55956 is a bypass of the earlier flaw, CVE-2024-50623, and has been exploited. "Our team has observed enumeration and post-exploitation activity and is investigating multiple incidents," the threat hunters wrote last week.

Cleo did not immediately respond to The Register's questions – including how many customers had been compromised, and what exactly the relationship between CVE-2024-50623 and CVE-2024-55956 is. We will update this story if any substantive response should appear.

By December 13, the US Cybersecurity and Infrastructure Security Agency (CISA) had added the Cleo bug to its catalog of Known Exploited Vulnerabilities, and listed it as being abused in ransomware campaigns. Shortly after, Cl0p reportedly posted a cryptic message on its data leak site that seemingly claimed to be responsible for the attacks:

Dear companies

Due to recent events (attack of CLEO)

all links to data of all companies will be disabled and data will be permanently deleted from servers.

We will work only with new companies

The criminals also wished everyone a "Happy New Year." They did not, however, post any sample data to download.

Cl0p posted a cryptic message on its data leak site – Click to enlarge

Neither CISA nor the FBI immediately responded to The Register's questions about which ransomware gang was behind the attacks and how many victims had been compromised.

Cl0p, as El Reg readers likely remember, is the Russia-linked ransomware crew that also exploited a critical security hole in Progress Software's MOVEit product suite back in May 2023, and used this flaw to steal data from thousands of organizations and millions of individuals. Because of the similarities between Cleo and MOVEit products – and the fact that the MOVEit attack is still claiming victims – infosec experts are watching the Cleo situation closely.

But the jury is still out on whether people should believe Cl0p's claims.

Until I see the victim notifications and data to download, I'm not sure I trust a threat actor's word

"I'm still waiting for more definitive proof that it was Cl0p that performed these attacks, personally," John Hammond, Huntress principal security researcher, told The Register. "Until I see the victim notifications and data to download, I'm not sure I trust a threat actor's word quite yet."

He added that Cleo's most recent update does plug the hole. "As far as I know 5.8.0.24 is successful at preventing our proof-of-concept exploit for the new, December-based CVE-2024-55956," Hammond asserted.

Still, it's too soon to say who is behind the exploits. The Cleo activity that Huntress has been tracking "didn't entirely line up with" Cl0p's usual tradecraft, Hammond added, "So I am still speculative."

'Waiting for proof'

Hammond also worries that the message on Cl0p's leak site isn’t proof of the group's involvement.

"I'm not certain if this means they are claiming responsibility for the Cleo attacks, or if it is just a strange timing of their choice to remove all the old data," Hammond told The Register. "One possibility is that they are preparing to post all new victims and begin negotiating, but, it is all only speculation for now."

Rapid7's senior director of threat analytics Christiaan Beek also said his team hasn't seen any "hard evidence" pointing to Cl0p – or any other group – being involved in attacks on Cleo products. "However, we have seen Cl0p utilize complex chains similar to this vulnerability in multiple file transfer use cases before, such as MOVEit and Accellion FTA in 2021," he told The Register.

"Cl0p usually uses pure zero-day chains or vulnerabilities," Beek added. "This was an 'impure' chain in that one of the vulnerabilities was fixed and potentially exploited before Cl0p started using it – that we know of."

And while no one (other than the perpetrators themselves, who may or may not be Cl0p) has independently confirmed who or what is abusing Cleo's products, the tactics do appear to line up with Cl0p's modus operandi, according to Ferhat Dikbiyik, chief research and intelligence officer at Black Kite.

"This aligns with Cl0p's typical pattern: exploit a vulnerability at scale, negotiate quietly with initial victims, and then publicly announce their campaign to apply additional pressure," Dikbiyik told The Register. "Based on their previous attacks on MOVEit and GoAnywhere, we can expect victim names to start surfacing within one to two weeks." ®

Send us news
1 Comment

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly