France's cyber-agency says Centreon IT management software sabotaged by Russian Sandworm

Web hosts infiltrated for up to three years in attack that somewhat resembles SolarWinds mess


France’s Agence nationale de la sécurité des systèmes d'information (ANSSI), the nation’s cyber-security agency, has identified a years-long campaign to infiltrate IT monitoring platform Centreon.

Centreon (the company) claimed that Centreon (the software) is a spiffing open-source IT monitoring tool.

“Organizations must keep an unblinking eye on their IT infrastructure and operations to ensure service uptime and peak network availability,” according to the company’s blurb. Centreon the company said Centreon the software is that unblinking eye.

ANSSI on Monday revealed it is aware of two backdoors in Centreon the software, and said several French IT services providers have been infiltrated for up to three years.

In a detailed report [PDF] that The Register navigated with rusty high school French and online translation services, ANSSI said the attack used the PAS web shell and the Exaramel backdoor trojan.

Neither backdoor is new. The PAS web shell has been on security vendors’ radars since 2017 and mentions of Exaramel can be found in 2018. PAS does nasty things including brute force attacks on databases, to gain access to their contents. Exaramel is a remote-control tool.

Burning money

A year after devastating NotPetya outbreak, what have we learnt? Er, not a lot, says BlackBerry bod

READ MORE

ANSSI said the attack was possible because some Centreon users didn’t keep their systems patched. The agency did not describe the consequences of the attack but said the combination of the two backdoors allowed complete compromise of Centreon, the software, and therefore lateral movement across networks.

As the attack targeted service providers, and such organisations are likely to offer multi-tenanted infrastructure, it’s possible many entities have been compromised.

ANSSI didn’t say Russia was responsible for the attack but did say the methods used to put the backdoors in place and operate them looked a lot like the ”Sandworm” crew that’s also suspected of having a role in the NotPetya ransomware.

ANSSI’s report recommends that all users of management tools should limit access to their web interfaces and harden the Linux servers on which they run.

But IT service providers and the vendors that cater to their needs are constantly reminded that security excellence is non-negotiable because they’re a gateway to numerous other organisations and therefore a prime target for criminals. Yet some have clearly run old and vulnerable versions of Centreon, the software, and then failed to spot bad actors rummaging about inside.

As did the many organisations that ran compromised versions of SolarWinds' Orion management software. ®


Other stories you might like

  • Cheers ransomware hits VMware ESXi systems
    Now we can say extortionware has jumped the shark

    Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months.

    ESXi, a bare-metal hypervisor used by a broad range of organizations throughout the world, has become the target of such ransomware families as LockBit, Hive, and RansomEXX. The ubiquitous use of the technology, and the size of some companies that use it has made it an efficient way for crooks to infect large numbers of virtualized systems and connected devices and equipment, according to researchers with Trend Micro.

    "ESXi is widely used in enterprise settings for server virtualization," Trend Micro noted in a write-up this week. "It is therefore a popular target for ransomware attacks … Compromising ESXi servers has been a scheme used by some notorious cybercriminal groups because it is a means to swiftly spread the ransomware to many devices."

    Continue reading
  • Twitter founder Dorsey beats hasty retweet from the board
    We'll see you around the Block

    Twitter has officially entered the post-Dorsey age: its founder and two-time CEO's board term expired Wednesday, marking the first time the social media company hasn't had him around in some capacity.

    Jack Dorsey announced his resignation as Twitter chief exec in November 2021, and passed the baton to Parag Agrawal while remaining on the board. Now that board term has ended, and Dorsey has stepped down as expected. Agrawal has taken Dorsey's board seat; Salesforce co-CEO Bret Taylor has assumed the role of Twitter's board chair. 

    In his resignation announcement, Dorsey – who co-founded and is CEO of Block (formerly Square) – said having founders leading the companies they created can be severely limiting for an organization and can serve as a single point of failure. "I believe it's critical a company can stand on its own, free of its founder's influence or direction," Dorsey said. He didn't respond to a request for further comment today. 

    Continue reading
  • Snowflake stock drops as some top customers cut usage
    You might say its valuation is melting away

    IPO darling Snowflake's share price took a beating in an already bearish market for tech stocks after filing weaker than expected financial guidance amid a slowdown in orders from some of its largest customers.

    For its first quarter of fiscal 2023, ended April 30, Snowflake's revenue grew 85 percent year-on-year to $422.4 million. The company made an operating loss of $188.8 million, albeit down from $205.6 million a year ago.

    Although surpassing revenue expectations, the cloud-based data warehousing business saw its valuation tumble 16 percent in extended trading on Wednesday. Its stock price dived from $133 apiece to $117 in after-hours trading, and today is cruising back at $127. That stumble arrived amid a general tech stock sell-off some observers said was overdue.

    Continue reading

Biting the hand that feeds IT © 1998–2022