Stor-a-File hit by ransomware after crooks target SolarWinds Serv-U FTP software

New research says it's Clop's favourite attack method du jour

Stor-a-File, a British data capture and storage company, suffered a ransomware attack in August that exploited an unpatched instance of SolarWinds' Serv-U FTP software.

The company informed its clients about the September attack, and told The Register that it refused to pay. We understand some data has been leaked by ransomware criminals on a Tor blog.

At least one of Stor-a-File's clients is a medical company, one of whose customers got in touch with El Reg last week.

"The medical company (which I'm not going to name now as they are going through a process of assessing damage, liability, etc.) used Stor-a-File for the scanning of paper documents including medical records," our reader told us.

In a statement Stor-a-File said: "The incident occurred in September. The ICO and police were contacted as soon as we knew what had happened. Our clients were informed once it had been established any of their data may have been compromised."

Reg readers complained to us about the long delay between the ransomware attack and being notified that their data was caught up in it. Some also alleged they had been told the attack took place in August.

"From our investigations," continued Stor-a-File's statement, "the incident is limited to the small number of records we hold electronically. Everyone whose data may have been affected has been contacted. The millions of company and organisation records, held physically in boxes on shelves in our warehouses were unaffected."

We understand that the attack vector was an outdated version of SolarWinds' Serv-U FTP server software. While we do not know the precise version Stor-a-File was running, in July Microsoft said it had found a critical vulnerability in version 15.2.3 HF1 and earlier builds.

"We have now removed all third party software from our secure system to prevent any similar issues in the future," said Stor-a-File.

A since-deleted page on Stor-a-File's website titled "NHS Scanning" was giving 404s when we visited it at the time of writing. A snapshot saved on the Internet Archive shows Stor-a-File provided "document conversion services to the NHS for more than thirty-five years and across more than forty Trusts." (There were around 200 NHS trusts across the country in 2019.)

We asked NHS Digital for comment on whether NHS patient data was affected in the breach, and it directed us to NCSC. Stor-a-File assured us it was not.

Health records processed by Stor-a-File included HIV and genitourinary clinic records, finance department records and invoices, oncology and HR files "and many more" to quote the firm itself.

Serv-U what now?

Tracked as CVE-2021-35211, the Serv-U vuln allowed an attacker to achieve remote code execution through what Microsoft described as a Return Oriented Programming attack, as we reported at the time.

British infosec firm NCC Group said in an advisory note that it had seen "multiple" instances of the Clop ransomware gang abusing the Serv-U vuln – highlighting that this was not the China-based threat group pointed out by Microsoft as the vuln's sole exploiter back in July.

"The first indicator of compromise for the exploitation of this vulnerability are suspicious entries in a Serv-U log file named DebugSocketlog.txt. This log file is usually located in the Serv-U installation folder. Looking at this log file it contains exceptions at the time of exploitation of CVE-2021-35211," said NCC Group. The company also recommended hunting for suspicious PowerShell command execution; full details are available at the link above.

NCC Group added that in October, "three months after SolarWinds released their patch", it could still find 2,784 vulnerable Serv-U instances accessible from the public internet. Of those, 27 were in the UK – while 1,141 were in China.

The Clop ransomware gang likes targeting FTP software: earlier this year it was behind the dumping online of radar blueprints stolen from Canadian aerospace manufacturer Bombardier. ®

Broader topics

Narrower topics

Other stories you might like

  • Ex-Qualcomm Snapdragon chief turns CEO at AI chip startup MemryX

    Meet the new boss

    A former executive leading Qualcomm's Snapdragon computing platforms has departed the company to become CEO at an AI chip startup.

    Keith Kressin will lead product commercialization for MemryX, which was founded in 2019 and makes memory-intensive AI chiplets.

    The company is now out of stealth mode and will soon commercially ship its AI chips to non-tech customers. The company was testing early generations of its chips with industries including auto and robotics.

    Continue reading
  • Aircraft can't land safely due to interference with upcoming 5G C-band broadband service

    Expect flight delays and diversions, US Federal Aviation Administation warns

    The new 5G C-band wireless broadband service expected to rollout on 5 January 2022 in the US will disrupt local radio signals and make it difficult for airplanes to land safely in harsh weather conditions, according to the Federal Aviation Administration.

    Pilots rely on radio altimeter readings to figure out when and where an aircraft should carry out a series of operations to prepare for touchdown. But the upcoming 5G C-band service beaming from cell towers threatens to interfere with these signals, the FAA warned in two reports.

    Flights may have to be delayed or restricted at certain airports as the new broadband service comes into effect next year. The change could affect some 6,834 airplanes and 1,828 helicopters. The cost to operators is expected to be $580,890.

    Continue reading
  • Canadian charged with running ransomware attack on US state of Alaska

    Cross-border op nabbed our man, boast cops and prosecutors

    A Canadian man is accused of masterminding ransomware attacks that caused "damage" to systems belonging to the US state of Alaska.

    A federal indictment against Matthew Philbert, 31, of Ottawa, was unsealed yesterday, and he was also concurrently charged by the Canadian authorities with a number of other criminal offences at the same time. US prosecutors [PDF] claimed he carried out "cyber related offences" – including a specific 2018 attack on a computer in Alaska.

    The Canadian Broadcasting Corporation reported that Philbert was charged after a 23 month investigation "that also involved the [Royal Canadian Mounted Police, federal enforcers], the FBI and Europol."

    Continue reading

Biting the hand that feeds IT © 1998–2021