{"id":38980,"date":"2021-03-10T16:41:27","date_gmt":"2021-03-10T21:41:27","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38980"},"modified":"2021-03-10T16:41:27","modified_gmt":"2021-03-10T21:41:27","slug":"accellion-fta-data-leaks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/accellion-fta-data-leaks\/38980\/","title":{"rendered":"When stolen materials are published online"},"content":{"rendered":"<p>Late last year, information surfaced online about attacks on companies using the outdated Accellion File Transfer Appliance (FTA). Some cybercriminals used Accellion FTA vulnerabilities to snatch confidential data, using the threat of publication to extort ransom from the victims. We are not pleased to report that they were true to their word.<\/p>\n<h2>What\u2019s the vulnerability?<\/h2>\n<p>The Accellion FTA is an network appliance companies deploy for quick and easy delivery of large files.\u00a0 Twenty years old, the solution is due to be retired this year, and developers have long called for a migration to more modern products.<\/p>\n<p>In December 2020, the discovery of two vulnerabilities \u2014 <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27101\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2021-27101<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27102\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2021-27102<\/a> \u2014 in the solution enabled attackers to gain access to files uploaded to FTA devices. The vulnerabilities were closed, but January 2021 saw two more (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27103\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2021-27103<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27104\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2021-27104<\/a>) uncovered and <a href=\"https:\/\/www.accellion.com\/sites\/default\/files\/trust-center\/accellion-fta-attack-timeline.png\" target=\"_blank\" rel=\"nofollow noopener\">patched<\/a>.<\/p>\n<p>Nonetheless, intruders managed to steal the data of several Accellion FTA users. Several high-profile <a href=\"https:\/\/www.zdnet.com\/article\/airplane-maker-bombardier-data-posted-on-ransomware-leak-site-following-fta-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">press reports<\/a> about the <a href=\"https:\/\/www.securityweek.com\/qualys-confirms-unauthorized-access-data-accellion-hack\" target=\"_blank\" rel=\"nofollow noopener\">leaks<\/a> followed. Apparently, not all of the victims agreed to pay the ransom, so the attackers carried out their threat to share the data they\u2019d stolen.<\/p>\n<h2>How cybercriminals publish data<\/h2>\n<p>Recently, we registered mass e-mails aimed at compromising victims\u2019 reputations in the eyes of employees, clients, and partners, as well as compet itors. The extent of the mailings and the sources of the addresses are not known for sure, but it seems the cybercriminals were trying to reach as many viewers as they could.<\/p>\n<div id=\"attachment_38982\" style=\"width: 1893px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/10144432\/accellion-fta-data-leaks-letter.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38982\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/10144432\/accellion-fta-data-leaks-letter.png\" alt=\"The attackers' e-mail to employees, clients, partners, and competitors.\" width=\"1883\" height=\"479\" class=\"size-full wp-image-38982\"><\/a><p id=\"caption-attachment-38982\" class=\"wp-caption-text\">The attackers\u2019 e-mail to employees, clients, partners, and competitors.<\/p><\/div>\n<p>The messages urged recipients to use the Tor browser to visit a .onion site, and they claimed the website got tens of thousands of hits per day. Among the purported visitors: all kinds of hackers and journalists able to cause even greater damage to a company\u2019s infrastructure and reputation. Interestingly, the site belongs to the CL0P group, which specializes in ransomware, although in the attacks through the Accellion FTA vulnerabilities, the files were not encrypted. The hackers, it seems, took advantage of this convenient platform.<\/p>\n<p>Of course, the aim is to intimidate other victims. Incidentally, both the e-mail and website contain details for contacting the attackers so as to get the published files removed, although there is little point once the information is out there.<\/p>\n<p>It is also worth noting that the site features an ad offering lessons for administrators on closing the vulnerabilities through which data was stolen \u2014 for $250,000 in bitcoin.<\/p>\n<div id=\"attachment_38981\" style=\"width: 697px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/10144353\/accellion-fta-data-leaks-help.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-38981\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2021\/03\/10144353\/accellion-fta-data-leaks-help.jpg\" alt=\"Offer to help potential victims avoid the same fate.\" width=\"687\" height=\"202\" class=\"size-full wp-image-38981\"><\/a><p id=\"caption-attachment-38981\" class=\"wp-caption-text\">Offer to help potential victims avoid the same fate.<\/p><\/div>\n<p>We rather doubt anyone will bite. For starters, the developers have already released updated versions of Accellion FTA, and anyway, asking for help is tantamount to admitting that you can\u2019t close the vulnerability and it\u2019s still exploitable.<\/p>\n<h2>How to protect your company against such attacks<\/h2>\n<p>First, update Accellion FTA \u2014 or better, stop using the solution altogether (even the developers advise that).<\/p>\n<p>Second, update all software products and services that have access to the Internet. It\u2019s important to do that right away but also to ensure ongoing, timely updates.<\/p>\n<p>In addition, protect every device \u2014 be it a workstation, server, or hardware\/software solution \u2014 with a modern <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">security product<\/a> that can detect attempts to exploit vulnerabilities, including unknown ones.<\/p>\n<p>For anyone who has fallen victim to extortionists, we do not recommend paying. Eugene Kaspersky\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/to-pay-or-not-to-pay\/38946\/\" target=\"_blank\" rel=\"noopener nofollow\">recent post<\/a> offers an in-depth explanation.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.<\/p>\n","protected":false},"author":2598,"featured_media":38983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[961,468,268],"class_list":{"0":"post-38980","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-leaks","10":"tag-reputation","11":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/accellion-fta-data-leaks\/38980\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/accellion-fta-data-leaks\/22594\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/accellion-fta-data-leaks\/18087\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/accellion-fta-data-leaks\/24325\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/accellion-fta-data-leaks\/22392\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/accellion-fta-data-leaks\/21326\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/accellion-fta-data-leaks\/24887\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/accellion-fta-data-leaks\/24142\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/accellion-fta-data-leaks\/30247\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/accellion-fta-data-leaks\/9421\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/accellion-fta-data-leaks\/17127\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/accellion-fta-data-leaks\/14559\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/accellion-fta-data-leaks\/26352\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/accellion-fta-data-leaks\/30189\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/accellion-fta-data-leaks\/26778\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/accellion-fta-data-leaks\/23635\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/accellion-fta-data-leaks\/28974\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/leaks\/","name":"leaks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38980"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38980\/revisions"}],"predecessor-version":[{"id":38985,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38980\/revisions\/38985"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38983"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}