{"id":417,"date":"2024-04-17T21:12:52","date_gmt":"2024-04-17T21:12:52","guid":{"rendered":"https:\/\/amaru.co.nz\/fj\/?post_type=threat-intelligence&p=417"},"modified":"2024-04-23T16:18:57","modified_gmt":"2024-04-23T16:18:57","slug":"security-advisory-critical-vulnerability-being-exploited-in-screenconnect","status":"publish","type":"threat-intelligence","link":"https:\/\/amaru.co.nz\/fj\/blog\/threat-intelligence\/security-advisory-critical-vulnerability-being-exploited-in-screenconnect\/","title":{"rendered":"[Security Advisory]\u202f Critical Vulnerability Being Exploited In ScreenConnect"},"content":{"rendered":"
\/\/ Overview\u202f<\/strong><\/p>\n On February 19th, 2024, ConnectWise released a security advisory for its remote monitoring and management (RMM) software. The advisory highlighted two vulnerabilities that impact older versions of \u00a0ScreenConnect and have been\u00a0mitigated in version 23.9.8 and later<\/strong>.<\/p>\n Cloud hosted implementations of ScreenConnect, including screenconnect.com and hostedrmm.com, have already received updates to address these vulnerabilities. Self-hosted (on-premise) instances remain at risk until they are manually upgraded. The ShadowServer project has identified over 3800 vulnerable instances of ScreenConnect or approximately 93 percent of the internet exposed install base.<\/p>\n On February 21st, security researchers at watchTowr Labs released a proof of concept (PoC) on GitHub that exploits these vulnerabilities and adds a new user to the compromised system. ConnectWise has also updated their initial report to include observed active exploitation in the wild of these vulnerabilities.<\/p>\n \u202f\/\/ What Amaru MDR (Managed Detection Response) is doing\u202f<\/strong><\/p>\n Amaru MDR is actively tracking the ongoing developments with these ScreenConnect vulnerabilities and their exploitation. The following MDR detection rules were previously implemented to identify malicious abuse of ScreenConnect:<\/p>\n We are continuing to ensure detection coverage, initiating an enterprise-wide threat hunt, and our MDR analysts will promptly reach out if any activity is observed. Additionally, Amaru has deployed the following prevention rule,\u00a0ATK\/SCBypass-A<\/strong>, and is testing a similar network-based (IPS) detection rule.<\/p>\n \u00a0\/\/ What you should do<\/strong><\/p>\n \/\/ References\u202f<\/strong><\/p>\n Vendor Sources<\/p>\n Government Sources<\/p>\n Third Party Sources<\/p>\n\n
\n
\n
\n
\n
\n
\n
\n
\n