search1 bars

Insights

A SOC case file –

RansomHub exploits FortiGate bug in attack blocked by XDR

Aura’s Managed XDR security partner, Barracuda, has recently contained a determined and complex attack by a ransomware gang. The attackers had been trying to find a way into a manufacturing company’s network since December 2024 and finally succeeded by exploiting an exposed firewall vulnerability.

Incident summary

How the attack unfolded

Initial access

The main attack

RansomHub is a relatively new but prolific ransomware-as-a-service (RaaS) platform. By the end of 2024 it had become the leading ransomware group. Its success is due in part to its favourable payment structure, where affiliates get to keep 90% of the ransoms secured. RansomHub is a good example of the evolving ecosystem for ransomware, where sophisticated attack methods, the sharing and reusing tools and resources, and cybercriminal partnerships combine to make the threat highly adaptive and difficult to combat. 

Between January 30 and February 13, a user by the name of “Zero” added two new users, “Super Admin” and “Admin” to the target’s FortiGate firewall.

On Friday, February 14, Barracuda Managed XDR detected new SSL-VPN logins coming in from both Sweden and Chicago.

Not long after this, the attackers started editing the target’s firewall policies, VPN settings, local user profiles, and API integrations with XDR to gain full control of the victim’s environment.

On Sunday, February 16, the attackers deleted other user accounts and removed firewall rules designed to block traffic from certain locations. This erased any trace of the attackers’ activity and locked the victim out of their own network.

Barracuda Managed XDR also saw that the tool PSExec had been installed on the domain controller and backup servers, probably to enable remote code execution and lateral movement.

The attackers then tried to deploy RansomHub ransomware across six servers using multiple executables via remote execution. Barracuda Managed XDR immediately detected this activity, quarantined the servers, and contacted the customer.

Restore and recover

The main tools and techniques used in the attack

Tools and tactics used in a RansomHub attack

Indicators of Compromise detected in this attack:

The executables used by the attackers were:

IP addresses used by the threat actor:

Key learnings  

This incident illustrates how attackers will take different approaches to gaining access to a target, and an unmitigated high-severity vulnerability leaves an organisation extremely exposed.

The best protection against such attacks is comprehensive, layered defences with integrated and extended visibility. A robust focus should accompany this on cybersecurity basics.  For example:

Barracuda Managed XDR features like threat intelligence, Automated Threat Response, and the integration of wider solutions such as XDR Server Security, XDR Network Security and XDR Cloud Security provide comprehensive protection and can drastically reduce dwell time.

How Aura can help

By partnering with Barracuda, Aura Technology offers a Managed IT service that includes Extended Detection and Response (XDR) as standard protection against breaches. If your organisation lacks XDR protection, please reach out to us. We can evaluate your risk and assist you in strengthening your defences throughout your business.

Get in touch today.

Credit: Case study provided by Barracuda Managed XDR SOC Team