A day without banks: incorrect configuration of the Jenkins server led to a collapse

Friend

Professional
Messages
2,653
Reaction score
850
Points
113
One mistake paralyzed India's financial system.

On August 1, a large-scale failure of bank payment systems occurred in India due to a ransomware attack on the service provider of some banks-C-Edge Technologies. The Juniper Networks team detailed the hacking process in their report.

C-Edge Technologies was vulnerable due to an incorrectly configured Jenkins server. It was the server that became the starting point of the attack, which allowed attackers to gain unauthorized access to the company's systems and implement a ransomware program. Behind the attack is the RansomEXX group, which has long been known for its attacks on businesses, government agencies, and banking organizations around the world.

The vulnerability that was used for the attack, CVE-2024-23897 (CVSS score: 9.8), allows an attacker to read arbitrary files in the Jenkins controller file system and execute malicious code without authentication.

With extensive knowledge of the Jenkins flaws, many security researchers have replicated certain attack scenarios and created working PoC exploits for the specified vulnerability, publishing them on GitHub.

The attack started when hackers sent a POST request to the Jenkins server, trying to execute a malicious command. The server processed the request, which gave attackers access to important information, including data about system users. Later it turned out that the problem was in one of the server's software parts, which incorrectly processed such requests, which allowed cybercriminals to bypass the protection and gain access to server commands. Subsequent execution of commands and output of results via Jenkins were performed using the Wireshark network analysis tool.

Juniper Networks specialists noted that the attack on C-Edge Technologies highlights the importance of regular updates and fixes for all software solutions used. In this case, the vulnerability in Jenkins could have been prevented by a timely update and proper configuration of the server. The incident also demonstrates the need for strict configuration management, especially in the case of critical systems such as Jenkins servers.

In addition, the incident highlights the need to adopt the Zero Trust model, which implies that no device or user should be trusted by default. Constant verification of all operations and users is the key to protecting against such threats.

Source
 
CISA Sounds the Alarm: Jenkins Critical Vulnerability Requires Urgent Action

Organizations must act quickly to prevent devastating cyberattacks.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Jenkins to its catalog of known exploitable vulnerabilities (KEVs) after it was exploited in ransomware attacks.

The vulnerability, registered under the CVSS code CVE-2024-23897 with a CVSS score of 9.8, affects the Jenkins CLI and is a path traversal issue that could lead to arbitrary code execution. The issue was first identified by security researchers at Sonar in January 2024 and fixed in Jenkins 2.442 and LTS 2.426.3 by disabling the command parser feature.

In March, Trend Micro reported that it had detected several attacks using this vulnerability originating in the Netherlands, Singapore, and Germany. The investigation also found that remote code execution exploits exploiting this vulnerability were actively distributed among cybercriminals.

In recent weeks, CloudSEK and Juniper Networks have published the results of their research showing that CVE-2024-23897 is actively used to attack BORN Group and Brontoo Technology Solutions. Behind the attacks, according to researchers, are cybercriminals IntelBroker and RansomExx, which specialize in ransomware.

CloudSEK also clarified that CVE-2024-23897 is a local file inclusion (LFI) vulnerability that allows attackers to read arbitrary files on the Jenkins server. This vulnerability occurs due to insufficient input validation, which allows attackers to manipulate certain parameters and force the server to access sensitive files.

Given the active exploitation of this vulnerability, US federal agencies have been instructed to install updates and protect their networks from potential threats by September 9, 2024.
 
Top