• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Who is responsible for exploits of old unsupported software?

Allan Tan by Allan Tan
September 23, 2021
Photo by Tima Miroshnichenko from Pexels

Photo by Tima Miroshnichenko from Pexels

Why do software customers almost always seem to pay for the mistakes of vendors who profit from them?

When a software vendor stops support for an old product, is it washing its hands of responsibility for any unidentified exploits that somehow no one discovered while the product was still supported?

Case in point, Adobe ColdFusion is a commercial rapid web application development platform created by J.J. Allaire in 1994. It was originally intended to make it easier to connect HTML pages to a database. The current version is the 2021 release. If we try to mimic genealogy, the 2021 version is ColdFusion 14 using the old naming convention.

So, 14 versions on, and now we are told that there is an exploit on an 11-year-old version of Adobe ColdFusion (version 9) that allows the attacker to “take control of the ColdFusion server remotely, then execute ransomware known as Cring on the server, and against other machines on the target’s network.”

This is not its first exploit. According to CVE Details, Adobe ColdFusion has had 112 recorded security vulnerabilities over its lifetime with the first dating back to 10 October 2006. 

Cring Ransomware

In the report, “Cring Ransomware Exploits Ancient ColdFusion Server,” Sophos Research said the “target used the server to collect timesheet and accounting data for payroll and to host multiple virtual machines. The attackers breached the internet-facing server in minutes and executed the ransomware 79 hours later.”

Andrew Brandt, principal researcher at Sophos commented that devices running vulnerable, outdated software are low-hanging fruit for cyber attackers looking for an easy way into a target.

Cring ransomware isn’t new, but it’s uncommon.

“In the incident we researched, the target was a services company, and all it took to break in was one internet-facing machine running old, out-of-date and unpatched software. The surprising thing is that this server was in active daily use. Often the most vulnerable devices are inactive or ghost machines, either forgotten about or overlooked when it comes to patching and upgrades,” he explained.

“But, regardless of what the status is – in use or inactive – unpatched internet-facing servers or other devices are prime targets for cyber attackers scanning a company’s attack surface for vulnerable entry points.”

“This is a stark reminder that IT administrators benefit from having an accurate inventory of all their connected assets and cannot leave out-of-date critical business systems facing the public internet. If organisations have these devices anywhere on their network, they can be sure that cyber attackers will be attracted to them. Don’t make life easy for cybercriminals,” he concluded.

The attackers’ methodology

Sophos’ analysis shows that the attackers began by scanning the target’s website using automated tools and were able to break in within minutes once they identified that it was running the unpatched ColdFusion on a server.

The attackers used sophisticated techniques to conceal their files, inject code into memory, and cover their tracks by overwriting files with garbled data or deleting logs and other artefacts that threat hunters could use in an investigation.

The attackers were also able to disable security products because the tamper-protection functionality was switched off.

The attackers posted a ransom note that says they also exfiltrated data that is “ready to leak in case we cannot make a good deal.”

Recommendations

Sophos recommends the following best practices to help defend against Cring and other types of ransomware and related cyberattacks:

At a strategic level:

Deploy layered protection. As more ransomware attacks begin to involve extortion, backups remain necessary but insufficient. It is more important than ever to keep adversaries out in the first place or to detect them quickly before they cause harm. Use layered protection to block and detect attackers at as many points as possible across an estate

Combine human experts and anti-ransomware technology. The key to stopping ransomware is defence-in-depth that combines dedicated anti-ransomware technology and human-led threat hunting. Technology provides the scale and automation with an organization needs, while human experts are best able to detect the tell-tale tactics, techniques and procedures that indicate an attacker is attempting to get into the environment. If organisations don’t have the skills in house, they can enlist support from cybersecurity specialists

At a day-to-day tactical level:

Monitor and respond to alerts. Ensure the appropriate tools, processes, and resources (people) are available to monitor, investigate and respond to threats seen in the environment. Ransomware attackers often time their strike during off-peak hours, at weekends or during the holidays, on the assumption that few or no staff are watching

Set and enforce strong passwords. Strong passwords serve as one of the first lines of defence. Passwords should be unique or complex and never re-used. This is easier to accomplish with a password manager that can store staff credentials

Use Multi-Factor Authentication (MFA). Even strong passwords can be compromised. Any form of multifactor authentication is better than none for securing access to critical resources such as e-mail, remote management tools and network assets

Lockdown accessible services. Perform network scans from the outside and identify and lock down the ports commonly used by VNC, RDP, or other remote access tools. If a machine needs to be reachable using a remote management tool, put that tool behind a VPN or zero-trust network access solution that uses MFA as part of its login

Practice segmentation and zero-trust. Separate critical servers from each other and from workstations by putting them into separate VLANs as you work towards a zero-trust network model

Make offline backups of information and applications. Keep backups up to date, ensure their recoverability and keep a copy offline

Inventory your assets and accounts. Unknown, unprotected and unpatched devices in the network increase risk and create a situation where malicious activities could pass unnoticed. It is vital to have a current inventory of all connected compute instances. Use network scans, IaaS tools, and physical checks to locate and catalogue them, and install endpoint protection software on any machines that lack protection

Make sure security products are correctly configured. Under-protected systems and devices are vulnerable too. It is important that you ensure security solutions are configured properly and to check and, where necessary, validate and update security policies regularly. New security features are not always enabled automatically. Don’t disable tamper protection or create broad detection exclusions as doing so will make an attacker’s job easier

Audit Active Directory (AD). Conduct regular audits on all accounts in AD, ensuring that none have more access than is needed for their purpose. Disable accounts for departing employees as soon as they leave the company

Patch everything. Keep Windows and other operating systems and software up to date. This also means double-checking that patches have been installed correctly and are in place for critical systems like internet-facing machines or domain controllers. In the incident reported here, support for the server’s Adobe ColdFusion 9 software as well as the underpinning Windows 2008 operating system had been stopped by their respective vendors, which means they were no longer receiving software updates

Related:  5 tips for better security in 2023
Tags: Cring Ransomwareransomwareunsupported software
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams
  • Dropbox updates universal search and knowledge management product

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe