Not-so-SimpleHelp exploits enabling deployment of Sliver backdoor
Feb. 7, 2025, 8:22 a.m.
Description
A sophisticated breach was identified where threat actors exploited vulnerabilities in SimpleHelp's Remote Monitoring and Management client to infiltrate a network. The attack involved post-compromise tactics including network discovery, administrator account creation, and persistence establishment. The threat actor connected via a vulnerable RMM client, executed discovery commands, created a new admin account, and installed a Sliver backdoor. The backdoor was configured to connect to specific IP addresses. On the domain controller, a cloudflared tunnel was installed for potential further payload deployment. The attack's TTPs resembled those of the Akira Ransomware group. A previous incident involving SimpleHelp RMM exploitation was also confirmed. Organizations are urged to update their RMM clients and adopt robust cybersecurity solutions.
Tags
Date
- Created: Feb. 7, 2025, 12:08 a.m.
- Published: Feb. 7, 2025, 12:08 a.m.
- Modified: Feb. 7, 2025, 8:22 a.m.
Indicators
- 15f3e5b47894b953542d2fe2353786229da47af00c96dc1b41a8efe631364e49
- 45.9.149.136
- 45.9.148.136
- 213.173.45.230
- 194.76.227.171
- 45.9.149.112
Additional Informations
- Estonia
- Netherlands
- Russian Federation