Not-so-SimpleHelp exploits enabling deployment of Sliver backdoor

Feb. 7, 2025, 8:22 a.m.

Description

A sophisticated breach was identified where threat actors exploited vulnerabilities in SimpleHelp's Remote Monitoring and Management client to infiltrate a network. The attack involved post-compromise tactics including network discovery, administrator account creation, and persistence establishment. The threat actor connected via a vulnerable RMM client, executed discovery commands, created a new admin account, and installed a Sliver backdoor. The backdoor was configured to connect to specific IP addresses. On the domain controller, a cloudflared tunnel was installed for potential further payload deployment. The attack's TTPs resembled those of the Akira Ransomware group. A previous incident involving SimpleHelp RMM exploitation was also confirmed. Organizations are urged to update their RMM clients and adopt robust cybersecurity solutions.

Date

  • Created: Feb. 7, 2025, 12:08 a.m.
  • Published: Feb. 7, 2025, 12:08 a.m.
  • Modified: Feb. 7, 2025, 8:22 a.m.

Indicators

  • 15f3e5b47894b953542d2fe2353786229da47af00c96dc1b41a8efe631364e49
  • 45.9.149.136
  • 45.9.148.136
  • 213.173.45.230
  • 194.76.227.171
  • 45.9.149.112

Additional Informations

  • Estonia
  • Netherlands
  • Russian Federation