Security Market Segment LS
Thursday, 08 April 2021 11:31

New Windows ransomware Cring attacks Fortigate VPN servers

New Windows ransomware Cring attacks Fortigate VPN servers Pixabay

A relatively new strain of Windows ransomware known as Cring has been noticed attacking Fortigate VPN servers using a vulnerability which has the reference CVE-2018-13379.

Vyacheslav Kopeytsev, a senior security researcher at global security firm Kaspersky's Industrial Control Systems Computer Emergency Response Team, said in a blog post that threat actors had conducted attacks using Cring in the first quarter of this year, but at that stage it was unclear as to what the infection vector was.

However, the firm discovered that the Fortigate VPN servers were the point of entry, Kopeytsev said.

cring ransom note

The ransom note left by the Cring ransomware. Courtesy Kaspersky ICS CERT

"Fortigate devices are vulnerable to a directory traversal attack, which allows an attacker to access system files on the Fortigate SSL VPN appliance," he wrote.

"Specifically, an unauthenticated attacker can connect to the appliance through the Internet and remotely access the file 'sslvpn_websession', which contains the username and password stored in cleartext."

A number of days before the actual attack, the attackers tested out connections to the VPN Gateway, possibly to check that the software version on the device was vulnerable.


Either a scan of IP addresses or the use of a ready-made list containing IP addresses of vulnerable Fortigate VPN Gateway devices could have been used to identify the vulnerable entry point, Kopeytsev said, adding, "In autumn 2020, an offer to buy a database of such devices appeared on a dark web forum."

The attackers used a PowerShell script to decrypt their payload: the Cobalt Strike Beacon backdoor which gave them remote control of the infected system.

After that, the Cring ransomware was downloaded and after encryption, it dropped a ransom note.

Kopeytsev offered the following tips to avoid falling victim to this attack:

  • Update the software of the SSL VPN Gateway to the latest versions;
  • Update anti-malware solutions to the latest versions;
  • Always keep anti-malware databases updated to the latest versions;
  • Make sure that all modules of anti-malware solutions are always enabled;
  • Change the active directory policy: allow users to log in only to those systems which are required by their operational needs;
  • Restrict VPN access between facilities, close all ports that are not required by operational needs;
  • Configure the back-up system to store back-up copies on a dedicated server;
  • Store at least three back-up copies for each critical system;
  • Store at least one back-up copy of each server on a dedicated, standalone storage medium, such as a hard drive; and
  • Verify the integrity of back-up copies on a regular basis.
Read 1924 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Hybrid cloud promises to bring together the best of both worlds enabling businesses to combine the scalability and cost-effectiveness of the cloud with the performance and control that you can get from your on-premise infrastructure.

Reducing WAN latency is one of the biggest issues with hybrid cloud performance. Taking advantage of compression and data deduplication can reduce your network latency.

Research firm, Markets and Markets, predicted that the hybrid cloud market size is expected to grow from US$38.27 billion in 2017 to US$97.64 billion by 2023.

Colocation facilities provide many of the benefits of having your servers in the cloud while still maintaining physical control of your systems.

Cloud adjacency provided by colocation facilities can enable you to leverage their low latency high bandwidth connections to the cloud as well as providing a solid connection back to your on-premises corporate network.

Download this white paper to find out what you need to know about enabling the hybrid cloud in your organisation.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News