{"id":2825,"date":"2021-08-12T22:26:03","date_gmt":"2021-08-12T16:56:03","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=2825"},"modified":"2021-08-12T22:26:05","modified_gmt":"2021-08-12T16:56:05","slug":"ransomware-group-utilizes-printnightmare-to-hijack-windows-server","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/","title":{"rendered":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">A Ransomware gang has added PrintNightmare exploits to their arsenal and is targeting Windows servers to set up Magniber ransomware payloads. PrintNightmare is a class of security vulnerabilities (tracked as CVE-2021-1675, CVE-2021-34527, and CVE-2021-36) impacting the Windows Print Spooler service, Windows Print Drivers, and the Windows Point and Print feature.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The organization has also posted a security advisory on Wednesday facilitating a workaround for CVE-2021-36958 (a zero-day bug allowing privilege escalation, with no patch available). Threat actors can use these security bugs in local privilege escalation (LPE) or distribute Trojan as Windows domain admin through remote code execution (RCE) with SYSTEM privileges.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>How is Ransomware Actively Exploit using PrintNightmare?<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">As our security researchers founded last month, the Magniber ransomware group is now utilizing PrintNightmare exploits for these exact purposes in attacks against South Korean victims. On the 13th of July, CrowdStrike successfully analyzed and bypass trials at exploiting the PrintNightmare vulnerability, securing customers before any encoded take place, \u201csaid Liviu Arsene, Crowdstrike\u2019s Director of Threat Research and Reporting.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">After negotiating servers unpatched against PrintNightmare, Magniber drops an obfuscated DLL loader, which gets first inserted into a process and later unpacked to execute local file traversal and encode files on the negotiated device.&nbsp; &nbsp;&nbsp;<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">In February 2021, Crowdstrike monitor Magniber was being transmitted through Magnitude EK onto South Korean devices launching Internet Explorer unpatched against the CVE-2020-0968 vulnerability.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Magniber ransomware has been actively exploited since October 2017, when it was being deployed through malvertising using the Magnitude Exploit Kit (EK) as the successor of Cerber ransomware. While it startlingly focused on South Korean victims, the Magniber group soon expanded its operations across the world, switching targets to other countries, including China, Taiwan, Hong Kong, Singapore, Malaysia, and more.&nbsp;&nbsp;<strong>&nbsp;<\/strong><\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"309\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1-1024x309.png\" alt=\"Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1\" class=\"wp-image-2828\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1-1024x309.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1-300x91.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1-768x232.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1-1536x464.png 1536w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-image1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">Magniber has been suspiciously active during the last 30 days, with almost 600 submissions on the ID Ransomware platform.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\"><strong>All Attacker Gang Expected to Implement PrintNightmare to their Operations<\/strong><\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">At the time we only have clue that the Magniber ransomware group is utilizing the PrintNightmware exploits in the wild to target all the probable victims. However, other threat actors (including ransomware groups) will likely join in only if they haven&#8217;t already, seeing that there are other reports of in-the-wild PrintNightmare exploitation that have surfaced since the vulnerability was reported and proof-of-concept exploits were leaked.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">&#8220;CrowdStrike majors that the PrintNightmare vulnerability merged with the setup of ransomware will likely continue to be exploited by other threat actors,&#8221; Arsene concluded.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">To defend against attacks that might target any user\u2019s network, you are highly suggested to implement any available patches as soon as possible and implement workarounds facilitate by Microsoft to remove the attack aspects if a security update is not yet available.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">On July 13, CISA issued an emergency directive ordering federal agencies to mitigate the actively exploited PrintNightmare vulnerability on their networks. The cybersecurity agency also published a PrintNightmare alert on July 1st, encouraging security professionals to disable the Windows Print Spooler service on all systems not used for printing.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Ransomware gang has added PrintNightmare exploits to their arsenal and is targeting Windows servers to set up Magniber ransomware payloads. PrintNightmare is a class of security vulnerabilities (tracked as CVE-2021-1675, CVE-2021-34527, and CVE-2021-36) impacting the Windows Print Spooler service, Windows Print Drivers, and the Windows Point and Print feature. The organization has also posted [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2827,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"A Ransomware gang has added PrintNightmare exploits to their arsenal and is targeting Windows servers to set up Magniber ransomware payloads. PrintNightmare is a class of security vulnerabilities (tracked as CVE-2021-1675, CVE-2021-34527, and CVE-2021-36) impacting the Windows Print Spooler service, Windows Print Drivers, and the Windows Point and Print feature. The organization has also posted [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-12T16:56:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-12T16:56:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server\",\"datePublished\":\"2021-08-12T16:56:03+00:00\",\"dateModified\":\"2021-08-12T16:56:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\"},\"wordCount\":511,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\",\"url\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\",\"name\":\"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-08-12T16:56:03+00:00\",\"dateModified\":\"2021-08-12T16:56:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited","og_description":"A Ransomware gang has added PrintNightmare exploits to their arsenal and is targeting Windows servers to set up Magniber ransomware payloads. PrintNightmare is a class of security vulnerabilities (tracked as CVE-2021-1675, CVE-2021-34527, and CVE-2021-36) impacting the Windows Print Spooler service, Windows Print Drivers, and the Windows Point and Print feature. The organization has also posted [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-08-12T16:56:03+00:00","article_modified_time":"2021-08-12T16:56:05+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/08\/Ransomware-Group-Utilizes-PrintNightmare-to-Hijack-Widows-Server-featured-image.jpg","type":"image\/jpeg"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server","datePublished":"2021-08-12T16:56:03+00:00","dateModified":"2021-08-12T16:56:05+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/"},"wordCount":511,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/","url":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/","name":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-08-12T16:56:03+00:00","dateModified":"2021-08-12T16:56:05+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/ransomware-group-utilizes-printnightmare-to-hijack-windows-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware Group Utilizes PrintNightmare to Hijack Windows Server"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2825"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=2825"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions"}],"predecessor-version":[{"id":2829,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/2825\/revisions\/2829"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/2827"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=2825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=2825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=2825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}