Stor-a-File Affected by Ransomware via SolarWinds Serv-U • The Register

Stor-a-File, a UK data capture and storage company, suffered a ransomware attack in August that exploited an unpatched instance of SolarWinds’ Serv-U FTP software.

The company informed its customers of the September attack and told them The register that he refused to pay. We understand that some data has been disclosed by ransomware criminals on a Tor blog.

At least one of Stor-a-File’s clients is a medical company, one of whose clients has contacted El Reg Last week.

“The medical company (which I won’t name now as they are assessing damages, liability, etc.) used Stor-a-File to scan paper documents, including medical records,” said declared our reader. we.

In a statement, Stor-a-File said: “The incident happened in September. The ICO and police were contacted as soon as we learned what had happened. Our customers were notified a once it has been determined that their data may have been compromised. “

Reg readers complained to us about the long delay between the ransomware attack and the notification that their data was trapped there. Some also said they were told the attack took place in August.

“Based on our investigations,” the Stor-a-File statement continued, “the incident is limited to the small number of records we hold electronically. All persons whose data may have been affected have been contacted. The millions of records of companies and organizations, physically held in the boxes on the shelves of our warehouses have not been affected.

We understand that the attack vector was an obsolete version of SolarWinds’ Serv-U FTP server software. Although we don’t know the exact version of Stor-a-File, Microsoft said in July that it found a critical vulnerability in version 15.2.3 HF1 and earlier.

“We have now removed all third-party software from our secure system to prevent similar issues in the future,” Stor-a-File said.

A deleted page from the Stor-a-File website title “NHS Scanning” was giving 404s when we visited it at the time of writing. A snapshot checked in on the Internet Archive shows that Stor-a-File has provided “document conversion services to the NHS for over thirty-five years and through over forty trusts”. (There were around 200 NHS trusts across the country in 2019.)

We asked NHS Digital to tell us if NHS patient data was affected by the breach, and we were directed to the NCSC. Stor-a-File has assured us that it is not.

The health records processed by Stor-a-File included records from HIV and genitourinary clinics, finance department records and invoices, oncology and HR records “and many more” to quote l company itself.

Serv-U what now?

Tracked as CVE-2021-35211, the Serv-U vuln allowed an attacker to execute code remotely via what Microsoft described as a return-oriented programming attack, as we reported at the time.

British infosec company NCC Group said in a information note that he had seen “multiple” instances of the Clop ransomware gang abuse the Serv-U vuln – pointing out that it was not the China-based threat group Microsoft reported as the sole exploiter of the vuln in July.

“The first indicator of compromise for the exploitation of this vulnerability are suspicious entries in a Serv-U log file named DebugSocketlog.txt. This log file is usually located in the Serv-U installation folder. Looking at this log file, it contains exceptions at the time of operation of CVE-2021-35211, ”NCC Group said. The company also recommended checking for suspicious PowerShell command executions; full details are available at the link above.

NCC Group added that in October, “three months after SolarWinds released its patch,” it could still find 2,784 vulnerable Serv-U instances accessible from the public Internet. Of these, 27 were in the UK – while 1,141 were in China.

The Clop ransomware gang likes to target FTP software: earlier this year, it was behind the uploading of stolen radar blueprints from Canadian aerospace manufacturer Bombardier. ®

Previous The main reason for applying for social security at 70
Next Cash App Borrow: Cash App's new lending feature