The Warlock ransomware group exploited unpatched Microsoft SharePoint servers to gain initial access and deploy ransomware across enterprise environments. The attack chain involved exploiting vulnerabilities, privilege escalation through Group Policy modification, credential theft using Mimikatz, lateral movement via SMB, and eventual ransomware deployment. Files were encrypted with a .x2anylock extension and data exfiltrated using RClone. The campaign targeted organizations globally across various industries. Warlock appears to be derived from leaked LockBit 3.0 code and employs sophisticated evasion techniques like DLL sideloading. The attack highlights the dangers of delayed patching and the importance of layered defenses. Author: AlienVault
Related Tags:
LockBit 3.0
CVE-2023-27532
Croatia
lateral movement
data exfiltration
DLL Sideloading
T1021.002
LockBit
T1567
Associated Indicators:
CF0DA7F6450F09C8958E253BD606B83AA80558F2
8B13118B378293B9DC891B57121113D0AEA3AC8A
0488509B4DBC16DCB6D5F531E3C8B9A59B69E522


