A weak password in a certain middleware manufacturer led to RDP risks for enterprises

0 22
PrefaceRecently, the author published an article titled '700 government and ente...

Preface

Recently, the author published an article titled '700 government and enterprise office systems suspected of having RDP risks', which mentioned that multiple OA systems such as *Butterfly and *Friend are suspected of having vulnerabilities that can penetrate the internal network and obtain 3389 permissions. At that time, it was warned that it could lead to ransomware or data leakage, and it should be addressed promptly. Unexpectedly, just a few days later, it was reported that *Friend OA was hit by a large-scale ransomware attack...

Therefore, the author delved into the analysis of the commonalities existing in these OA systems, in an attempt to find the attack methods or approaches used by the attacker.

01 Determine the target of the attack

A weak password in a certain middleware manufacturer led to RDP risks for enterprises

Firstly, it is of course to find commonalities, aiming at the underlying development frameworks of these OA systems, but in vain, as they are not written in the same language nor share the same framework; later, the target was shifted to the systems installed with these OA systems, since the 3389 permission acquisition was mentioned, could it be an operating system vulnerability? But still, there was no result, as there were Windows 7, Windows Server 2003, 2008, etc., and no recent vulnerabilities were found that could directly lead to the penetration of 3389; the target moved to their suppliers, but again, they did not share the same supplier, some were self-developed, some were merged with other companies, and there were no commonalities.

The idea actually ends here. If readers have better ideas to detect the commonalities of multiple OA systems, they can leave a message below the article.

The author's method was to face the music again and send an email to the hacker to ask for a batch of test systems, of course, using a new email account to ask. In one of the system test screenshots sent by the hacker, the author saw a software icon that had never seen before.

640?wx_fmt.png

After investigation, it was found that this software belongs to 'Xi'an Ruiyou Information Technology Information Co., Ltd.', a virtualization and cloud computing solution provider, with the product name 'Ruiyou Tianyi'. Further investigation found that this software is bundled with multiple OA systems, including the products mentioned by the hacker such as *Dian, *You, as well as medical, financial, logistics, and many other industries.

640?wx_fmt.png

640?wx_fmt.png

The general use of the software is to map the 3389 port of the internal machine to the public network, convenient for employees not in the company to work remotely. The solution for the medical industry is as follows, and the rest is similar. Remote office employees only need to access the IP and port of Ruiyou Tianyi on the public network, enter the account and password, and they can directly log into the internal network machine of the company to work.

640?wx_fmt.png

This seems to be a very practical and convenient feature, but the harm can be very great, because the author found that there are weak password situations in Ruiyou Tianyi's client. This is consistent with the situation mentioned in the preface that hackers can take over the 3389 remote desktop. Hackers might have entered from here! It's not some high-end 0day, but the most ordinary weak password; it's not some OA system vulnerability, but the middleware used for management has a problem. This is a decoy of the hacker, always leading the author to OA vulnerabilities, but did not expect that it actually has little to do with OA. Even if OA is updated to the latest version, not updating the Ruiyou Tianyi client is of no help.

02 Speculation and verification of attack process

After confirming that the target of the hacker attack is likely Ruiyou Tianyi software, a preliminary analysis of this software was conducted, and a rule that could be filtered was sorted out. Similar websites of Ruiyou Tianyi exposed on the public network on fofa and zoomeye were filtered. It was found that there are nearly 120,000 historical data in Ruiyou Tianyi websites in China, and as many as 30,000 in the past year. Although many have changed IPs and are inaccessible, not all are systems with weak passwords. However, there are still a lot of systems with risks.

640?wx_fmt.png

Visiting a few randomly, you can see the pages of versions 5, 6, and 7 of Ruiyou Tianyi. Versions 5 and 6 are similar, while version 7 is the new version.

640?wx_fmt.png640?wx_fmt.png

For pages below version 7, clicking 'About' can see which company this system belongs to.

640?wx_fmt.png

After understanding which company this is, it was natural to try weak passwords in the login box. Since it was a manual test, only admin/admin and admin/123456 were tried. The following picture is the page after the password is correct.

640?wx_fmt.png640?wx_fmt.png

The author tested about 100 pages and found that 18 of them had weak password vulnerabilities such as admin/admin and admin/123456, while other weak password passwords were not attempted, accounting for 18%.

Click the icon of the OA system and find that it uses the RAP protocol javascript:openapp('RAP://xxxxxx'), not http or https protocol, which means it cannot be accessed further through the web. It is speculated that the client of RayoTianYi needs to be downloaded, and there is a download link for the client on the page. After successful download and opening, it is as follows, a small window.

640?wx_fmt.png

Fill in the IP and port just tested, and the username and password to log in, and enter the internal network machines of the company using that IP.

03 Analysis of Attack Steps

Since the hacker has provided a list of 490+ enterprises, it does not seem like it is copied one by one, as the cost of time for such attacks is too high. In the mentioned attack process, there is a step that can be viewed through 'About' to see the company name, and the hacker may have written a script through this interface to batch obtain company names and form a list. Therefore, the author speculates that the attacker's attack steps may be as follows:

1. Use the Internet of Things search engine to obtain the IP and port of the recently accessible RayoTianYi web server on the Internet.

2. Use tools to batch test the weak password login status of this batch of RayoTianYi login boxes, as there is no limit to the number of attempts, hackers can run a larger weak password dictionary, thus increasing the success rate of brute force attacks.

3. Record the websites that can be successfully logged in with weak passwords from the previous step, and use scripts to batch obtain the names of the companies or units corresponding to these websites, forming a list, which is the list that hackers post on dark web forums.

4. Download the RayoTianYi client for further attacks, penetrate the internal network, and perform data exfiltration or ransomware.

04 Postscript

Enterprises or departments using RayoTianYi should respond and prevent promptly, starting with changing weak passwords, updating to the latest version, or temporarily removing the device and using a more secure VPN for remote return to work.

Weak passwords have been a common topic of vulnerability, but they are still widely used for convenience, especially in some internal network systems. They believe that attackers cannot enter the internal network, so they can set passwords at will. However, they do not know that attackers can enter from elsewhere and horizontally penetrate, at which point, the harm of weak passwords will become very serious. The suggestions for weak password security prevention will not be elaborated here, as there are already many articles on the Internet that have explained it thoroughly. Here, I will share an article that can be read independently.

https://www.nington.com/blog-mfa/downloaddetail_113.shtml

A final announcement: Starting in October, this account will regularly update the attacker traceability topic, analyzing and decomposing from multiple perspectives that can trace attackers, such as IP tracing, metadata tracing (traffic, samples, logs, etc.), and tracing by attack methods. Please look forward to it!

你可能想看:

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Common attack methods used to conceal real IP addresses in network attacks and methods for tracing and tracing false IP addresses

Attackers of the SolarWinds Web Help Desk vulnerability can access stored passwords, and a PoC has been released.

Git leak && AWS AKSK && AWS Lambda cli && Function Information Leakage && JWT secret leak

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

最后修改时间:
admin
上一篇 2025年03月26日 16:46
下一篇 2025年03月26日 17:09

评论已关闭