A critical vulnerability (CVE-2023-27532) in Veeam Backup & Replication software is being actively exploited by a new ransomware group known as FRAG. This flaw allows unauthorized attackers to access backup infrastructure and steal sensitive data, which can lead to double extortion tactics. The FRAG ransomware gang has been observed leveraging this flaw to gain initial access to networks before encrypting data and demanding ransom payments.
Key points include:
- The vulnerability enables access by exposing credential information in plaintext.
- Attackers use this as a foothold to compromise the broader infrastructure.
- Users are strongly urged to patch Veeam installations to prevent exploitation.
The post highlights the importance of updating security measures to defend against such targeted ransomware campaigns.
Would you like more technical details on the vulnerability or defensive steps?
InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot