Darktrace documented exploitation of ConnectWise ScreenConnect vulnerabilities CVE-2024-1708 and CVE-2024-1709 across multiple customer networks in early 2024, highlighting post-exploitation activity and detections around ScreenConnect usage and external connections. The post also describes how Darktrace DETECT and RESPOND helped identify, contain, and quarantine the activity, including autonomous response and pattern-of-life enforcement. hashtag: #ScreenConnect #CVE-2024-1708 #CVE-2024-1709 #Darktrace #LabTechAgent #AnyDesk #Pakistan
Keypoints
- Two publicly disclosed vulnerabilities in ScreenConnect (CVE-2024-1708 and CVE-2024-1709) enable authentication bypass and potential remote access to confidential information or critical systems.
- Darktrace observed exploitation activity across multiple customer environments between January and March 2024, with indicators of compromise (IoCs) aligning to ScreenConnect usage patterns.
- Attackers could create new administrative accounts on exposed instances, enabling privilege escalation, backdoors, and disruption of RMM processes, potentially leading to ransomware deployment.
- Detected activity included connections to screenconnect[.]com, usage of the LabTech Agent user agent, and external connections to IPs such as 108.61.210.72 and 185.62.58.132, among others.
- In at least one case, threat actors downloaded an AnyDesk installer from 116.0.56.101, illustrating post-exploitation lateral movement and tool delivery.
- Darktraceβs autonomous RESPOND mode blocked suspicious endpoints, quarantined devices, and enforced a pattern-of-life to limit outbound and lateral movement.
MITRE Techniques
- [T1190] Exploit Public-Facing Application β INITIAL ACCESS β Exploitation of Public-Facing Application β INITIAL ACCESS β T1190 β NA β βExploit Public-Facing Application β INITIAL ACCESS β T1190β
- [T1189] Drive-by Compromise β INITIAL ACCESS β Drive-by Compromise β INITIAL ACCESS β T1189 β NA β βDrive-by Compromise β INITIAL ACCESS β T1189 β NAβ
- [T1210] Exploitation of Remote Services β LATERAL MOVEMENT β Exploitation of Remote Services β LATERAL MOVEMENT β T1210 β NA β βExploitation of Remote Services β LATERAL MOVEMENT β T1210 β NAβ
- [T1105] Ingress Tool Transfer β COMMAND AND CONTROL β Ingress Tool Transfer β COMMAND AND CONTROL β T1105 β NA β βIngress Tool Transfer β COMMAND AND CONTROL β T1105 β NAβ
- [T1588.001] Resource Development β MALWARE β RESOURCE DEVELOPMENT β T1588.001 β T1588 β βMalware β RESOURCE DEVELOPMENT β T1588.001- T1588β
- [T1059.001] PowerShell β EXECUTION β PowerShell β EXECUTION β T1059.001 β T1059 β βPowerShell β EXECUTION β T1059.001 β T1059β
- [T1550.002] Pass the Hash β DEFENSE EVASION, LATERAL MOVEMENT β Pass the Hash β DEFENSE EVASION, LATERAL MOVEMENT β T1550.002 β T1550 β βPass the Hash β DEFENSE EVASION, LATERAL MOVEMENT β T1550.002 β T1550β
- [T1078] Valid Accounts β DEFENSE EVASION, PERSISTENCE, PRIVILEGE ESCALATION, INITIAL ACCESS β Valid Accounts β DEFENSE EVASION, PERSISTENCE, PRIVILEGE ESCALATION, INITIAL ACCESS β T1078 β NA β βValid Accounts β DEFENSE EVASION, PERSISTENCE, PRIVILEGE ESCALATION, INITIAL ACCESS β T1078 β NAβ
- [T1185] Man-in-the-Browser β COLLECTION β Man in the Browser β COLLECTION β T1185 β NA β βMan in the Browser β COLLECTION β T1185 β NAβ
- [T1041] Exfiltration Over C2 Channel β EXFILTRATION β Exfiltration Over C2 Channel β EXFILTRATION β T1041 β NA β βExfiltration Over C2 Channel β EXFILTRATION β T1041β
- [T1590.005] IP Addresses in Reconnaissance β RECONNAISSANCE β IP Addresses β RECONNAISSANCE β T1590.005 β T1590 β βIP Addresses β RECONNAISSANCE β T1590.005 β T1590β
- [T1219] Remote Access Software β COMMAND AND CONTROL β Remote Access Software β COMMAND AND CONTROL β T1219 β NA β βRemote Access Software β COMMAND AND CONTROL β T1219 β NAβ
- [T1570] Lateral Tool Transfer β LATERAL MOVEMENT β Lateral Tool Transfer β LATERAL MOVEMENT β T1570 β NA β βLateral Tool Transfer β LATERAL MOVEMENT β T1570β
- [T1071] Application Layer Protocol β COMMAND AND CONTROL β Application Layer Protocol β COMMAND AND CONTROL β T1071 β NA β βApplication Layer Protocol β COMMAND AND CONTROL β T1071 β NAβ
Indicators of Compromise
- [IOC Type] IP Addresses β example1: 108.61.210.72, example2: 185.62.58.132, and other 1 items (if applicable)
- [IOC Type] Domain β screenconnect.com (screenconnect[.]com in content)
- [IOC Type] URI β /MyUserName_DEVICEHOSTNAME, /images/Distribution.exe
- [IOC Type] User Agent β LabTech Agent
- [IOC Type] File Hash β 24780657328783ef50ae0964b23288e68841a421 (SHA1), a21768190f3b9feae33aaef660cb7a83 (MD5)