Cyberattacks on SimpleHelp RMM observed

Attackers abuse vulnerabilities in SimepleHelp RMM to compromise networks. Updates are available.

listen Print view
A criminal attacks computers and controls them remotely

(Image: Erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

Criminals are abusing vulnerabilities in the SimpleHelp RMM remote maintenance software to penetrate PCs and networks. IT security researchers have observed a campaign in which devices were initially attacked through these vulnerabilities.

In a blog post, Arctic Wolf employees write that just under a week before the discovery of this campaign, IT researchers from Horizon3.ai discovered three security vulnerabilities in SimpleHelp RMM and published information about them. There are three security vulnerabilities. The most serious one allows privilege escalation from low privileged technician access to server admin (CVE-2024-57726, CVSS 9.9, risk"critical").

In addition, attackers can download arbitrary files from the SimpleHelp server without prior login, which Horizon3.ai classifies as the worst vulnerability of the vulnerability trio, but the CVSS rating does not reflect this (CVE-2024-57727, CVSS 7.5, high). The third vulnerability allows files to be uploaded to arbitrary locations on the SimpleHelp server, provided admin access (e.g. as SimpleHelpAdmin or technician with admin rights) is possible. On Linux, malicious actors can remotely execute commands by uploading a crontab file (CVE-2024-57728, CVSS 7.2, high).

Videos by heise

SimpleHelp RMM versions 5.3.9, 5.4.10 and 5.5.8 patch these vulnerabilities. IT managers should update as soon as possible if they have not already done so.

In the breach that Arctic Wolf analyzed, SimpleHelp's "Remote Access.exe" was already running due to a third-party support session that had previously taken place. The first sign of compromise was communication with an unauthorized SimpleHelp server instance. In the SimpleHelp session, the attackers opened a command line ("cmd.exe") and queried accounts and domain information with "net" and "nltest", for example – Tools that Windows comes with by default and are also useful servants for attackers (Living of the Land, Lotl). However, the attackers' targets remain unknown as the session was terminated before they could advance their attack.

Artic Wolf recommends uninstalling the SimpleHelp client software for ad hoc support purposes, changing passwords on SimpleHelp servers and restricting access to trusted IPs, and of course installing the security updates provided.

Please also read:

Topic page on cyber attacks on heise online

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.