{"id":90173,"date":"2019-11-07T13:05:30","date_gmt":"2019-11-07T21:05:30","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90173"},"modified":"2023-05-15T23:06:21","modified_gmt":"2023-05-16T06:06:21","slug":"the-new-cve-2019-0708-rdp-exploit-attacks-explained","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/11\/07\/the-new-cve-2019-0708-rdp-exploit-attacks-explained\/","title":{"rendered":"Microsoft works with researchers to detect and protect against new RDP exploits"},"content":{"rendered":"
On November 2, 2019, security researcher Kevin Beaumont<\/a> reported that his BlueKeep<\/a> honeypot experienced crashes and was likely being exploited. Microsoft security researchers collaborated with Beaumont as well as another researcher, Marcus Hutchins<\/a>, to investigate and analyze the crashes and confirm that they were caused by a BlueKeep exploit module for the Metasploit penetration testing framework.<\/p>\n BlueKeep is what researchers and the media call CVE-2019-0708<\/a>, an unauthenticated remote code execution vulnerability in Remote Desktop Services on Windows 7, Windows Server 2008, and Windows Server 2008 R2. Microsoft released a security<\/a> fix for the vulnerability on May 14, 2019.<\/p>\n While similar vulnerabilities have been abused by worm malware in the past, initial attempts at exploiting this vulnerability involved human operators aiming to penetrate networks via exposed RDP services.<\/p>\n Microsoft had already deployed a behavioral detection for the BlueKeep Metasploit module in early September, so Microsoft Defender ATP customers had protection from this Metasploit module by the time it was used against Beaumont\u2019s honeypot. The module, which appears to be unstable as evidenced by numerous RDP-related crashes observed on the honeypot, triggered the behavioral detection in Microsoft Defender ATP, resulting in the collection of critical signals used during the investigation.<\/p>\n Microsoft security signals showed an increase in RDP-related crashes that are likely associated with the use of the unstable BlueKeep Metasploit module on certain sets of vulnerable machines. We saw:<\/p>\n <\/p>\n Figure 1. Increase in RDP-related service crashes when the Metasploit module was released<\/em><\/p>\n After extracting indicators of compromise and pivoting to various related signal intelligence, Microsoft security researchers found that an earlier coin mining campaign in September used a main implant that contacted the same command-and-control infrastructure used during the October BlueKeep Metasploit campaign, which, in cases where the exploit did not cause the system to crash, was also observed installing a coin miner. This indicated that the same attackers were likely responsible for both coin mining campaigns\u2014they have been actively staging coin miner attacks and eventually incorporated the BlueKeep exploit into their arsenal.<\/p>\n Our machine learning models flagged the presence of the coin miner payload used in these attacks on machines in France, Russia, Italy, Spain, Ukraine, Germany, the United Kingdom, and many other countries.<\/p>\n <\/p>\n Figure 2. Geographic distribution of coin miner encounters<\/em><\/p>\n \u200bThese attacks were likely initiated as port scans for machines with vulnerable internet-facing RDP services. Once attackers found such machines, they used the BlueKeep Metasploit module to run a PowerShell script that eventually downloaded and launched several other encoded PowerShell scripts.<\/p>\n <\/p>\n Figure 3. Techniques and components used in initial attempts to exploit BlueKeep<\/em><\/p>\n We pieced together the behaviors of the PowerShell scripts using mostly memory dumps. The following script activities have also been discussed in external researcher blogs<\/a>:<\/p>\n Figure 4. Memory dump of a PowerShell script used in the attacks<\/em><\/p>\n The final script saved the coin miner as the following file:<\/p>\n C:\\Windows\\System32\\spool\\svchost.exe<\/em><\/p>\n The coin miner connected to command-and-control infrastructure at 5.100.251.106 hosted in Israel. Other coin miners deployed in earlier campaigns that did not exploit BlueKeep also connected to this same IP address.<\/p>\n Security signals and forensic analysis show that the BlueKeep Metasploit module caused crashes in some cases, but we cannot discount enhancements that will likely result in more effective attacks. In addition, while there have been no other verified attacks involving ransomware or other types of malware as of this writing, the BlueKeep exploit will likely be used to deliver payloads more impactful and damaging than coin miners.<\/p>\n The new exploit attacks show that BlueKeep will be a threat as long as systems remain unpatched, credential hygiene is not achieved, and overall security posture is not kept in check. Customers are encouraged to identify and update vulnerable systems immediately. Many of these unpatched devices could be unmonitored RDP appliances placed by suppliers and other third-parties to occasionally manage customer systems. Because BlueKeep can be exploited without leaving obvious traces, customers should also thoroughly inspect systems that might already be infected or compromised.<\/p>\n To this end, Microsoft customers can use the rich capabilities in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP<\/a>) to gain visibility on exploit activities and defend networks against attacks. On top of the behavior-based antivirus and endpoint detection and response (EDR) detections, we released a threat analytics<\/a> report to help security operations teams to conduct investigations specific to this threat. We also wrote advanced hunting<\/a> queries that customers can use to look for multiple components of the attack.<\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n Questions, concerns, or insights on this story? Join discussions at the\u00a0Microsoft Defender ATP community<\/a>.<\/p>\n Read all Microsoft security intelligence blog posts<\/a>.<\/p>\n\n
Coin miner campaign using BlueKeep exploit<\/h2>\n
\n
Defending enterprises against BlueKeep<\/h2>\n
\nTalk to us<\/h3>\n