Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      7 MagSafe accessories that I recommend every iPhone user should have

      June 1, 2025

      I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

      June 1, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025
      Recent

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

      June 1, 2025

      Rilasciata PorteuX 2.1: Novità e Approfondimenti sulla Distribuzione GNU/Linux Portatile Basata su Slackware

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ghost Ransomware Group Exploiting Unpatched Software, FBI and CISA Warn

    Ghost Ransomware Group Exploiting Unpatched Software, FBI and CISA Warn

    February 20, 2025

    Ghost Ransomware

    A Ghost ransomware group also referred to as Cring, has been actively exploiting vulnerabilities in software and firmware as recently as January 2025, according to an alert issued Wednesday by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).

    Operating from China, Ghost has been targeting internet-facing services with unpatched security flaws—some of which could have been mitigated years ago. Cybersecurity researchers first detected the group’s activities in 2021, and their recent attacks continue to compromise organizations across more than 70 countries, including within China itself.

    Scope of the Threat

    The alert, released in collaboration with the Multi-State Information Sharing and Analysis Center (MS-ISAC), highlights Ghost’s focus on vulnerabilities in:

    • Unpatched Fortinet security appliances
    • Adobe ColdFusion web application servers
    • Microsoft Exchange servers exposed to ProxyShell attack chain vulnerabilities

    These vulnerabilities enable Ghost to breach systems, deploy ransomware, and demand financial payments from victims.

    The FBI, CISA, and MS-ISAC emphasized that the group’s targets include critical infrastructure, healthcare facilities, educational institutions, government networks, religious organizations, technology firms, manufacturing companies, and small- to medium-sized businesses.

    Ghost Ransomware: Tactics, Techniques, and Procedures (TTPs)

    Ghost actors have developed various strategies to evade detection and complicate attribution. They frequently rotate their ransomware executable payloads, modify ransom note texts, switch file extensions for encrypted files, and use multiple ransom email addresses.

    As a result, cybersecurity experts have associated different names with the group over time, including Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture.

    Exploitation and Attack Methods

    Ghost ransomware actors rely on publicly available code to exploit well-known Common Vulnerabilities and Exposures (CVEs), often in systems where patches have not been applied. Some of the vulnerabilities they have actively exploited include:

    • Fortinet FortiOS (CVE-2018-13379)
    • Adobe ColdFusion (CVE-2010-2861, CVE-2009-3960)
    • Microsoft SharePoint (CVE-2019-0604)
    • Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) – ProxyShell attack chain vulnerabilities

    Upon gaining access, Ghost actors deploy malicious tools such as Cobalt Strike Beacon malware to implant themselves within victim networks. They often upload web shells to compromised servers, leveraging Windows Command Prompt and PowerShell to execute further attacks.

    Persistence and Privilege Escalation

    While Ghost actors typically only spend a few days within a victim’s network before deploying ransomware, they have been observed creating new local and domain accounts, modifying existing account passwords, and deploying additional web shells.

    To escalate privileges, they exploit weaknesses in system configurations and use publicly available tools like SharpZeroLogon, SharpGPPPass, BadPotato, and GodPotato. By impersonating the SYSTEM user, they can run their malicious software with elevated privileges, allowing them to cause maximum disruption.

    Impact and Financial Motivation

    Ghost’s primary goal is financial gain. Ransom demands have varied widely, sometimes reaching hundreds of thousands of dollars. However, Ghost actors tend to abandon attempts when faced with hardened security systems that restrict lateral movement across networks.

    The impact of Ghost ransomware attacks differs on a case-by-case basis. While some organizations experience data encryption and operational disruptions, others with robust backup and recovery solutions have managed to restore operations without paying a ransom.

    Recommended Mitigations

    The FBI, CISA, and MS-ISAC strongly urge organizations to take the following steps to mitigate the risks associated with Ghost ransomware attacks:

    1. Implement Regular System Backups

    • Maintain known-good backups that are stored offline or segmented from source systems.
    • Ensure that backup solutions cannot be altered or encrypted by potentially compromised network devices.

    2. Patch Known Vulnerabilities

    • Apply timely security updates to operating systems, software, and firmware.
    • Prioritize patching vulnerabilities actively exploited by Ghost:
      • CVE-2018-13379 (Fortinet FortiOS)
      • CVE-2010-2861, CVE-2009-3960 (Adobe ColdFusion)
      • CVE-2021-34473, CVE-2021-34523, CVE-2021-31207 (Microsoft Exchange – ProxyShell)

    3. Segment Networks to Restrict Lateral Movement

    • Separate critical assets from less sensitive parts of the network.
    • Limit access to essential services through securely configured VPNs or firewalls.

    4. Enforce Multi-Factor Authentication (MFA)

    • Require phishing-resistant MFA for privileged accounts and email services.
    • Monitor for unauthorized changes to authentication mechanisms.

    5. Enhance Email Security

    • Deploy advanced email filtering to block phishing attempts.
    • Implement DMARC, DKIM, and SPF to prevent email spoofing.

    6. Monitor for Unauthorized PowerShell Use

    • Ghost actors heavily rely on PowerShell for malicious operations.
    • Restrict PowerShell access to only essential users.
    • Implement PowerShell allowlisting for scripts and network traffic.

    7. Identify and Investigate Abnormal Network Activity

    • Watch for unusual commands, scripts, and network traffic patterns.
    • Conduct regular scans to detect unauthorized account modifications.

    8. Disable Unused Services and Ports

    • Close unnecessary ports like RDP (3389), FTP (21), and SMB (445).
    • Restrict the exposure of internal services to external networks.

    Conclusion

    Ghost ransomware remains a persistent threat to organizations worldwide, with attacks escalating as vulnerabilities in outdated software remain unpatched. By implementing the recommended security measures, organizations can significantly reduce the likelihood of falling victim to this financially motivated cybercriminal group.

    The FBI, CISA, and MS-ISAC continue to monitor Ghost’s activities and urge organizations to stay vigilant, apply patches promptly, and bolster cybersecurity defenses against evolving ransomware threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRussian State-Backed Hackers Intensify Attacks on Signal Messenger Accounts
    Next Article Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 1, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How Dexa transforms podcasts into an interactive knowledge base

    Artificial Intelligence

    How Channel Corporation modernized their architecture with Amazon DynamoDB, Part 1: Motivation and approaches

    Databases

    Introduction to Cypress for Web Application Testing: Part 1

    Development

    CVE-2025-48381 – CVAT Information Disclosure Vulnerability

    Common Vulnerabilities and Exposures (CVEs)
    GetResponse

    Highlights

    CVE-2025-4755 – D-Link DI-7003GV2 Authentication Bypass Vulnerability

    May 16, 2025

    CVE ID : CVE-2025-4755

    Published : May 16, 2025, 7:15 a.m. | 1 hour, 44 minutes ago

    Description : A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been classified as critical. This affects the function sub_497DE4 of the file /H5/netconfig.asp. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    From Concept to Code: Inside the Creative Process of Thomas Monavon & Grégory Lallé

    February 25, 2025

    3 ways to help your staff use generative AI confidently and productively

    June 18, 2024

    “Bing was not as bad as I thought it was” — search engine gets backhanded compliment as experts explore why people use Google

    April 29, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.