Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ghost Ransomware Group Exploiting Unpatched Software, FBI and CISA Warn

    Ghost Ransomware Group Exploiting Unpatched Software, FBI and CISA Warn

    February 20, 2025

    Ghost Ransomware

    A Ghost ransomware group also referred to as Cring, has been actively exploiting vulnerabilities in software and firmware as recently as January 2025, according to an alert issued Wednesday by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA).

    Operating from China, Ghost has been targeting internet-facing services with unpatched security flaws—some of which could have been mitigated years ago. Cybersecurity researchers first detected the group’s activities in 2021, and their recent attacks continue to compromise organizations across more than 70 countries, including within China itself.

    Scope of the Threat

    The alert, released in collaboration with the Multi-State Information Sharing and Analysis Center (MS-ISAC), highlights Ghost’s focus on vulnerabilities in:

    • Unpatched Fortinet security appliances
    • Adobe ColdFusion web application servers
    • Microsoft Exchange servers exposed to ProxyShell attack chain vulnerabilities

    These vulnerabilities enable Ghost to breach systems, deploy ransomware, and demand financial payments from victims.

    The FBI, CISA, and MS-ISAC emphasized that the group’s targets include critical infrastructure, healthcare facilities, educational institutions, government networks, religious organizations, technology firms, manufacturing companies, and small- to medium-sized businesses.

    Ghost Ransomware: Tactics, Techniques, and Procedures (TTPs)

    Ghost actors have developed various strategies to evade detection and complicate attribution. They frequently rotate their ransomware executable payloads, modify ransom note texts, switch file extensions for encrypted files, and use multiple ransom email addresses.

    As a result, cybersecurity experts have associated different names with the group over time, including Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture.

    Exploitation and Attack Methods

    Ghost ransomware actors rely on publicly available code to exploit well-known Common Vulnerabilities and Exposures (CVEs), often in systems where patches have not been applied. Some of the vulnerabilities they have actively exploited include:

    • Fortinet FortiOS (CVE-2018-13379)
    • Adobe ColdFusion (CVE-2010-2861, CVE-2009-3960)
    • Microsoft SharePoint (CVE-2019-0604)
    • Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) – ProxyShell attack chain vulnerabilities

    Upon gaining access, Ghost actors deploy malicious tools such as Cobalt Strike Beacon malware to implant themselves within victim networks. They often upload web shells to compromised servers, leveraging Windows Command Prompt and PowerShell to execute further attacks.

    Hostinger

    Persistence and Privilege Escalation

    While Ghost actors typically only spend a few days within a victim’s network before deploying ransomware, they have been observed creating new local and domain accounts, modifying existing account passwords, and deploying additional web shells.

    To escalate privileges, they exploit weaknesses in system configurations and use publicly available tools like SharpZeroLogon, SharpGPPPass, BadPotato, and GodPotato. By impersonating the SYSTEM user, they can run their malicious software with elevated privileges, allowing them to cause maximum disruption.

    Impact and Financial Motivation

    Ghost’s primary goal is financial gain. Ransom demands have varied widely, sometimes reaching hundreds of thousands of dollars. However, Ghost actors tend to abandon attempts when faced with hardened security systems that restrict lateral movement across networks.

    The impact of Ghost ransomware attacks differs on a case-by-case basis. While some organizations experience data encryption and operational disruptions, others with robust backup and recovery solutions have managed to restore operations without paying a ransom.

    Recommended Mitigations

    The FBI, CISA, and MS-ISAC strongly urge organizations to take the following steps to mitigate the risks associated with Ghost ransomware attacks:

    1. Implement Regular System Backups

    • Maintain known-good backups that are stored offline or segmented from source systems.
    • Ensure that backup solutions cannot be altered or encrypted by potentially compromised network devices.

    2. Patch Known Vulnerabilities

    • Apply timely security updates to operating systems, software, and firmware.
    • Prioritize patching vulnerabilities actively exploited by Ghost:
      • CVE-2018-13379 (Fortinet FortiOS)
      • CVE-2010-2861, CVE-2009-3960 (Adobe ColdFusion)
      • CVE-2021-34473, CVE-2021-34523, CVE-2021-31207 (Microsoft Exchange – ProxyShell)

    3. Segment Networks to Restrict Lateral Movement

    • Separate critical assets from less sensitive parts of the network.
    • Limit access to essential services through securely configured VPNs or firewalls.

    4. Enforce Multi-Factor Authentication (MFA)

    • Require phishing-resistant MFA for privileged accounts and email services.
    • Monitor for unauthorized changes to authentication mechanisms.

    5. Enhance Email Security

    • Deploy advanced email filtering to block phishing attempts.
    • Implement DMARC, DKIM, and SPF to prevent email spoofing.

    6. Monitor for Unauthorized PowerShell Use

    • Ghost actors heavily rely on PowerShell for malicious operations.
    • Restrict PowerShell access to only essential users.
    • Implement PowerShell allowlisting for scripts and network traffic.

    7. Identify and Investigate Abnormal Network Activity

    • Watch for unusual commands, scripts, and network traffic patterns.
    • Conduct regular scans to detect unauthorized account modifications.

    8. Disable Unused Services and Ports

    • Close unnecessary ports like RDP (3389), FTP (21), and SMB (445).
    • Restrict the exposure of internal services to external networks.

    Conclusion

    Ghost ransomware remains a persistent threat to organizations worldwide, with attacks escalating as vulnerabilities in outdated software remain unpatched. By implementing the recommended security measures, organizations can significantly reduce the likelihood of falling victim to this financially motivated cybercriminal group.

    The FBI, CISA, and MS-ISAC continue to monitor Ghost’s activities and urge organizations to stay vigilant, apply patches promptly, and bolster cybersecurity defenses against evolving ransomware threats.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleRussian State-Backed Hackers Intensify Attacks on Signal Messenger Accounts
    Next Article Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

    Related Posts

    Security

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    May 31, 2025
    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-3530 – WordPress Simple Shopping Cart Price Tampering Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    This paper from Google DeepMind Provides an Overview of Synthetic Data Research, Discussing Its Applications, Challenges, and Future Directions

    Development

    Linus Torvalds Acknowledges Missed Release of Linux 6.14 Due to Oversight

    Learning Resources

    How Tesla is Revolutionizing AI and Energy in 2025

    Development
    GetResponse

    Highlights

    State of User Research 2024: 3 Takeaways from a Non-Researcher

    June 27, 2024

    Post Content Source: Read More 

    Smishing and Vishing in 2025: How Cybercriminals Are Using AI to Fool You

    May 16, 2025

    Axiom Space Data Center e Red Hat unite per il futuro dell’edge computing… Orbitale!

    March 18, 2025

    I test robot vacuums for a living, and this one has the most useful cleaning feature I’ve seen yet

    January 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.