Late on November 8, 2023, SysAid announced they had evidence their product was being actively exploited via a 0-day vulnerability, now tracked as CVE-2023-47246.
SysAid is an IT Service Management system widely used by various enterprises.
On November 9, Microsoft confirmed the announcement, stating that they traced the exploit activity to an Initial Access Broker (IAB) group known as Lace Tempest, which is known to be closely associated with the Cl0p ransomware group. Cl0p is the infamous ransomware gang known for their MOVEit Transfer exploit earlier this year.
Per SysAid and Microsoft, this vulnerability is a previously unknown path traversal vulnerability that leads to code execution. Successful exploitation led to the threat actor uploading a WAR archive file containing a webshell and other payloads which allowed them to gain full control of the system.
It should be noted that there is evidence of exploitation of this vulnerability as early as October 30.
This vulnerability affects all on-premise SysAid servers. The vendor has already released a fixed version, 23.3.36. Download and installation instructions can be found here. Administrators are urged to patch to the fixed version immediately.
BleepingComputer provided an excellent list of steps for administrators to take to check for signs of compromise:
Elastic Security published 2 YARA rules to help with detection of compromise on vulnerable systems here and here.
A Velociraptor Artifact was created to hunt for post-exploitation activity, and can be found here.
b5acf14cdac40be590318dee95425d0746e85b1b7b1cbd14da66f21f2522bf4d - Malicious loader
81.19.138.52 - GraceWire Loader C2
45.182.189.100 - GraceWire Loader C2
179.60.150.34 - Cobalt Strike C2
45.155.37.105 - Meshagent remote admin tool C2
C:\Program Files\SysAidServer\tomcat\webapps\usersfiles\user.exe
C:\Program Files\SysAidServer\tomcat\webapps\usersfiles.war
C:\Program Files\SysAidServer\tomcat\webapps\leave
References