The Cactus ransomware gang has been actively exploiting vulnerabilities in Qlik Sense servers since November 2023, utilizing a set of known exploits. These exploits include CVE-2023-41266, which allows path traversal; CVE-2023-41265, which permits HTTP request tunneling; and CVE-2023-48365, which enables unauthenticated remote code execution. Despite efforts by Qlik to mitigate these threats through multiple security advisories, a large number of servers remain vulnerable, exposing them to potential data breaches and operational disruptions.
Reports from Cyber Security News and other sources have indicated that threat actors are specifically targeting these vulnerable servers. Misinformation tactics and exploitation of software vulnerabilities are common strategies employed by these actors to manipulate system defenses and gain unauthorized access. The persistence of these vulnerabilities in thousands of servers underscores the ongoing risk and challenges in securing enterprise software environments effectively.
Research conducted by security experts has identified over 5,200 Qlik servers that are exposed on the internet, with more than 3,100 of these still susceptible to attacks by the Cactus group. A significant focus has been on servers in the Netherlands, where 241 systems have been found exposed, and 6 have already been compromised. This situation highlights the critical need for businesses to stay current with patches and security updates to defend against such targeted ransomware campaigns.
To aid in the identification and protection of vulnerable servers, researchers are utilizing various tools including Nuclei templates and specific server information gathered from files like “product-info.json” found on the servers. This file details server versions and update history, which can be critical in determining vulnerability. The discovery process includes sending requests to the servers using techniques that distinguish between patched and vulnerable systems, helping administrators understand their security posture and take necessary action to mitigate risks.