ConnectWise says nation-state attack targeted multiple ScreenConnect customers

Avatar

IT management software company ConnectWise said it is investigating a nation-state attack on its systems that impacted some of its customers. 

The company declined to provide details about the incident but told Recorded Future News that it “recently learned of suspicious activity” within its environment that it believes “was tied to a sophisticated nation state actor, which affected a very small number of ScreenConnect customers.”

ScreenConnect is the company’s flagship IT remote management and monitoring software and is used by dozens of governments and large businesses. Hackers have frequently targeted vulnerabilities in the software, using it as a jumping off point for ransomware attacks and data thefts. 

ConnectWise said it has launched an investigation with forensic experts from Mandiant. 

“We have communicated with all affected customers and are coordinating with law enforcement. As part of our work with Mandiant, we patched ScreenConnect and implemented enhanced monitoring and hardening measures across our environment,” a spokesperson said. 

“We have not observed any further suspicious activity in any customer instances.”

The company did not respond to a request for additional details. The incident was first reported by CRN. 

ScreenConnect allows for secure remote desktop access and mobile device support. It is a popular enterprise tool that is widely used by managed service providers (MSPs), which are attractive to cybercriminals and nation states because they can serve as staging points to launch attacks on other businesses. 

Both China and Russia have been seen exploiting ConnectWise ScreenConnect vulnerabilities in the last two years. 

Researchers from Google said in February that a hacker affiliated with China’s Ministry of State Security exploited CVE-2024-1709 in ConnectWise ScreenConnect “to compromise hundreds of institutions primarily in the U.S. and Canada.”

The same bug was used repeatedly by Chinese state-backed hackers to attack U.S. defense contractors, U.K. government entities and institutions in Asia throughout 2024, according to Mandiant. Other security experts called the bug a “catastrophe” due to how trivial it was to exploit. 

Sandworm, which researchers have tied to Russian Military Intelligence Unit 74455, was also seen using it in attacks, according to Microsoft. 

The Cybersecurity and Infrastructure Security Agency (CISA), which did not respond to requests for comment about the ConnectWise incident, previously warned that cybercriminals used versions of ScreenConnect themselves during attacks on at least two federal civilian agencies. 

The Florida-based ConnectWise was purchased by private equity giant Thoma Bravo in 2019.

CybercrimeMalwareNewsTechnologyNation-state
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

UK military to establish new Cyber and Electromagnetic Command

Next Post

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

Related Posts

Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system's primary disk and render it unbootable. The names of the packages are listed below - github[.]com/truthfulpharm/prototransform github[.]com/blankloggia/go-mcp github[.]com/steelpoor/tlsproxy "Despite appearing legitimate,
Avatar
Read More