Lorenz ransomware penetrates corporate networks via phone systems

Lorenz, a ransomware gang which attacks organizations worldwide with tailored attacks and ransom demands, is now exploiting a critical vulnerability in Mitel MiVoice VOIP devices. The goal is to compromise companies and gain initial access to their corporate networks via their phone systems.

Arctic Wolf Labs security researchers discovered this new method after noticing a significant overlap with Tactics, Techniques, and Procedures associated with ransomware attacks that used the CVE-2022-29499 bug.

The vulnerability is a remote code execution bug affecting the Mitel Service Appliance component of MiVoice Connect.

It allows attackers to obtain a reverse shell and then used Chisel as a tunneling tool to pivot into the environment. Given that Mitel Voice-over-IP (VoIP) products are used by organizations in critical sectors around the world, this is an important addition to the arsenal of the gangs.

Mitel fixed the vulnerability by releasing security patches in early June 2022, after a patch script for affected versions of MiVoice Connect was released in April. Tesorion, a Dutch cybersecurity company, has released a free Lorenz ransomware decryptor that can restore some file types such as Office documents, PDF files, images and videos.

The sources for this piece include an article in BleepingComputer.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web