RSAweb outage linked to global ransomware exploit identified in 2021
The cyberattack wasn't confined to South Africa, and may have been linked to a two-year-old vulnerability.
Photo: iStock
The massive RSAWeb outage which plunged South African netizens into a cyber-darkness last week may have been linked to a global ransomware attack of staggering proportions.
Several RSAWeb clients were affected by the outage last week, including The Citizen, Moneyweb, Jacaranda, Maroela Media, 2OceansVibe, and others.
Service was restored to some clients on Friday, while others are still experiencing connection issues.
READ: Sorry we left you hanging – thanks for sticking with us
RSAWeb outage
On Sunday, RSAWeb CEO Rudy van Staden said in a letter addressed to the company’s customers that the cause of the recent service disruption was due to a “highly sophisticated cyber attack“.
RSAWeb’s “Cloud and Shared Hosting customers were particularly impacted by this malicious attack”.
He said there was no reason to “believe that any customer or employee data was accessed or misused” as a result of the attack.
“The relevant authorities have been informed and we have also engaged independent professional cyber security advisors”.
Global ransomware attack
Van Staden said RSAWeb was the victim of an “extremely capable and devious threat actor” that had resulted in outages across the globe, including South Africa.
The cyber attack, however, wasn’t confined to South Africa; it also brought Italy’s internet to its knees on Sunday.
Telecom Italia, the country’s largest telecommunications company, experienced connectivity issues which affected dozens of Italian organisations.
Italy targetted, other countries vulnerable
Stefano Zanero, senior professor of cybersecurity at Italy’s Politecnico di Milano confirmed the attack targeted a two-year-old vulnerability in VMware ESXi servers “which should have been patched by now”.
He added: “But evidently many servers are still not protected.”
While the Italian National Cybersecurity Agency [1] confirmed most of the country’s internet had been restored, it warned that France, Finland, the Netherlands, the US and Canada could be vulnerable to the next wave of attacks.
The ransomware variant called ESXiArgs allegedly exploits a vulnerability – known as CVE-2021-21974 – which VMWare identified and patched in 2021[2].
CVE-2021-21974 unpacked
According to National Vulnerability Database (NVD)[3], CVE-2021-21974 was an ESXi OpenSLP heap-overflow vulnerability first reported in 2021.
Patches for the vulnerability were made on 23 February 2021, as per a security advisory issued by VMware at the time.
A VMware spokesperson said “security hygiene is a key component of preventing ransomware attacks”, and urged customers who were running outdated versions to apply the patch.
The recent ransomware attack shows just how many servers are still unpatched and exposed.
Businesses not prepared
Meanwhile, Stephen Osler, Co-Founder and Business Development Director at Nclose, said it could take anywhere between “two weeks to months to recover from a devastating cyber or ransomware attack”.
Osler said many businesses aren’t prepared for an attack of this scale, adding that it could also result in the “potential loss of customer data”.
“Often in these types of ransomware attacks, it’s not just about the encryption of data systems; the attackers could also steal large volumes of data.”
That is obviously quite alarming, considering the POPIA act.
READ | APP ALERT: Android users warned of malicious ‘ad-junkie’ threats
South African outage: timeline
On 1 February, RSAWeb said the disruption affected key services, including Mobile APN, Cloud PBX (private branch exchange), FTTx (Fiber to the x), hosting, and VoIP (voice-over-IP) services.
At the time, RSAWeb said engineers were “prioritising the recovery of customer PBX’s to restore Business VoIP telephony services, with parallel efforts underway to restore Mobile APN and Cloud services”.
RSAWeb repeated the same updates throughout the week.
On Sunday, Van Staden said, “given the sophisticated nature of this attack, the recovery process is highly complex”.
He said steps were immediately taken [on Wednesday] to contain and secure RSAWeb’s systems and to “determine the cause of this malicious attack”.
As of 10:34 on Monday, 6 February, engineers were restoring customer Cloud and Hosting services, while “onsite field engineers are making great progress with bringing customer PBX services back online”.
The Citizen reached out to RSAWeb and will update when feedback is provided.
Sources:
[1] CSIRT Italia
[2] VMWare security advisory
[3] CVE-2021-21974 database entry
For more news your way
Download our app and read this and other great stories on the move. Available for Android and iOS.