Security News > 2021 > December > Microsoft: Khonsari ransomware hits self-hosted Minecraft servers

Microsoft: Khonsari ransomware hits self-hosted Minecraft servers
2021-12-16 17:20

Microsoft urges admins of self-hosted Minecraft servers to upgrade to the latest release to defend against Khonsari ransomware attacks exploiting the critical Log4Shell security vulnerability.

While there was no mention of attacks targeting Minecraft servers using Log4Shell exploits at the time, Redmond's security experts updated their CVE-2021-44228 guidance today to warn of ongoing exploitation to deliver ransomware on non-Microsoft hosted Minecraft servers.

"In these cases, an adversary sends a malicious in-game message to a vulnerable Minecraft server, which exploits CVE-2021-44228 to retrieve and execute an attacker-hosted payload on both the server and on connected vulnerable clients," Microsoft said.

The Microsoft 365 Defender Threat Intelligence Team and the Microsoft Threat Intelligence Center also observed PowerShell-based reverse shells deployed in enterprise breaches where Log4j exploits targeting Minecraft servers were the entry point.

While Minecraft is not something one would expect to find installed on an enterprise endpoint, the threat actors who successfully compromised one of these servers also used Mimikats to steal credentials, likely to maintain access to the breached systems for follow-on activity.

Microsoft warns all admins to immediately install the latest Minecraft server updates to defend them against these attacks and asks players to only connect to trusted Minecraft servers.


News URL

https://www.bleepingcomputer.com/news/security/microsoft-khonsari-ransomware-hits-self-hosted-minecraft-servers/