DragonForce Actors Target SimpleHelp Vulnerabilities To Attack MSP, Customers

botnet

Summary

Sophos Managed Detection and Response (MDR) recently intervened in a targeted cyberattack against an unnamed Managed Service Provider (MSP), where threat actors leveraged vulnerabilities in the SimpleHelp remote monitoring and management (RMM) platform to deploy DragonForce ransomware across multiple endpoints. Attackers exploited vulnerabilities CVE-2024-57727CVE-2024-57728, and CVE-2024-57726, initially disclosed in January 2025, to achieve remote execution, arbitrary file upload, and privilege escalation. Utilizing a double-extortion strategy, the attackers not only encrypted data but also exfiltrated sensitive information to pressure victims into ransom payment.

Community Impact

The use of MSP infrastructure to launch ransomware attacks significantly amplifies the threat to retail and hospitality sectors, as many RH-ISAC organizations rely heavily on MSP-managed IT environments. As such, Core Members are advised to maintain situational awareness around the exploitation of CVE-2024-57727CVE-2024-57728, and CVE-2024-57726, review the intelligence included here, and ingest the indicators of compromise, provided below.

Analysis

The threat actor’s methodology in this incident demonstrates a sophisticated, multi-stage attack leveraging a critical exploit chain in SimpleHelp. The initial compromise involved exploiting CVE-2024-57727 (Multiple Path Traversal), which allows unauthenticated remote attackers to download arbitrary files, including serverconfig.xml containing hashed credentials, which facilitated the subsequent authentication. Once authenticated, the attacker exploited CVE-2024-57726 (Privilege Escalation), rated with a CVSS v3.1 score of 9.9 (Critical), which allows low-privileged technicians to create API keys with excessive permissions to escalate to server admin. Finally, with elevated privileges, the attacker leveraged CVE-2024-57728 (Arbitrary File Upload), a zip slip vulnerability (CVSS v3.1: 7.2), to upload the DragonForce ransomware binary and other malicious executables. The RMM tool’s legitimate functionalities were then co-opted to deploy the ransomware across multiple client endpoints.

Indicators of Compromise

Sophos has provided the following indicators of compromise for recommended review and ingestion: 

Indicator Type

Data

Note

File Path

C:ProgramDataJWrapper-Remote AccessJWAppsSharedConfigworkingtoolbox-9759076704687761247win.exe

DragonForce ransomware binary

SHA256

cee6a7663fad90c807c9f5ea8f689afd0e4ece04f8c55d7a047a7215db6be210

DragonForce ransomware binary

Filename

PUSH PUSh PUUUUUSH.bat

Batch script to list and clear all Windows Event logs

File Path

C:Users<user>VideosPUSH PUSh PUUUUUSH.bat

Batch script to list and clear all Windows Event logs

 

More Recent Blog Posts