Arlecho's ScreenConnect 6 releases
***** ALERT ******

The latest version is still being exploited!

Immediately remove SetupWizard.aspx AND block 91.92.255.0/24, 192.210.232.0/24, 144.172.118.0/24, 146.70.86.0/24, 67.22.32.0/24, 91.92.254.0/24, 195.80.148.0/24

IP Ranges will continue to be updated, keep an eye on this and future posts!
Reply
(Feb 21, 2024, 05:28 am)Sinauth Wrote:
(Feb 21, 2024, 04:28 am)Arlecho Wrote: Everyone running an internet accessible installation is highly recommended to stay up to date, they have had some other bad CVE's in the past.

Just take a good backup (with the services stopped) and try to upgrade whenever an upgrade is available.
Also keep the plugins up to date if you are running any.

I'm having a problem this morning where I'm getting "Invalid credentials. Please try again." we have 2fa on all accounts.

Is anyone else having this issue? Can't log in whatsoever.

I had this problem.
Stopped the services.
Replaced the file C:\Program Files (x86)\ScreenConnect\App_Data\User.xml from the backup.
Started services.
Reply
If you cannot log in anymore you have been hacked, restore a backup and follow the above instructions.
Reply
Yes, did this. After restoring all users, we proceeded to change all passwords and reset all 2FA.

For good measure, deleted ALL extensions for now.

Also, now removed SetupWizard.aspx based on Arlecho's advice.

Not sure how best to block 91.92.255.0/24.

The username in my User.xml after the hack is 'CoHIH2rVxt' with email 'CoHIH2rVxt@poc.com' everyone else the same?

Edit: A bit of additional info, we were running ScreenConnect_23.9.7.8804_Release now updated to ScreenConnect_23.9.8.8811_Release.
Reply
If you need help blocking stuff google iptables or nftables (nftables would be prefered) or use the windows firewall if you are windows based (also enough tutorials available).

Have added some more IP ranges in the previous post.
Reply
Windows users I used the guide below to block the IP ranges in Arlecho's post above.

https://www.thesagenext.com/support/bloc...s-firewall
Reply
(Feb 21, 2024, 07:43 am)Sinauth Wrote: The username in my User.xml after the hack is 'CoHIH2rVxt' with email 'CoHIH2rVxt@poc.com' everyone else the same?

Simply restored my instance with a backup of yesterday, are all old users removed?
Reply
today my server got hacked twice. they removed all users. I just shutdown server and maybe stop public server to internet, just use in local & over vpn.
Reply
(Feb 21, 2024, 08:08 am)Arlecho Wrote:
(Feb 21, 2024, 07:43 am)Sinauth Wrote: The username in my User.xml after the hack is 'CoHIH2rVxt' with email 'CoHIH2rVxt@poc.com' everyone else the same?

Simply restored my instance with a backup of yesterday, are all old users removed?

I'm up and running. CoHIH2rVxt was the hackers admin account.
Reply
Use cloudflare, restrict access to your IP's and block all countries other than your home country
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  UserHEVC Releases (Movies) UserHEVC 30 11,991 Jan 01, 2025, 14:29 pm
Last Post: ExtremelyAnoid
  RodneyYouPlonker film releases RodneyYouPlonker 315 363,153 Nov 28, 2024, 07:33 am
Last Post: RodneyYouPlonker
  KC's Releases KCTPB 27 8,057 Jul 28, 2024, 08:24 am
Last Post: KCTPB
  PHaGE Releases PHaGE 0 4,985 Aug 05, 2023, 16:30 pm
Last Post: PHaGE
  Faithwyn Releases Faithwyn 291 361,158 Jun 07, 2023, 02:08 am
Last Post: Faithwyn



Users browsing this thread: erozcomar, 5 Guest(s)