Home Latest Cyber Security News | Network Security Hacking TeamCity RCE Flaw Actively Exploited To Deploy Ransomware

TeamCity RCE Flaw Actively Exploited To Deploy Ransomware

by Abeerah Hashim
TeamCity RCE flaw exploited for ransomware attacks

The recently patched TeamCity RCE flaw is now under active attack by numerous ransomware gangs. The researchers warn the organizations to patch their systems immediately, suspecting most have already fallen prey to the attacks.

Multiple Ransomware Groups Exploit TeamCity RCE Flaw Despite Patch

In a recent tweet, security and threat intelligence service GreyNoise warned users about the active exploitation attempts against the newly discovered remote code execution vulnerability in JetBrain’s TeamCity software.

TeamCity is a dedicated CI/CD software that currently serves numerous organizations for efficient handling of their source codes and builds. The software currently boasts a huge clientele, including names like Gearbox entertainment, Gradle, and Playrix.

According to GreyNoise, they caught numerous attempts to exploit the critical TeamCity RCE flaw (CVE-2023-42793) from numerous ransomware groups. In fact, they even warned the organizations to consider their networks already infiltrated if they not had patched their systems in time.

https://twitter.com/GreyNoiseIO/status/1707789864446656729

Besides GreyNoise, another cybersecurity service PRODAFT also issued a similar warning as their security tool detected numerous exploits in a period of three days. While it’s unclear if the organizations have already fallen a victim to the ransomware attacks, the researchers suspect that those firms might have to suffer “a huge headache” in the coming days.

https://twitter.com/PRODAFT/status/1708586257444430019

PRODAFT’s prediction for a chaotic situation among the affected organizations sounds highly plausible. There have been numerous cases in the past where the attackers remained dormant on the victim networks before executing the ransomware. This tactic gives enough time to the threat actors for surveillance, gaining persistence, and ensuring that the victims are left with no other option but to fulfil the attackers’ demands.

Users Should Remain Vigilant

JetBrain recently patched the critical TeamCity vulnerability following Sonar researchers’ report, with TeamCity On-Premises version 2023.05.4. However, given the users often neglect prompt system updates, the vulnerable systems have now become prone to ransomware attacks.

Regardless, users must ensure patching their systems with latest TeamCity releases to avoid the threats. In addition, all TeamCity customer firms should run thorough network security scans to ensure no malicious infiltration.

Let us know your thoughts in the comments.

You may also like