Qlik Sense Servers vulnerable to Cactus Ransomware – act fast

April 28, 2024
1 min read



Article Summary

TLDR:

  • Many organizations are still vulnerable to Cactus ransomware due to unpatched Qlik Sense servers
  • Qlik had disclosed vulnerabilities in August and September 2023, but Cactus actors have been exploiting them

Thousands of Qlik Sense servers remain open to Cactus ransomware, despite Qlik patching the vulnerabilities last year. The vulnerabilities, tracked as CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365, allow remote attackers to execute arbitrary code on affected systems. Despite warnings from security researchers and organizations like Arctic Wolf, many organizations have not patched their servers. A scan by Fox-IT revealed 3,143 internet-accessible Qlik Sense servers that were still vulnerable to Cactus group’s exploits. Countries with a high number of vulnerable servers include the US, Italy, Brazil, Netherlands, and Germany.

Project Melissa, a collaborative effort in the Netherlands, is working to disrupt Cactus group operations. Security organizations like Fox-IT and ShadowServer Foundation are reaching out to potentially compromised organizations. ShadowServer issued a critical alert warning of a high likelihood of compromise for unremediated servers. Fox-IT identified at least 122 likely compromised Qlik Sense instances, with the majority located in the US, Spain, and Italy. It’s crucial for organizations to take action to secure their Qlik Sense servers to prevent potential ransomware attacks.

Overall, organizations need to prioritize patching their Qlik Sense servers and staying informed about security threats like Cactus ransomware to prevent potential data breaches and financial losses.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives