Ransomware attackers exploit year-old backup vulnerability

Martin Greenfield, CEO of continuous controls monitoring firm Quod Orbis, commented, “EstateRansomware is likely to target those organisations that are simply not getting the basics right, like patching, back-ups or ensuring access control is tightened.”

He added, “Not doing the basics correctly is the exact reason why so many breaches occur. Organisations must ensure that there are regular and secure backups, your controls should be applied consistently and your whole architecture should be built for failure to make your environment resilient.”

Ian Nicholson, incident response head at Pentest People, said, “The ransomware attacks exploiting the Veeam vulnerability (CVE-2023-27532) offer some vital lessons for CSOs. These attacks have certainly highlighted the importance of timely patch management practices. Despite patches being available since March 2023, delayed updates have left systems exposed, allowing attackers to steal credentials and execute remote code.”