Veeam

Veeam

The attack on **Veeam** involved a multi-stage payload delivery via fake CAPTCHA pages, deploying **information stealers** to harvest authentication tokens, browser cookies, and stored credentials. Attackers bypassed **MFA**, escalated privileges via a **SOCKS proxy DLL** (loaded via `rundll32.exe`), and created a backdoor admin account (*Supportt*) to maintain persistence. They reset the legitimate **Administrator account password**, preventing recovery. Extensive reconnaissance was conducted using tools like **ScreenConnect**, **NetScan**, and **AnyDesk** (deployed via ATERA Networks) to map the network and identify privileged accounts (e.g., **Domain Admins**, **service accounts**).The attackers **targeted Veeam’s backup infrastructure**, extracting credentials from SQL databases (e.g., `VeeamBackup.[dbo].[Credentials]`) using **PowerShell scripts with base64-encoded payloads**. Compromised credentials included **Domain Admins, Exchange servers, SQL databases, and file servers**, enabling lateral movement. **Defense evasion** was achieved via **BYOVD (Bring Your Own Vulnerable Driver)** using *eskle.sys* (linked to Chinese gaming cheat tools) to disable security solutions. The attack compromised **domain controllers, backup repositories, and critical servers**, posing severe operational and security risks.

Source: https://www.trendmicro.com/en_us/research/25/j/agenda-ransomware-deploys-linux-variant-on-windows-systems.html

TPRM report: https://www.rankiteo.com/company/veeam-software

"id": "vee4762147102425",
"linkid": "veeam-software",
"type": "Cyber Attack",
"date": "10/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'type': 'Enterprise Organization'}],
 'attack_vector': ['Fake CAPTCHA Pages (Malicious JavaScript)',
                   'Multistage Payload Delivery (C2 Servers: '
                   '45[.]221[.]64[.]245, 104[.]164[.]55[.]7)',
                   'Information Stealers (Token/Cookie/Credential Harvesting)',
                   'Legitimate Tool Abuse (Rundll32.exe, ScreenConnect, '
                   'AnyDesk, ATERA Networks)',
                   'Anti-AV Tools (2stX.exe, Or2.exe, eskle.sys BYOVD)'],
 'data_breach': {'data_encryption': 'Partially (Veeam Credentials Stored '
                                    'Encrypted; Decryption Key Found: '
                                    '0jmz9Hrgy08rc0XrNpQ***[REDACTED]**)',
                 'data_exfiltration': 'Likely (Implied by Credential '
                                      'Harvesting and Lateral Movement)',
                 'file_types_exposed': ['SQL Database Records',
                                        'Stored Browser Credentials',
                                        'System Tokens'],
                 'sensitivity_of_data': 'High (Administrative and Service '
                                        'Account Credentials)',
                 'type_of_data_compromised': ['Authentication Tokens',
                                              'Browser Cookies',
                                              'Stored Credentials (Plaintext '
                                              'and Encrypted)',
                                              'Veeam Backup Database Records '
                                              '(SQL Tables: Credentials, '
                                              'BackupRepositories, '
                                              'WinServers)']},
 'description': 'Analysis of embedded obfuscated JavaScript within fake '
                'CAPTCHA pages revealed a multistage payload delivery system '
                'that initiated downloads from secondary command-and-control '
                'servers (45[.]221[.]64[.]245/mot/ and '
                '104[.]164[.]55[.]7/231/means.d). The attack involved '
                'information stealers harvesting authentication tokens, '
                'browser cookies, and stored credentials, enabling attackers '
                'to bypass MFA and move laterally using legitimate user '
                'sessions. The attackers deployed a SOCKS proxy DLL for remote '
                'access, created a backdoor administrative account '
                "('Supportt'), and conducted extensive reconnaissance. They "
                'targeted Veeam backup infrastructure to harvest credentials, '
                'used anti-AV tools (2stX.exe, Or2.exe, eskle.sys driver) for '
                'defense evasion, and leveraged dual-RMM tools (AnyDesk, '
                'ScreenConnect) for persistent access.',
 'impact': {'brand_reputation_impact': 'High (Due to Credential Theft and '
                                       'Potential Data Breach)',
            'data_compromised': ['Authentication Tokens',
                                 'Browser Cookies',
                                 'Stored Credentials (Domain Admins, Service '
                                 'Accounts, Local Admins)',
                                 'Veeam Backup Database Credentials (SQL '
                                 'Queries: user_name, password)'],
            'identity_theft_risk': 'High (Stored Credentials and Tokens '
                                   'Compromised)',
            'operational_impact': ['Compromised Administrative Accounts',
                                   'Lateral Movement Across Network',
                                   'Potential Data Exfiltration',
                                   'Security Tool Evasion (Anti-AV Disabled)',
                                   'Persistent Access via RMM Tools'],
            'systems_affected': ['Domain Controllers',
                                 'Exchange Servers',
                                 'SQL Databases',
                                 'File Servers',
                                 'Backup Repositories',
                                 'Endpoints (Via Information Stealers)',
                                 'Veeam Backup Infrastructure']},
 'initial_access_broker': {'backdoors_established': ['SOCKS Proxy DLL '
                                                     '(socks64.dll loaded via '
                                                     'rundll32.exe)',
                                                     'Backdoor Admin Account '
                                                     "('Supportt' added to "
                                                     'Administrators group)',
                                                     'Legitimate Administrator '
                                                     'Password Reset',
                                                     'RMM Tools (AnyDesk '
                                                     '9.0.5, ScreenConnect)'],
                           'entry_point': 'Fake CAPTCHA Pages with Obfuscated '
                                          'JavaScript',
                           'high_value_targets': ['Veeam Backup Infrastructure '
                                                  '(Credential Harvesting)',
                                                  'Domain Controllers (Lateral '
                                                  'Movement)',
                                                  'Exchange Servers',
                                                  'SQL Databases']},
 'investigation_status': 'Ongoing (Assessment Based on Observed Tactics)',
 'motivation': ['Credential Theft',
                'Lateral Movement',
                'Persistence',
                'Data Exfiltration (Likely)',
                'Potential Ransomware/Extortion (Implied by Credential '
                'Harvesting)'],
 'post_incident_analysis': {'root_causes': ['Successful Social Engineering '
                                            '(Fake CAPTCHA Pages)',
                                            'Insufficient Protection for '
                                            'Stored Credentials (Veeam Backup)',
                                            'Abuse of Legitimate Tools '
                                            '(Rundll32.exe, RMM Platforms)',
                                            'Lack of Anti-AV Driver Protection '
                                            '(eskle.sys BYOVD)',
                                            'MFA Bypass via Stolen '
                                            'Tokens/Cookies']},
 'threat_actor': 'Agenda (Assessed)',
 'title': 'Sophisticated Social Engineering and Credential Harvesting Attack '
          'via Fake CAPTCHA Pages',
 'type': ['Social Engineering',
          'Credential Harvesting',
          'Privilege Escalation',
          'Lateral Movement',
          'Defense Evasion',
          'Persistence',
          'Discovery'],
 'vulnerability_exploited': ['Human Trust (Fake CAPTCHA Social Engineering)',
                             'Stored Credentials in Veeam Backup '
                             'Infrastructure',
                             'Legitimate Administrative Tools (ScreenConnect, '
                             'AnyDesk, RMM Platforms)',
                             'Driver Vulnerability (eskle.sys for Anti-AV '
                             'Bypass)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.