HPE iLO4 Ransomware Attacks
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
iLO is a proprietary out-of-band remote management processor, integrated into certain HPE servers, that administrators connect to through a website or mobile application. It can be used to retrieve server logs and information, reboot servers or gain access to the installed shell.
The attackers behind the campaign are actively searching for servers with publicly reachable iLO ports. They will then attempt to gain access using either brute-force attacks or default credentials. Once they have access to the server they install an ISO file using the virtual media manager before rebooting the device. An application on the ISO file then encrypts all available files and enables the Login Security Banner feature to display the ransom note.
Remediation steps
| Type | Step |
|---|---|
|
If your organisation does not use iLO services then it should be deactivated on your systems. If iLO is used, then:
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 17 February 2020 12:45 pm