Supply chain ⛓ Supply Chain

Accellion FTA Breach — Reserve Bank of New Zealand and ASIC (January 2021)

📅 2020-12-23 🏢 Accellion File Transfer Appliance (FTA) 🦠 DEWMODE web shell 🔎 CVE-2021-27101 · CVE-2021-27102 · CVE-2021-27103 · CVE-2021-27104
Primary Source ↗

Incident Details

The Accellion FTA (File Transfer Appliance) breach was one of the most consequential supply-chain attacks of early 2021, affecting dozens of major organisations worldwide through a legacy secure file-transfer product that many had deployed for years without upgrading. The Reserve Bank of New Zealand (RBNZ / Te Pūtea Matua) was one of the first publicly confirmed victims, disclosing on 10 January 2021 that a third-party file-sharing system had been illegally accessed. Within days, the Australian Securities and Investments Commission (ASIC) confirmed it had been similarly affected, stating that a server used to transfer documents related to Australian credit licence applications had been accessed.

The root cause was a chain of four zero-day vulnerabilities in Accellion FTA versions 9_12_370 and earlier. CVE-2021-27101 is an SQL injection flaw exploitable via a crafted Host header against the document_root.html endpoint. CVE-2021-27102 is an OS command execution flaw triggered via a local web service call. CVE-2021-27103 is a server-side request forgery (SSRF) via a crafted POST request. CVE-2021-27104 is an OS command execution flaw via a crafted POST request to the admin interface. Attackers chained these four vulnerabilities to gain unauthenticated remote code execution, install a custom web shell named DEWMODE on victim appliances, and then exfiltrate large volumes of sensitive data.

Accellion first learned of the initial vulnerability (CVE-2021-27101) on 23 December 2020 and issued an emergency patch within 72 hours. However, threat actors discovered the remaining three vulnerabilities in January 2021 and continued exploiting unpatched or newly-vulnerable appliances in additional waves through February 2021. CISA and international partners published a joint advisory (AA21-055A) attributing the global campaign to the financially motivated threat group FIN11 (also tracked as UNC2546), which subsequently partnered with the CLOP ransomware operation to extort victims by threatening to publish stolen data on the CL0P^_- LEAKS dark-web site.

For the RBNZ, the stolen data included commercially sensitive information and data from past and present stakeholders. RBNZ confirmed it did not pay any ransom and worked with the New Zealand National Cyber Security Centre (NCSC) in its response. ASIC disclosed that some limited information in document attachments submitted to it had been accessed, but said it had no evidence that the breach compromised its internal systems beyond the Accellion appliance. Other prominent global victims of the same campaign included the Office of the Washington State Auditor, Kroger, Bombardier, the University of California, Transport for NSW, Jones Day, Shell, and the Reserve Bank of Australia (via a third party).

Accellion decommissioned FTA in April 2021 and urged all remaining customers to migrate to its Kiteworks platform. The incident underscored the systemic risk posed by legacy file-transfer appliances that persist in enterprise environments long after vendors have ceased active development, and demonstrated how a single compromised vendor product can simultaneously expose dozens of high-value organisations across multiple countries.

Technical Details

Initial Attack Vector
SQL injection and OS command injection zero-days in Accellion File Transfer Appliance (FTA) legacy software
Vendor / Product
Accellion File Transfer Appliance (FTA)
Software Package
Accellion FTA
Malware Family
DEWMODE web shell
CVE / GHSA References
CVE-2021-27101 CVE-2021-27102 CVE-2021-27103 CVE-2021-27104
Supply Chain Attack
✅ Confirmed third-party / vendor compromise

Timeline

  1. 2020-12-23 Breach occurred
  2. 2021-01-10 Publicly disclosed
  3. 2021-01-10 Customers notified