Supply chain β›“ Supply Chain

BleepingComputer

πŸ“… 2025-05-01 🏒 SimpleHelp RMM (Remote Monitoring and Management) 🦠 DragonForce ransomware πŸ”Ž CVE-2024-57726 Β· CVE-2024-57727 Β· CVE-2024-57728
Primary Source β†—

Incident Details

The DragonForce ransomware cartel exploited three vulnerabilities in SimpleHelp RMM software (disclosed January 2025) to breach a managed service provider (MSP) and then pivot to the MSP’s downstream customers. CVE-2024-57727 (CVSS 7.5) is a path traversal flaw; CVE-2024-57726 (CVSS 9.9) allows privilege escalation; CVE-2024-57728 allows arbitrary file upload as admin. Attackers used the MSP’s legitimate SimpleHelp infrastructure to deliver a modified installer to client endpoints, enabling credential harvesting and ransomware deployment. Multiple downstream clients suffered data theft and encryption in a classic MSP supply chain attack. Research published by Sophos. DragonForce offers affiliates an 80/20 revenue split and has become a dominant ransomware cartel after absorbing talent from disrupted groups.

Technical Details

Initial Attack Vector
CWE-22: Path Traversal (CVE-2024-57727) and CWE-269: Improper Privilege Management (CVE-2024-57726)
Vendor / Product
SimpleHelp RMM (Remote Monitoring and Management)
Software Package
SimpleHelp
Malware Family
DragonForce ransomware
CVE / GHSA References
CVE-2024-57726 CVE-2024-57727 CVE-2024-57728
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2025-05-01 Breach occurred
  2. 2025-05-28 Publicly disclosed
  3. unknown Customers notified