Hi there customers-domain, this is the LockBit hacking group,
We would like to notify you that we have obtained access to sensitive data from your OwnCloud resource.
We have included a complete list of files for your reference.
We wanted to talk with you and your leadership first, so we purposefully kept your organization a secret.
We will sell your information on the black market and post it on our site, if you choose to ignore us after 3 days.
Here is the message we have in all our folders.
All files have been erased.
OS is debian 12
Owncloud server is 10.12.0
oAuth2 is 0.6.0
We use 2FA.
We changed admin password and DB credentials, reboot servers, and files continue to be erased.
This is the admin account which is used by hackers remotes IP.
So we have closed owncloud servers.
If we upgrade to last release of owncloud and to oAuth2 0.6.1, are we secured ?
We will also whitelist all goods IP and block all others.
i think the attacker could have been used CVE-2023-49105 (and not CVE-2023-49103) because the description sounds more fitting:
An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured.
thank you for the clarification. What i actually wanted to say is that i think that the description of CVE-2023-49105 is fitting the best to what the initially posting has reported:
I think the other CVEs CVE-2023-49103 or CVE-2023-49104 can’t be misused to delete files or am i wrong with this assumption?