Description

A threat actor under the name LongNight has allegedly placed remote code execution (RCE) access for sale on offer, with Burger King Spain's backup infrastructure in its sights. The exploit, which costs $4,000, takes advantage of vulnerabilities in AhsayCBS—a centralized backup server that hosts data across local, FTP/SFTP, and cloud environments such as AWS and Azure. If true, the breach may leave around 2.6 terabytes of sensitive information vulnerable to data breaches or ransomware attacks. As per LongNight, the weakness enables cyber attackers to run arbitrary code at the beginning or end of backups. This feature could provide persistent access to Burger King Spain's network, allowing data exfiltration, alteration, or even ransomware deployment. Due to the nature of backup tools, which in many cases have privileged access throughout networks, the breach of such an application is a significant security incident. The information vulnerable to exposure may include customer information, business transactions, and business secret data. Though the cost of access appears nominal, it is indicative of an increasing trend in the underground darknet cybercrime economy where even small investments in exploits have high returns. The potential operational, financial, and reputational loss for Burger King Spain is high. Corruption or deletion of backups can highly impact recovery in case of a cyberattack. To date, there has been no public comment from Burger King Spain or Ahsay on the exploit. Organizations employing AhsayCBS or comparable solutions are encouraged to update and patch vulnerabilities at once, restrict access to backup infrastructure, and scan for suspicious activity. The attack highlights the increasing threat to backup infrastructure and the urgent need for integrated cybersecurity strategies for all layers of IT systems.