Did you always update your IPMIs firmware?Installing JungleSec through IPMI
In conversations between BleepingComputer and two victims it was discovered that attackers installed the JungleSec ransomware through the server's IPMI interface. In one case, the IPMI interface was using the default manufacturer passwords. The other victim stated that the Admin user was disabled, but the attacker was still able to gain access through possible vulnerabilities.
Once the user gained access to the servers, which in both of these cases were Linux, the attackers would reboot the computer into single user mode in order to gain root access. Once in single user mode, they downloaded and compiled the ccrypt encryption program.
Did you always update your IPMIs firmware?
NEVER expose IPMI to the Internet, never ever ever.In the future we wont expose IPMI to the internet any more.
I agree with this, exposing IPMI to the internet is like leave your home's door open all the time.NEVER expose IPMI to the Internet, never ever ever.
The mainboard is a supermicro 2 years old with latest firmware. The default password was changed but may be was brute force hacked.
Fortunately we do have a full backup and do not need to pay ransom of 0.4 BTC.
In the future we wont expose IPMI to the internet any more.
BMC Remote Management Control Protocol (RMCP)
and not only the user interface of the IPMI (SSH can be a target as well if that is enabled)