Cyber Security News

Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to hijack resources and steal SSH credentials.

Researchers from Aqua Nautilus revealed that these attacks, which weaponized botnets within 30 hours of discovery, employ encrypted payloads and advanced persistence mechanisms to infiltrate systems running both Windows and Linux platforms.

The attackers initiate their campaign by brute-forcing weak credentials on the Tomcat management console using Python scripts.

Once access is gained, they upload malicious JavaServer Pages (JSP) files designed to establish backdoors and escalate privileges.

These scripts enable the execution of arbitrary Java code, leveraging AES encryption to decode payloads and load new classes dynamically.

The malware disguises itself as kernel processes to evade detection while exploiting system resources for cryptomining operations.

Attack Flow of the Tomcat campaign 2025

Malware Capabilities and Spread

The attack infrastructure deploys two primary web shells: one for backdoor creation and another for privilege escalation and persistence.

The first script decodes encrypted requests and executes arbitrary code, while the second script downloads additional payloads, including executable files for Windows systems or shell scripts for Linux environments.

These scripts also extract SSH keys from compromised machines, enabling lateral movement across networks.

The malware further complicates detection by employing anti-debugging techniques, memory mapping, and cloning processes under fake kernel process names such as “[cpuhp/0]” and “[kworker/R-rcu_p].”

It connects to cryptomining pools like gulf.moneroocean.stream to mine cryptocurrency in the background while maintaining persistence by copying itself across multiple directories.

Indicators of Compromise (IOCs)

Researchers at AquaSec identified several indicators of compromise associated with this campaign:

  • IP Addresses: Attackers used IPs such as 209.141.37.95 and 138.201.247.154 for payload delivery.
  • Domains: The domain “dbliker.top” hosted malicious scripts disguised behind fake 404 error pages.
  • Files: Malicious JSP files (e.g., test.jsp, tomcat.jsp) and packed ELF binaries were used to execute the attack.
The website returns a fake 404 missing page error while the payload is hidden inside the html

To defend against such attacks, organizations must prioritize patching critical vulnerabilities like CVE-2025-24813 in internet-facing applications such as Tomcat servers.

Additional measures include:

  • Disabling unused services and management interfaces to reduce exposure.
  • Implementing strict privilege management using Role-Based Access Control (RBAC).
  • Isolating critical servers through network segmentation and firewalls to block outbound connections to cryptomining pools.
  • Deploying runtime protection tools capable of detecting malware behavior and cryptominers in real-time.

This campaign highlights the urgency of securing workloads reliant on Apache Tomcat servers against emerging threats.

With hackers exploiting vulnerabilities at unprecedented speeds, organizations must adopt proactive measures, including patch management, privilege restrictions, and runtime security solutions, to safeguard their systems from sophisticated attacks targeting cloud-native environments.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a premier…

9 hours ago

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by empowering…

9 hours ago

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir Kutleshi,…

14 hours ago

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti Connect…

2 days ago

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing how…

2 days ago

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of operational…

2 days ago