Saturday, July 13, 2024

Hackers Exploit Critical VMware Flaw to Drop Ransomware & Miners

Researchers at FortiGuard Labs noticed multiple malware campaigns targeting the VMware vulnerability to deploy cryptocurrency miners and ransomware on affected machines.

The critical vulnerability is tracked as CVE-2022-22954 (CVSS score: 9.8), a remote code execution vulnerability that causes server-side template injection. VMware patched this vulnerability, yet came under active exploitation in the wild.

An attacker can trigger the vulnerability to inject a payload and achieve remote code execution on VMware Workspace ONE Access and Identity Manager.

“Most of the payloads focus on probing a victim’s sensitive data, for example, passwords, hosts file, etc”, Fortinet FortiGuard Labs.

“They had the intention of deploying Mirai targeting exposed networking devices running Linux, RAR1ransom that leverages legitimate WinRAR to deploy encryption and GuardMiner that is a variant of xmrig used to “mine” Monero”.

Figure 1 CVE-2022-22954 Activity
CVE-2022-22954 Activity

Researchers say this variant’s work is to deploy DoS and launch a brute force attack like most Mirai botnets.

RAR1Ransom and GuardMiner Attack

Reports say the distribution of RAR1Ransom and GuardMiner is achieved by means of a PowerShell or a shell script depending on the operating system. 

RAR1ransom is prominent for leveraging the legitimate WinRAR utility to lock files in password-protected archives.

The PowerShell script downloads the following files from a Cloudflare IPFS gateway:

  • phpupdate.exe: Xmrig Monero mining software
  • config.json: Configuration file for mining pools
  • networkmanager.exe: Executable used to scan and spread infection
  • phpguard.exe: Executable used for guardian Xmrig miner to keep running
  • clean.bat: Script file to remove other cryptominers on the compromised host
  • encrypt.exe: RAR1 ransomware

RAR1Ransom is a ransomware tool that abuses WinRAR to compress the victim’s files and lock them with a password. GuardMiner is a cross-platform mining Trojan, which has been active since 2020.

Abuse of rar.exe to lock down files
Abuse of ‘rar.exe’ to lock down files

RAR1Ransom targets a compromised victim’s file with particular extensions.

Figure 15 Target file extension
Target file extension
Figure 17 Ransom note
Ransom Note

“We can tell the attacker intends to utilize a victim’s resources as much as possible, not only to install RAR1Ransom for extortion, but also to spread GuardMiner to collect cryptocurrency”, Fortinet FortiGuard Labs

Therefore, users are advised to keep their systems updated and patched and be aware of any suspicious processes in the environment. 

“These Mirai variants, RAR1Ransom, and GuardMiner are not extremely complicated samples, but their methods are always changing and evolving”, concludes the report.

Managed DDoS Attack Protection for Applications – Download Free Guide


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles