Tuesday, October 8, 2024
HomeCVE/vulnerabilityHackers Actively Exploiting ActiveMQ Vulnerability to Install Malware

Hackers Actively Exploiting ActiveMQ Vulnerability to Install Malware

Published on

Attackers have been exploiting the Apache ActiveMQ Vulnerability (CVE-2023-46604) to steal data and install malware constantly.

Using the Apache ActiveMQ remote code execution vulnerability, the Andariel threat group was found to be installing malware last month. Their primary targets are national defense, political groups, shipbuilding, energy, telecommunications, ICT firms, universities, and logistics firms.

Researchers have now discovered new attacks that installed Ladon, NetCat, AnyDesk, and z0Miner.

- Advertisement - EHA

Overview of the Apache ActiveMQ Vulnerability

A remote code execution vulnerability in Apache ActiveMQ, an open-source messaging and integration pattern server, is identified as CVE-2023-46604.

“If an unpatched Apache ActiveMQ is externally exposed, the threat actor can execute malicious commands from a remote location and take over the target system,” AhnLab Security Emergency Response Center (ASEC) shared in a report with Cyber Security News.

The vulnerability attack involves manipulating a serialized class type in the OpenWire protocol to instantiate the class in the classpath. When the threat actor sends a modified packet, the susceptible server uses the path (URL) in the packet to load the XML configuration file for the class.

Researchers examine that the latest attacks that have installed malware such as Ladon, NetCat, AnyDesk, and z0Miner.

Ladon:

One of the tools that threat actors who speak Chinese typically employ is Ladon. Ladon provides several features required for the attack procedure. Reverse shell, scanning, privilege escalation, and account credential theft are some of the main characteristics.

Once it was established that a vulnerable version of the Apache ActiveMQ service was being utilized, they downloaded Ladon and executed additional commands using the PowerShell command.

The reverse shell is executed using the ReverseTCP command, and Netcat (nc) was utilized to do this.

Ladon’s GitHub page
Ladon’s GitHub page

AnyDesk & Netcat

Using the TCP/UDP protocol, Netcat is a utility for sending and receiving data to and from specific targets within a network.

It works with both Windows and Linux environments. It may also be said that network managers regularly utilize it because it provides a variety of functions for network testing, but threat actors can also take advantage of it.

Netcat is being installed and executed through a vulnerability attack
Netcat is being installed and executed through a vulnerability attack

The threat actor installed AnyDesk after installing Netcat in the recently discovered attack. AnyDesk was installed, and the setup file was obtained from the original AnyDesk website’s download URL.

Installing AnyDesk using Netcat
Installing AnyDesk using Netcat

“Threat actor would have connected to the infected system and used the password transmitted as the “–set-password” argument upon execution to remotely control the target system,” researchers said.

z0Miner

Attack efforts using XMRig CoinMiner have also been observed recently. The XML configuration file is called “paste.xml,” and it contains information on how to run PowerShell commands using CMD.

The PowerShell script that may be downloaded is simple to use and downloads and executes both the configuration file and XMRig CoinMiner.

PowerShell script that installs XMRig CoinMiner
PowerShell script that installs XMRig CoinMiner

To stop attacks that make use of known vulnerabilities, system administrators need to verify if the Apache ActiveMQ service they are using is one of the vulnerable versions and install the most recent updates.

Finally, caution should be exercised by updating V3 to the most recent version to prevent malware infection in advance.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...