Wednesday, August 10, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Attackers Exploit Confluence Bug to Drop Ransomware, Webshells

Researcher by Researcher
June 14, 2022
in Cybersecurity
0
Researchers Warn of RCE Bug in Spring Framework
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


More than a week after a critical vulnerability in the Atlassian Confluence Server and Data Center was disclosed and patches issued, adversaries including nation-state actors are continuing an onslaught of exploitation attempts against the flaw in order to deploy web shells, botnets, cryptocurrency mining malware and ransomware.

Microsoft said that it has observed the flaw (CVE-2022-26134) recently being exploited by a known China-based ransomware operator, tracked as DEV-0401, which has previously deployed ransomware files like LockFile, AtomSilo and Rook against victims. The threat actor is known for exploiting Internet-facing systems that run vulnerable versions of Confluence (such as the known Confluence OGNL injection flaw tied to CVE-2021-26084) as well as targeting other vulnerabilities including the ProxyShell flaw in Microsoft Exchange servers (CVE-2021-34473).

“In many cases impacted devices have been observed with multiple disparate instances of malicious activity, including extensive device and domain discovery, and the deployment of payloads like Cobalt Strike, web shells, botnets like Mirai and Kinsing, coin miners, and ransomware,” according to Microsoft on Friday.

The company warned users of impacted versions of the product to upgrade to the patched version or apply the recommended mitigations.
Microsoft also noted that attackers are exploiting the vulnerability in order to deploy Cerber2021 (also known as CerberImposter), which is a novice ransomware family that emerged in the first quarter of 2022.

The vulnerability in Confluence, a collaborative tool used widely in enterprises to build internal wikis and knowledge bases, was first uncovered in the beginning of June after researchers discovered it being used in active attacks by multiple threat actors, which were aiming to achieve remote code execution. As part of these initial attacks, attackers exploited compromised servers in order to install webshells on them and finally deploy a known implant called Behinder. Researchers with Volexity, who discovered the activity, did not attribute this initial intrusion, but did state that the attack likely stemmed from China.

Since then, attacks have become more widespread, due in part to the release of proof-of-concept exploits online. Dray Agha, ThreatOps Analyst at Huntress, said that when querying Huntress telemetry a day after CVE-2022-26134 was shared, researchers identified 50 to 60 vulnerable Confluence servers. Many companies have not patched their systems simply because they have forgotten about them, said Agha.

“There are a surprising number of Confluence servers spun up that organizations had always intended to decommission but are still out there, exposed to the big bad internet,” said Agha. “Initially, CVE-2022-26134 was problematic as there was no patch available… However, now a patch is available and has been for a while, there is no evidence that patching induces further complications.”





Source link

Related articles

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Tags: AttackersbugConfluencedropExploitRansomwareWebshells
Share76Tweet47

Related Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
0

Learn how to reset your Windows 10 password whether you use a Microsoft Account or a local account. Uh-oh, you’ve...

VMware Warns of Critical Authentication Bypass Flaw

Exploit Available for Critical VMware Bug CVE-2022-31656

August 9, 2022
0

The researcher who discovered two critical vulnerabilities in VMware ONE Workspace Access has released a proof-of-concept exploit for one of...

High-Severity Flaw in Argo CD is Information Leak Risk

Privya Emerges From Stealth With Data Privacy Code Scanning Platform

August 9, 2022
0

Privya emerged from stealth mode on Tuesday with a data privacy-focused code scanning platform and $6 million in seed funding....

How older security vulnerabilities continue to pose a threat

How older security vulnerabilities continue to pose a threat

August 9, 2022
0

Security flaws dating back more than 10 years are still around and still pose a risk of being freely exploited,...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
UK Fintech News Round-Up: The Latest Stories 02/03

UK Fintech News Roundup: The Latest Stories 10/08

August 10, 2022
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022

Recent Posts

UK Fintech News Round-Up: The Latest Stories 02/03

UK Fintech News Roundup: The Latest Stories 10/08

August 10, 2022
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp scams security Software TFT Threat vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved