From Botnets to Espionage: The Persistent Threat of Unpatched Systems

November 29, 2024
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week, CISA's KEV catalog saw the addition of just one CVE, a critical improper authentication vulnerability in Array Networks AG and vxAG ArrayOS, underscoring the risks posed by unpatched systems. The ProjectSend vulnerability also remains actively exploited in the wild, amplifying the threat landscape for exposed platforms.

Meanwhile, the IoT_Reaper botnet continues to target vulnerabilities in MVPower CCTV DVRs, reinforcing its presence in the cyber threat ecosystem. Zerobot, focusing on a vulnerability in the Apache HTTP server (unpatched for over three years), has ramped up its activities, while established botnets like Enemybot, LiquorBot, and Mirai remain active, persistently exploiting a nine-year-old flaw in D-Link DIR 645 routers. These ongoing attacks emphasize the danger of outdated systems and unpatched vulnerabilities.

Cyber espionage groups, including Earth Kasha, Earth Estries, and APT-K-47, are exploiting weaknesses in public-facing systems to infiltrate networks for long-term surveillance and data theft. In parallel, the Elpaco ransomware, an advanced offshoot of Mimic, is exploiting RDP vulnerabilities and the Zerologon flaw to escalate privileges and deploy malware. Furthermore, Matrix is leveraging IoT device vulnerabilities for large-scale DDoS attacks, fueling disruptive botnets. These developments highlight the increasing sophistication and diversity of cyber threats targeting vulnerable systems across the globe.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2024-11680

An improper authentication vulnerability in the ProjectSend open-source file-sharing application has been identified, allowing remote, unauthenticated attackers to exploit it by sending specially crafted HTTP requests to the application's configuration. Rated with a CVSS score of 9.8 (critical), the flaw affects versions prior to r1720. While this vulnerability was initially patched in May 2023, it was only publicly disclosed with the release of version r1720 in August 2024. According to VulnCheck, this critical security issue has likely been actively exploited in the wild, with signs of exploitation observed across internet-facing instances of ProjectSend.

CVE-2023-28461

A critical improper authentication vulnerability in Array Networks AG and vxAG ArrayOS, affecting versions 9.4.0.481 and earlier, could be exploited remotely, allowing attackers to execute arbitrary code on affected systems. With a CVSS of 9.8, this vulnerability has been added to the CISA KEV catalog for urgent remediation.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerability Product Severity Title Exploited – in the Wild CISA KEV
CVE-2024-8408 Linksys WRT54G 4.21.5 Medium Command injection vulnerability in Linksys WRT54G 4.21.5 False False
CVE-2024-4577 PHP-CGI on Windows High Critical argument injection vulnerability in PHP on Windows servers True True
CVE-2023-49103 ownCloud graphapi Critical Information Disclosure Vulnerability in ownCloud graphapi True True
CVE-2023-1389 TP-Link Archer AX-21 High Command Injection Vulnerability in TP-Link Archer AX-21 True True
CVE-2023-26801 LB-LINK Critical Command injection vulnerability in LB-LINK devices True False
CVE-2022-30489 Wavlink Devices Medium Cross-site scripting vulnerability in Wavlink Devices False False
CVE-2022-25168 Apache Hadoop Critical Command injection vulnerability in org.apache.hadoop.fs.FileUtil.unTarUsingTar in Apache Hadoop False False
CVE-2022-22947 Spring Cloud Gateway Critical Remote code execution vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True True
CVE-2022-30023 Tenda Devices High Command injection vulnerability via the Ping function in Tenda Products False False
CVE-2022-24847 GeoServer High Improper input validation vulnerability in GeoServer leads to arbitrary code execution False False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2021-41773 Apache HTTP Server Path traversal vulnerability in Apache HTTP Server True Zerobot
CVE-2016-20016 MVPower CCTV DVR models Remote code execution vulnerability in MVPower CCTVDVR models True IoT-Repear
CVE-2015-2051 D-Link DIR-645 Arbitrary command execution vulnerability in D-Link DIR-645 Wired/Wireless Router False Hakai
Yowai
Mirai
LiquorBot
BotenaGo
Enemybot

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.    

CVE-2024-7262

A high severity remote code execution vulnerability in the WPS Office for Windows was exploited in an August 2024 cyber attack linked to APT-C-60. This South Korea-aligned cyber espionage group used a job application-themed lure to deploy the SpyGlace backdoor, targeting an organization in Japan. The incident, disclosed by JPCERT/CC, highlights the group's advanced techniques and focus on East Asian entities.

CVE-2024-9680 and CVE-2024-49039

The Russia-aligned RomCom threat group has been linked to the exploitation of two zero-day vulnerabilities, one in Mozilla Firefox (CVE-2024-9680) and another in Microsoft Windows (CVE-2024-49039) in to deploy its backdoor malware. These sophisticated attacks require no user interaction (zero-click) and enable the adversary to execute arbitrary code by simply having the victim visit a compromised web page. This chain of exploits leads to the installation of the RomCom backdoor on the targeted system, highlighting the sophistication and stealth of the group's tactics.

CVE-2023-28461, CVE-2023-45727 and CVE-2023-27997

Trend Micro’s recent analysis highlighted that Earth Kasha, a China-linked cyber espionage group, has been actively exploiting these vulnerabilities in public-facing enterprise technologies such as Array AG(CVE-2023-28461), Proself(CVE-2023-45727) and Fortinet FortiOS (CVE-2023-27997) to establish initial access to target networks. to gain initial access to targeted networks. Since early 2023, Earth Kasha has leveraged these vulnerabilities as part of its ongoing LODEINFO campaign, primarily focusing on regions in Japan, Taiwan, and India. Once inside victim networks, the group deploys a range of backdoors to maintain persistence, including popular tools such as Cobalt Strike, its own LODEINFO malware, and the newly discovered NOOPDOOR.

CVE-2023-38831

A critical vulnerability in RARLAB WinRAR, affecting versions prior to 6.23, allows remote attackers to execute arbitrary code when opening specially crafted ZIP or RAR archives. The Knownsec 404 team identified that APT-K-47 (also known as Mysterious Elephant), a South Asia-based threat actor active since 2022, exploited this flaw in its campaigns. Using various iterations of its Asyncshell malware, including the advanced Asyncshell-v4, the group was able to execute cmd and PowerShell commands. The vulnerability served as the entry point for system access, highlighting the group’s advanced techniques and persistent efforts in targeting organizations.

CVE-2020-1472

Kaspersky Labs has identified a sophisticated ransomware variant called Elpaco, an advanced evolution of the Mimic ransomware family. This malware breaches systems through compromised Remote Desktop Protocol (RDP) connections, often gained via brute force attacks. Once inside, the attackers escalate their privileges by exploiting the critical Zerologon vulnerability (CVE-2020-1472), enabling full control over the victim's server and paving the way for ransomware deployment.

Matrix Threat Actor Exploits IoT Weaknesses in Global Campaign

The threat actor known as Matrix has been associated with a large-scale distributed denial-of-service (DDoS) campaign that exploits vulnerabilities and misconfigurations in Internet of Things (IoT) devices to create a disruptive botnet. This campaign utilizes known security flaws and weak or default credentials to compromise a wide array of internet-connected devices, including IP cameras, DVRs, routers, and telecom equipment. Matrix leverages publicly available tools and scripts from platforms like GitHub, deploying malware such as Mirai and various DDoS-related programs on compromised devices. These include PYbot, pynet, DiscordGo, Homo Network, an HTTP/HTTPS flood attack JavaScript program, and a utility capable of disabling Microsoft Defender Antivirus on Windows systems. These attacks have predominantly targeted IP addresses in China, Japan, and, to a lesser extent, regions like Argentina, Australia, Brazil, Egypt, India, and the U.S., highlighting the campaign's global reach and emphasis on exploiting IoT ecosystems.

Earth Estries: Exploiting N-Day Vulnerabilities to Deploy Custom Backdoors in Southeast Asia

The China-linked cyber-espionage group Earth Estries has been observed leveraging a previously undocumented backdoor known as GHOSTSPIDER in a series of attacks targeting telecommunications companies in Southeast Asia. According to Trend Micro, the group, classified as an aggressive advanced persistent threat (APT), has also deployed the MASOL RAT on Linux-based systems within government networks in the region. The attack campaigns begin with exploiting N-day vulnerabilities in widely used enterprise technologies, including Ivanti Connect Secure, Fortinet FortiClient EMS, Sophos Firewall, and Microsoft Exchange Server vulnerabilities (ProxyLogon CVEs). Once initial access is gained, the attackers deploy custom malware, such as Deed RAT, Demodex, and GHOSTSPIDER, to maintain persistence and conduct long-term cyber-espionage operations.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2024-7262 High Improper path validation vulnerability in the Kingsoft WPS office Yes APT-C-60
SpyGlace
False
CVE-2024-9680 Critical Use-after-free vulnerability in Mozilla Firefox Yes RomCom True
CVE-2024-49039 High Elevation of Privilege Vulnerability in Windows Task Scheduler Yes RomCom False
CVE-2023-28461 Critical Improper authentication vulnerability in Array Networks AG and vxAG ArrayOS Yes Earth Kasha
LODEINFO
NOOPDOOR
False
CVE-2023-45727 High Remote unauthenticated XML External Entity (XXE) attack vulnerability in Proself Yes Earth Kasha
LODEINFO
NOOPDOOR
False
CVE-2023-27997 Critical Heap-based buffer overflow vulnerability in the Fortinet FortiOS and FortiProxy SSL-VPN Yes Earth Kasha
LODEINFO
NOOPDOOR
False
CVE-2023-38831 High Remote arbitrary code execution vulnerability in WinRAR Yes APT-K-47 False
CVE-2024-27348 Critical Remote Command Execution vulnerability in Apache HugeGraph-Server Yes Matrix True
CVE-2022-30525 Critical OS Command injection vulnerability in the Zyxel firmware versions Yes Matrix False
CVE-2022-30075 High Improper validation vulnerability in the TP-Link Router AX50 firmware that can lead to remote code execution No Matrix False
CVE-2021-20090 Critical A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware Yes Matrix False
CVE-2018-10562 Critical Command injection vulnerability in the DASAN GPON home routers No Matrix False
CVE-2018-10561 Critical Authentication bypass vulnerability in the DASAN GPON home routers No Matrix False
CVE-2018-9995 Critical Authentication bypass vulnerability in Digital Video Recorders (DVRs) No Matrix False
CVE-2017-18368 Critical A command injection vulnerability in ZTE routers No Matrix False
CVE-2017-17215 High Remote code execution vulnerability in the customized versions of Huawei HG532 Yes Matrix False
CVE-2017-17106 Critical Authentication bypass vulnerability in Zivif Webcams leads to remote code execution No Matrix False
CVE-2014-8361 Critical Remote Code Execution Vulnerability in miniigd SOAP service in Realtek SDK Yes Matrix False
CVE-2020-1472 Critical The "Zerologon" vulnerability, a critical security flaw, impacts Windows Server operating systems, posing a significant threat to affected systems Yes Elpaco True
CVE-2024-21887 Critical Command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure Yes Earth Estries False
CVE-2023-46805 High Command injection vulnerability in web components of Ivanti Connect Secure and Ivanti Policy Secure Yes Earth Estries False
CVE-2023-48788 Critical Fortinet FortiClient EMS SQL Injection Vulnerability Yes Earth Estries False
CVE-2022-3236 Critical Code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall Yes Earth Estries False

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2024-7956 Improper Permission DataEdgePlatform DataMosaix Private Cloud 7.07 Resource
CVE-2024-0122 Denial of Service DLS component of NVIDIA License System Resource
CVE-2024-0138 Remote Code Execution NVIDIA Base Command Manager Resource
CVE-2024-8401 Cross-site Scripting EcoStruxure™ Power Monitoring Expert and Operation Resource
CVE-2024-43106 Library Injection Microsoft Excel 16.83 for macOS Resource

External References

  1. https://www.cisa.gov/news-events/alerts/2024/11/25/cisa-adds-one-known-exploited-vulnerability-catalog  
  2. https://blogs.jpcert.or.jp/ja/2024/11/APT-C-60.html  
  3. https://securityonline.info/elpaco-ransomware-a-new-threat-actor-leverages-cve-2020-1472-for-global-attacks/  
  4. https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/  
  5. https://www.trendmicro.com/en_us/research/24/k/lodeinfo-campaign-of-earth-kasha.html  
  6. https://medium.com/@knownsec404team/unveiling-the-past-and-present-of-apt-k-47-weapon-asyncshell-5a98f75c2d68  
  7. https://securelist.com/elpaco-ransomware-a-mimic-variant/114635/  
  8. https://www.trendmicro.com/en_us/research/24/k/earth-estries.html  

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports