thehackernews.com
Open in
urlscan Pro
104.26.11.117
Public Scan
Submitted URL: https://t.co/acdEHW66uX
Effective URL: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
Submission: On October 10 via api from IN — Scanned from CA
Effective URL: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
Submission: On October 10 via api from IN — Scanned from CA
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Get Latest News in Your Inbox</div>
<p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
#1 Trusted Cybersecurity News Platform Followed by 4.50+ million Subscribe – Get Latest News * Home * Newsletter * Webinars * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Webinars * Expert Insights * Contact Resources * Webinars * THN Store * Free eBooks About Site * About THN * Jobs * Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel MUHSTIK BOTNET EXPLOITING APACHE ROCKETMQ FLAW TO EXPAND DDOS ATTACKS Jun 06, 2024Ravie LakshmananBotnet / DDoS Attack * Muhstik botnet exploits a critical Apache RocketMQ flaw (CVE-2023-33246) for remote code execution, targeting Linux servers and IoT devices for DDoS attacks and cryptocurrency mining. * Infection involves executing a shell script from a remote IP, downloading the Muhstik malware binary ("pty3"), and ensuring persistence by copying to multiple directories and editing system files. * With over 5,000 vulnerable Apache RocketMQ instances still exposed, organizations must update to the latest version to mitigate risks, while securing MS-SQL servers against brute-force attacks and ensuring regular password changes. The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. "Muhstik is a well-known threat targeting IoT devices and Linux-based servers, notorious for its ability to infect devices and utilize them for cryptocurrency mining and launching Distributed Denial of Service (DDoS) attacks," cloud security firm Aqua said in a report published this week. First documented in 2018, attack campaigns involving the malware have a history of exploiting known security flaws, specifically those relating to web applications, for propagation. The latest addition to the list of exploited vulnerabilities is CVE-2023-33246 (CVSS score: 9.8), a critical security flaw affecting Apache RocketMQ that allows a remote and unauthenticated attacker to perform remote code execution by forging the RocketMQ protocol content or using the update configuration function. Once the shortcoming is successfully abused to obtain initial access, the threat actor proceeds to execute a shell script hosted on a remote IP address, which is then responsible for retrieving the Muhstik binary ("pty3") from another server. "After gaining the ability to upload the malicious payload by exploiting the RocketMQ vulnerability, the attacker is able to execute their malicious code, which downloads the Muhstik malware," security researcher Nitzan Yaakov said. Persistence on the host is achieved by means of copying the malware binary to multiple directories and editing the /etc/inittab file -- which controls what processes to start during the booting of a Linux server -- to automatically restart the process. What's more, the naming of the binary as "pty3" is likely an attempt to masquerade as a pseudoterminal ("pty") and evade detection. Another evasion technique is that the malware is copied to directories such as /dev/shm, /var/tmp, /run/lock, and /run during the persistence phase, which allows it to be executed directly from memory and avoid leaving traces on the system. Muhstik comes equipped with features to gather system metadata, laterally move to other devices over a secure shell (SSH), and ultimately establish contact with a command-and-control (C2) domain to receive further instructions using the Internet Relay Chat (IRC) protocol. The end goal of the malware is to weaponize the compromised devices to perform different types of flooding attacks against targets of interest, effectively overwhelming their network resources and triggering a denial-of-service condition. With 5,216 vulnerable instances of Apache RocketMQ still exposed to the internet after more than a year of public disclosure of the flaw, it's essential that organizations take steps to update to the latest version in order to mitigate potential threats. "Moreover, in previous campaigns, cryptomining activity was detected after the execution of the Muhstik malware," Yaakov said. "These objectives go hand in hand, as the attackers strive to spread and infect more machines, which helps them in their mission to mine more cryptocurrency using the electrical power of the compromised machines." The disclosure comes as the AhnLab Security Intelligence Center (ASEC) revealed that poorly secured MS-SQL servers are being targeted by threat actors to various types of malware, ranging from ransomware and remote access trojans to proxyware. "Administrators must use passwords that are difficult to guess for their accounts and change them periodically to protect the database server from brute-force attacks and dictionary attacks," ASEC said. "They must also apply the latest patches to prevent vulnerability attacks." Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram SHARE Apachebotnetcryptocurrencyddosddos protectionMalwareRemote Access Trojanremote code executionVulnerability Trending News 5 Must-Have Tools for Effective Dynamic Malware Analysis LockBit Ransomware and Evil Corp Members Arrested and Sanctioned in Joint Global Effort Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks Popular Resources CTEM Guide: How to Take Control of Your Cybersecurity Exposures Unlock 5 Key Tactics to Fight Ransomware – Download Free Report Get the Ultimate Guide to Service Account Protection Get Expert Cyber Insights Every Month – Subscribe to GIAC Newsletter CYBERSECURITY WEBINARS 🚨 Advanced Identity Attacks LEARN HOW LUCR-3 HIJACKS YOUR CLOUD IN HOURS LUCR-3 is exploiting cloud vulnerabilities at an alarming rate. Join our webinar to learn how to protect your SaaS and cloud environments. Claim Your Spot 🔐 Eliminate Shadow Data Risks LEARN PROACTIVE DSPM TACTICS Learn how Global-e's CISO used DSPM to eliminate shadow data risks and protect critical information. Register for Free Breaking News Cybersecurity Resources [New] Software Supply Chain Security for Dummies Understand the why, the how - and what actions your organization should take - in the new era of security ThreatLabz 2024 Ransomware Report ThreatLabz uncovers largest ransomware payout in history, plus a 17.8% increase in attacks. Unlocking SIEM: The Role of Smart Filtering Huntress Managed SIEM is everything you need, nothing you don't — smart filtering for security data, constant monitoring, and compliance assistance—all at a clear, predictable price. Subscribe Today: Cyber Insights, Certifications, and More Monthly newsletter keeping you informed and equipped for the evolving landscape of cybersecurity. Expert Insights / Articles Videos WILL THE SMALL IOT DEVICE OEM SURVIVE? October 07, 2024 Read ➝ SECURITY OPERATIONS FOR NON-HUMAN IDENTITIES September 28, 2024 Watch ➝ THE MICROSOFT 365 BACKUP GAME JUST CHANGED: RANSOMWARE RECOVERY REVOLUTIONIZED September 19, 2024 Read ➝ HOW DOES THREAT INTELLIGENCE APPLY TO SAAS SECURITY? AND WHY YOU SHOULD CARE September 16, 2024 Read ➝ Get Latest News in Your Inbox Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email Connect with us! 925,500 Followers 601,000 Followers 22,700 Subscribers 147,000 Followers 1,890,500 Followers 132,000 Subscribers Company * About THN * Advertise with us * Contact Pages * Webinars * Deals Store * Privacy Policy Deals * Hacking * Development * Android RSS Feeds Contact Us © The Hacker News, 2024. All Rights Reserved.